Chat now with support
Chat with Support

GPOADmin 5.21 - User Guide

Introducing Quest GPOADmin Configuring GPOADmin Using GPOADmin
Connecting to the Version Control system Navigating the GPOADmin console Search folders Accessing the GPMC extension Configuring user preferences Working with the live environment Working with controlled objects (version control root)
Creating a custom container hierarchy Selecting security, levels of approval, and notification options Viewing the differences between objects Copying/pasting objects Proposing the creation of controlled objects Merging GPOs Restoring an object to a previous version Restoring links to a previous version Managing your links with search and replace Linking GPOs to multiple Scopes of Management Managing compliance issues automatically with remediation rules Validating GPOs Managing GPO revisions with lineage Setting the change window for specific actions Working with registered objects Working with available objects Working with checked out objects Working with objects pending approval and deployment
Checking compliance Editing objects Synchronizing GPOs Exporting and importing
Creating Reports Appendix: Windows PowerShell Commands Appendix: GPOADmin Event Log Appendix: GPOADmin Backup and Recovery Procedures Appendix: Customizing your workflow Appendix: GPOADmin Silent Installation Commands Appendix: Configuring Gmail for Notifications Appendix: Registering GPOADmin for Microsoft 365 Exchange Online Appendix: GPOADmin with SQL Replication About Us

Configuring role-based delegation

NOTE:  

GPOADmin Administrators can create custom roles that can be applied to specific users to allow them to perform certain functions within the Version Control system. For more information about users with permissions to create roles see Configuring the Version Control server .

When building custom roles, keep in mind the rights must also have the dependent permissions assigned.

Assign Keywords

Read

Attest

Read

Block Inheritance for SOM links

Read and Edit

Block Notification Inheritance

Read

Cloak / Uncloak

Read

Compliance Action

Read

Create

Read and Edit

Delegate Security

Read

Delete

Read

Delete links outside of workflow

Read, Edit, Link and Deploy (User must be the sole approver on linked Scopes of Management)

Deploy

Read

Edit

Read

Edit Linage

Read

Enable/Disable Approvals

Read

Enable / Disable Workflow

Read

Export

Read

Label

Read

List Folders

None

Link

Read and Edit (For managed Scopes of Management)

Lock / Unlock

Read

Modify Approval Workflow

Read

Modify Keywords

Read

Modify Change Window

Read

Modify Link Properties

Read and Edit (For managed Scopes of Management)

Modify Managed By

Read

Modify System-Provided Security Right

Read, Edit and Modify Security Filter

Modify Security Filter

Read and Edit

Move

Read

Read

None

Register

Read

Reject Change

Read

Request Approval

Read

Run Contextual Reports

Read

Run Reports

Read

Set Notifications

Read

Set Remediation Rules

Read

Synchronize

Read

Undo Check-out

Read

Unregister

Read

Unregister and Remove History

Read

View Cloaked

Read

Create Subcontainers

Read

Delegate Container Security

Read

Delete Container

Read

Rename Container

Read

Block Protected Settings Inheritance

Read and Modify Protected Settings Assignments

Export Group Policy Objects as Protected Settings Policies

Read and Register (On the target Protected Settings Container)

Modify Protected Settings

Read

Modify Protected Settings Assignments

Read

Modify Protected Settings Exclusions

Read

Modify Protected Settings Baseline Assignments

Read

Modify Intune Assignments

Read

See also:

 

System Administrator

System Administrators can perform any action in the Version Control system.

Version Controlled Object Rights include:

 

 

System Administrator (continued)

Version Control Container Rights include:

Protected Settings Rights include:

Moderator

Moderator (Moderators can perform every action a user can, plus undoing check outs from other users and running the compliance wizard.) They can also:

User

User (Users can perform all the basic actions of the Version Control system, such as check in, check out, edit.) They can also:

Creating roles

You can easily create roles with any of the customized rights.

2
Select Delegation | Roles.
3
Click Add New Role.

Editing roles

2
Select Delegation | Roles.
5
Click OK again to apply the changes.

Delegating roles

Once the required roles are in place, GPOADmin Administrators can begin to delegate the security over containers and GPOs to specific users and groups.

2
Select the Security tab.
3
Click Add to select the users and groups to which you want to apply the role.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating