Chat now with support
Chat with Support

GPOADmin 5.17 - User Guide

Introducing Quest GPOADmin Configuring GPOADmin Using GPOADmin
Connecting to the Version Control system Navigating the GPOADmin console Search folders Accessing the GPMC extension Configuring user preferences Working with the live environment Working with controlled objects (version control root)
Creating a custom container hierarchy Selecting security, levels of approval, and notification options Viewing the differences between objects Copying/pasting objects Proposing the creation of controlled objects Merging GPOs Restoring an object to a previous version Restoring links to a previous version Managing your links with search and replace Linking GPOs to multiple Scopes of Management Managing compliance issues automatically with remediation rules Validating GPOs Managing GPO revisions with lineage Setting when users can modify objects Working with registered objects Working with available objects Working with checked out objects Working with objects pending approval and deployment
Checking compliance Editing objects Synchronizing GPOs Exporting and importing
Creating Reports Appendix: Windows PowerShell Commands Appendix: GPOADmin Event Log Appendix: GPOADmin Backup and Recovery Procedures Appendix: Customizing your workflow Appendix: GPOADmin Silent Installation Commands Appendix: Configuring Gmail for Notifications Appendix: Registering GPOADmin for Office 365 Exchange Online Appendix: GPOADmin with SQL Replication About Us

Group Policy Object Security Report

This report details the security of GPOs, specifically where certain trustees are either present or not present.

Policy Analysis Report

This report displays the registry settings for GPOs within a selected Scope of Management. You can use this report to help to manage your deployment by comparing GPOs to identify information such as duplicate settings, inconsistencies, or how many times a value has been changed.

You can run the report by either:

The report details include:

The Policy Analysis report does not check the security or validate the WMI filters. To analyze whether users have access to a GPO and how WMI filtering has been set to apply group policy objects, we have provided the GPOADmin.GPOAnalyzer.exe command-line utility.

To run the utility, start a command prompt and specify GPOADmin.GPOAnalyzer.exe with the appropriate parameters.

/Domain

Required

Scope of Management fully qualified domain name.

/SOMDN

Required

Scope of Management distinguished name.

/Output

Required

File name for the saved report.

/x

Optional

Force the output to be in XML. (The default is HTML)

/DC

Optional

Domain controller to communicate with. (The default is the PDCe)

/S

Optional

Process security filters. This checks to see if the current user can access the GPO. (The default is set to not check security.)

/F

Optional

Validate GPO WMI filters. (The default is set to not check WMI filters to see determine if a GPO should be processed.)

/L

Optional

Use the locally stored GPO definition. (The default is to use the central store, if configured. If not, the local policy definition will be used.)

/V

Optional

Log progress to the screen.

/U

Optional

Process only the user configuration. (The default is user and computer.)

/C

Optional

Process only the computer configuration. (The default is user and computer.)

GPO Synchronization Report

This report details the GPO synchronizations that have been performed in your environment.

Group Policy Results

This report shows the resultant set of policies (RSoP) for a given user or computer, or both.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating