Advertisement
intervineinc

GPO Issue

Jan 17th, 2019
274
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 15.39 KB | None | 0 0
  1. XXXXXX on XXXXXX
  2. Data collected on: 1/17/2019 8:00:38 AM
  3. hide all
  4. Summaryhide
  5. During last computer policy refresh on 1/17/2019 6:52:50 AM
  6.  
  7. No Errors Detected
  8. A fast link was detected More information...
  9. During last user policy refresh on 1/17/2019 7:17:08 AM
  10.  
  11. No Errors Detected
  12. A fast link was detected More information...
  13. Computer Detailshide
  14. Generalhide
  15. Computer name XXXXXX
  16. Domain XXXXXX.local
  17. Site XXXXXX
  18. Organizational Unit XXXXXX.local/Computer/Servers
  19. Security Group Membership
  20. show
  21. Component Statushide
  22. Component Name Status Time Taken Last Process Time Event Log
  23. Group Policy Infrastructure Success 777 Millisecond(s) 1/17/2019 6:52:50 AM View Log
  24. Registry Success 235 Millisecond(s) 1/15/2019 9:17:46 AM View Log
  25. Scripts Success 47 Millisecond(s) 1/15/2019 9:17:46 AM View Log
  26. Security Success 3 Second(s) 812 Millisecond(s) 1/15/2019 9:17:50 AM View Log
  27. Settingshide
  28. Policieshide
  29. Windows Settingshide
  30. Scriptshide
  31. Startuphide
  32. Name Parameters Last Run Script Order in GPO Winning GPO
  33. fs_win_agent_uninstall.vbs 1/15/2019 4:28:25 PM Not configured UninstallFreshServiceAgent
  34. Security Settingshide
  35. Account Policies/Password Policyhide
  36. Policy Setting Winning GPO
  37. Enforce password history 6 passwords remembered Default Domain Policy
  38. Maximum password age 0 days Default Domain Policy
  39. Minimum password age 0 days Default Domain Policy
  40. Minimum password length 8 characters Default Domain Policy
  41. Password must meet complexity requirements Enabled Default Domain Policy
  42. Store passwords using reversible encryption Disabled Default Domain Policy
  43. Account Policies/Account Lockout Policyhide
  44. Policy Setting Winning GPO
  45. Account lockout threshold 0 invalid logon attempts Default Domain Policy
  46. Local Policies/Security Optionshide
  47. Network Accesshide
  48. Policy Setting Winning GPO
  49. Network access: Allow anonymous SID/Name translation Disabled Default Domain Policy
  50. Network Securityhide
  51. Policy Setting Winning GPO
  52. Network security: Do not store LAN Manager hash value on next password change Enabled Default Domain Policy
  53. Network security: Force logoff when logon hours expire Disabled Default Domain Policy
  54. System Serviceshide
  55. Remote Registry (Startup Mode: Automatic)hide
  56. Winning GPO NetCrunch - Windows Services
  57. Permissions
  58. No permissions specified
  59. Auditing
  60. No auditing specified
  61. Remote Procedure Call (RPC) (Startup Mode: Automatic)hide
  62. Winning GPO NetCrunch - Enable Remote Registry & RPC
  63. Permissions
  64. No permissions specified
  65. Auditing
  66. No auditing specified
  67. Public Key Policies/Certificate Services Client - Auto-Enrollment Settingshide
  68. Policy Setting Winning GPO
  69. Automatic certificate management Enabled Default Domain Policy
  70. Option Setting
  71. Enroll new certificates, renew expired certificates, process pending certificate requests and remove revoked certificates Enabled
  72. Update and manage certificates that use certificate templates from Active Directory Enabled
  73. Windows Firewall with Advanced Securityhide
  74. Global Settingshide
  75. Policy Setting Winning GPO
  76. Policy version 2.26 WSUS Policy - Servers
  77. Disable stateful FTP Not Configured
  78. Disable stateful PPTP Not Configured
  79. IPsec exempt Not Configured
  80. IPsec through NAT Not Configured
  81. Preshared key encoding Not Configured
  82. SA idle time Not Configured
  83. Strong CRL check Not Configured
  84. Inbound Ruleshide
  85. Name Description Winning GPO
  86. File and Printer Sharing (LLMNR-UDP-In) Inbound rule for File and Printer Sharing to allow Link Local Multicast Name Resolution. [UDP XXXX] NetCrunch - Windows Firewall Rules
  87. This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
  88. Enabled True
  89. Program %SystemRoot%\system32\svchost.exe
  90. Action Allow
  91. Security Require authentication
  92. Authorized computers
  93. Authorized users
  94. Protocol XX
  95. Local port XXXX
  96. Remote port Any
  97. ICMP settings Any
  98. Local scope Any
  99. Remote scope Local subnet
  100. Profile All
  101. Network interface type All
  102. Service dnscache
  103. Allow edge traversal False
  104. Group File and Printer Sharing
  105. File and Printer Sharing (NB-Datagram-In) Inbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP XXXX] NetCrunch - Windows Firewall Rules
  106. This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
  107. Enabled True
  108. Program System
  109. Action Allow
  110. Security Require authentication
  111. Authorized computers
  112. Authorized users
  113. Protocol XX
  114. Local port XXXX
  115. Remote port Any
  116. ICMP settings Any
  117. Local scope Any
  118. Remote scope Any
  119. Profile All
  120. Network interface type All
  121. Service All programs and services
  122. Allow edge traversal False
  123. Group File and Printer Sharing
  124. File and Printer Sharing (NB-Session-In) Inbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP XXXX] NetCrunch - Windows Firewall Rules
  125. This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
  126. Enabled True
  127. Program System
  128. Action Allow
  129. Security Require authentication
  130. Authorized computers
  131. Authorized users
  132. Protocol XX
  133. Local port XXXX
  134. Remote port Any
  135. ICMP settings Any
  136. Local scope Any
  137. Remote scope Any
  138. Profile All
  139. Network interface type All
  140. Service All programs and services
  141. Allow edge traversal False
  142. Group File and Printer Sharing
  143. File and Printer Sharing (NB-Name-In) Inbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP XXXX] NetCrunch - Windows Firewall Rules
  144. This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
  145. Enabled True
  146. Program System
  147. Action Allow
  148. Security Require authentication
  149. Authorized computers
  150. Authorized users
  151. Protocol XX
  152. Local port XXXX
  153. Remote port Any
  154. ICMP settings Any
  155. Local scope Any
  156. Remote scope Any
  157. Profile All
  158. Network interface type All
  159. Service All programs and services
  160. Allow edge traversal False
  161. Group File and Printer Sharing
  162. File and Printer Sharing (Echo Request - ICMPv6-In) Echo Request messages are sent as ping requests to other nodes. NetCrunch - Windows Firewall Rules
  163. This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
  164. Enabled True
  165. Program Any
  166. Action Allow
  167. Security Require authentication
  168. Authorized computers
  169. Authorized users
  170. Protocol XX
  171. Local port Any
  172. Remote port Any
  173. ICMP settings type XXXX:code any
  174. Local scope Any
  175. Remote scope Any
  176. Profile All
  177. Network interface type All
  178. Service All programs and services
  179. Allow edge traversal False
  180. Group File and Printer Sharing
  181. File and Printer Sharing (Spooler Service - RPC-EPMAP) Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Spooler Service. NetCrunch - Windows Firewall Rules
  182. This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
  183. Enabled True
  184. Program Any
  185. Action Allow
  186. Security Require authentication
  187. Authorized computers
  188. Authorized users
  189. Protocol XX
  190. Local port RPC endpoint mapping
  191. Remote port Any
  192. ICMP settings Any
  193. Local scope Any
  194. Remote scope Any
  195. Profile All
  196. Network interface type All
  197. Service Rpcss
  198. Allow edge traversal False
  199. Group File and Printer Sharing
  200. File and Printer Sharing (SMB-In) Inbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP XXXX] NetCrunch - Windows Firewall Rules
  201. This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
  202. Enabled True
  203. Program System
  204. Action Allow
  205. Security Require authentication
  206. Authorized computers
  207. Authorized users
  208. Protocol XX
  209. Local port XXXX
  210. Remote port Any
  211. ICMP settings Any
  212. Local scope Any
  213. Remote scope Any
  214. Profile All
  215. Network interface type All
  216. Service All programs and services
  217. Allow edge traversal False
  218. Group File and Printer Sharing
  219. File and Printer Sharing (Echo Request - ICMPv4-In) Echo Request messages are sent as ping requests to other nodes. NetCrunch - Windows Firewall Rules
  220. This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
  221. Enabled True
  222. Program Any
  223. Action Allow
  224. Security Require authentication
  225. Authorized computers
  226. Authorized users
  227. Protocol XX
  228. Local port Any
  229. Remote port Any
  230. ICMP settings type 8:code any
  231. Local scope Any
  232. Remote scope Any
  233. Profile All
  234. Network interface type All
  235. Service All programs and services
  236. Allow edge traversal False
  237. Group File and Printer Sharing
  238. File and Printer Sharing (Spooler Service - RPC) Inbound rule for File and Printer Sharing to allow the Print Spooler Service to communicate via TCP/RPC. NetCrunch - Windows Firewall Rules
  239. This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
  240. Enabled True
  241. Program %SystemRoot%\system32\spoolsv.exe
  242. Action Allow
  243. Security Require authentication
  244. Authorized computers
  245. Authorized users
  246. Protocol XX
  247. Local port Dynamic RPC
  248. Remote port Any
  249. ICMP settings Any
  250. Local scope Any
  251. Remote scope Any
  252. Profile All
  253. Network interface type All
  254. Service Spooler
  255. Allow edge traversal False
  256. Group File and Printer Sharing
  257. Remote Scheduled Tasks Management (RPC) Inbound rule for the Task Scheduler service to be remotely managed via RPC/TCP. NetCrunch - Windows Firewall Rules
  258. This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
  259. Enabled True
  260. Program %SystemRoot%\system32\svchost.exe
  261. Action Allow
  262. Security Require authentication
  263. Authorized computers
  264. Authorized users
  265. Protocol XX
  266. Local port Dynamic RPC
  267. Remote port Any
  268. ICMP settings Any
  269. Local scope Any
  270. Remote scope Any
  271. Profile All
  272. Network interface type All
  273. Service schedule
  274. Allow edge traversal False
  275. Group Remote Scheduled Tasks Management
  276. Remote Scheduled Tasks Management (RPC-EPMAP) Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Task Scheduler service. NetCrunch - Windows Firewall Rules
  277. This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
  278. Enabled True
  279. Program %SystemRoot%\system32\svchost.exe
  280. Action Allow
  281. Security Require authentication
  282. Authorized computers
  283. Authorized users
  284. Protocol XX
  285. Local port RPC endpoint mapping
  286. Remote port Any
  287. ICMP settings Any
  288. Local scope Any
  289. Remote scope Any
  290. Profile All
  291. Network interface type All
  292. Service RPCSS
  293. Allow edge traversal False
  294. Group Remote Scheduled Tasks Management
  295. Windows Management Instrumentation (WMI-In) Inbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP] NetCrunch - Windows Firewall Rules
  296. This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
  297. Enabled True
  298. Program %SystemRoot%\system32\svchost.exe
  299. Action Allow
  300. Security Require authentication
  301. Authorized computers
  302. Authorized users
  303. Protocol XX
  304. Local port Any
  305. Remote port Any
  306. ICMP settings Any
  307. Local scope Any
  308. Remote scope Any
  309. Profile All
  310. Network interface type All
  311. Service winmgmt
  312. Allow edge traversal False
  313. Group Windows Management Instrumentation (WMI)
  314. Outbound Ruleshide
  315. Name Description Winning GPO
  316. WSUS Server Connection WSUS Policy - Servers
  317. This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
  318. Enabled True
  319. Program Any
  320. Action Allow
  321. Security Require authentication
  322. Authorized computers
  323. Protocol XX
  324. Local port Any
  325. Remote port XXXX
  326. ICMP settings Any
  327. Local scope Any
  328. Remote scope Any
  329. Profile Domain
  330. Network interface type All
  331. Service All programs and services
  332. Group
  333. Connection Security Settingshide
  334. Administrative Templateshide
  335. Policy definitions (ADMX files) retrieved from the local computer.
  336. Windows Components/Windows Updatehide
  337. Policy Setting Winning GPO
  338. Allow Automatic Updates immediate installation Enabled WSUS Policy - Servers
  339. Configure Automatic Updates Enabled WSUS Policy - Servers
  340. Configure automatic updating: 3 - Auto download and notify for install
  341. The following settings are only required and applicable if 4 is selected.
  342. Install during automatic maintenance Disabled
  343. Scheduled install day: 0 - Every day
  344. Scheduled install time: 12:00
  345. Install updates for other Microsoft products Enabled
  346. Policy Setting Winning GPO
  347. Enable client-side targeting Enabled WSUS Policy - Servers
  348. Target group name for this computer Servers
  349. Policy Setting Winning GPO
  350. Specify intranet Microsoft update service location Enabled WSUS Policy - Servers
  351. Set the intranet update service for detecting updates: XXXX
  352. Set the intranet statistics server: XXXX
  353. Set the alternate download server:
  354. (example: http://IntranetUpd01)
  355. Download files with no Url in the metadata if alternate download server is set. Disabled
  356. Policy Setting Winning GPO
  357. Turn off auto-restart for updates during active hours Enabled WSUS Policy - Servers
  358. Active Hours
  359. Start: 6 AM
  360. End: 6 PM
  361. Policy Setting Winning GPO
  362. Turn on recommended updates via Automatic Updates Enabled WSUS Policy - Servers
  363. Group Policy Objectshide
  364. Applied GPOshide
  365. Default Domain Policy [{31B2F340-016D-11D2-945F-00C04FB984F9}]hide
  366. Link Location XXXXXX.local
  367. Extensions Configured {B1BE8D72-6EAC-11D2-A4EA-00C04F79F83A}
  368. Security
  369. Registry
  370. Enforced No
  371. Disabled None
  372. Security Filters XXXXXX\Domain Admins
  373. NT AUTHORITY\Authenticated Users
  374. Revision AD (36), SYSVOL (36)
  375. WMI Filter
  376. NetCrunch - Enable Remote Registry & RPC [{3D009066-FB45-420A-A263-04196C70A3EC}]hide
  377. Link Location XXXXXX.local
  378. Extensions Configured Security
  379. Enforced No
  380. Disabled None
  381. Security Filters NT AUTHORITY\Authenticated Users
  382. Revision AD (5), SYSVOL (5)
  383. WMI Filter
  384. NetCrunch - Windows Firewall Rules [{70BFCE9E-CA9C-4758-AC3D-5A9CF3410757}]hide
  385. Link Location XXXXXX.local
  386. Extensions Configured Registry
  387. Enforced No
  388. Disabled None
  389. Security Filters NT AUTHORITY\Authenticated Users
  390. Revision AD (12), SYSVOL (12)
  391. WMI Filter
  392. NetCrunch - Windows Services [{2E5C4AF7-84B3-4A93-8F24-D9A58C504166}]hide
  393. Link Location XXXXXX.local
  394. Extensions Configured Security
  395. Enforced No
  396. Disabled None
  397. Security Filters NT AUTHORITY\Authenticated Users
  398. Revision AD (2), SYSVOL (2)
  399. WMI Filter
  400. UninstallFreshServiceAgent [{8FBD40EC-0432-4457-BF15-E071A0CC03EF}]hide
  401. Link Location XXXXXX.local
  402. Extensions Configured Scripts
  403. Enforced No
  404. Disabled None
  405. Security Filters NT AUTHORITY\Authenticated Users
  406. Revision AD (2), SYSVOL (2)
  407. WMI Filter
  408. WSUS Policy - Servers [{580CC063-9E1D-4CFF-9733-D05834AD4FB4}]hide
  409. Link Location XXXXXX.local/Computer/Servers
  410. Extensions Configured Registry
  411. Enforced No
  412. Disabled None
  413. Security Filters NT AUTHORITY\Authenticated Users
  414. Revision AD (35), SYSVOL (35)
  415. WMI Filter
  416. Denied GPOshide
  417. Local Group Policy [LocalGPO]hide
  418. Link Location Local
  419. Extensions Configured
  420. Enforced No
  421. Disabled None
  422. Security Filters
  423. Revision AD (0), SYSVOL (0)
  424. WMI Filter
  425. Reason Denied Empty
  426. WMI Filtershide
  427. Name Value Reference GPO(s)
  428. None
  429. User Detailshide
  430. Generalhide
  431. User name XXXXXX
  432. Domain XXXXXX.local
  433. Organizational Unit XXXXXX.local/Accounts/Technology/IT Accounts
  434. Security Group Membership
  435. show
  436. Component Statushide
  437. Component Name Status Time Taken Last Process Time Event Log
  438. Group Policy Infrastructure Success 742 Millisecond(s) 1/17/2019 7:17:08 AM View Log
  439. Settingshide
  440. No settings defined.
  441. Group Policy Objectshide
  442. Applied GPOshide
  443. Denied GPOshide
  444. Local Group Policy [LocalGPO]hide
  445. Link Location Local
  446. Extensions Configured
  447. Enforced No
  448. Disabled None
  449. Security Filters
  450. Revision AD (0), SYSVOL (0)
  451. WMI Filter
  452. Reason Denied Empty
  453. WMI Filtershide
  454. Name Value Reference GPO(s)
  455. None
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement