Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- XXXXXX on XXXXXX
- Data collected on: 1/17/2019 8:00:38 AM
- hide all
- Summaryhide
- During last computer policy refresh on 1/17/2019 6:52:50 AM
- No Errors Detected
- A fast link was detected More information...
- During last user policy refresh on 1/17/2019 7:17:08 AM
- No Errors Detected
- A fast link was detected More information...
- Computer Detailshide
- Generalhide
- Computer name XXXXXX
- Domain XXXXXX.local
- Site XXXXXX
- Organizational Unit XXXXXX.local/Computer/Servers
- Security Group Membership
- show
- Component Statushide
- Component Name Status Time Taken Last Process Time Event Log
- Group Policy Infrastructure Success 777 Millisecond(s) 1/17/2019 6:52:50 AM View Log
- Registry Success 235 Millisecond(s) 1/15/2019 9:17:46 AM View Log
- Scripts Success 47 Millisecond(s) 1/15/2019 9:17:46 AM View Log
- Security Success 3 Second(s) 812 Millisecond(s) 1/15/2019 9:17:50 AM View Log
- Settingshide
- Policieshide
- Windows Settingshide
- Scriptshide
- Startuphide
- Name Parameters Last Run Script Order in GPO Winning GPO
- fs_win_agent_uninstall.vbs 1/15/2019 4:28:25 PM Not configured UninstallFreshServiceAgent
- Security Settingshide
- Account Policies/Password Policyhide
- Policy Setting Winning GPO
- Enforce password history 6 passwords remembered Default Domain Policy
- Maximum password age 0 days Default Domain Policy
- Minimum password age 0 days Default Domain Policy
- Minimum password length 8 characters Default Domain Policy
- Password must meet complexity requirements Enabled Default Domain Policy
- Store passwords using reversible encryption Disabled Default Domain Policy
- Account Policies/Account Lockout Policyhide
- Policy Setting Winning GPO
- Account lockout threshold 0 invalid logon attempts Default Domain Policy
- Local Policies/Security Optionshide
- Network Accesshide
- Policy Setting Winning GPO
- Network access: Allow anonymous SID/Name translation Disabled Default Domain Policy
- Network Securityhide
- Policy Setting Winning GPO
- Network security: Do not store LAN Manager hash value on next password change Enabled Default Domain Policy
- Network security: Force logoff when logon hours expire Disabled Default Domain Policy
- System Serviceshide
- Remote Registry (Startup Mode: Automatic)hide
- Winning GPO NetCrunch - Windows Services
- Permissions
- No permissions specified
- Auditing
- No auditing specified
- Remote Procedure Call (RPC) (Startup Mode: Automatic)hide
- Winning GPO NetCrunch - Enable Remote Registry & RPC
- Permissions
- No permissions specified
- Auditing
- No auditing specified
- Public Key Policies/Certificate Services Client - Auto-Enrollment Settingshide
- Policy Setting Winning GPO
- Automatic certificate management Enabled Default Domain Policy
- Option Setting
- Enroll new certificates, renew expired certificates, process pending certificate requests and remove revoked certificates Enabled
- Update and manage certificates that use certificate templates from Active Directory Enabled
- Windows Firewall with Advanced Securityhide
- Global Settingshide
- Policy Setting Winning GPO
- Policy version 2.26 WSUS Policy - Servers
- Disable stateful FTP Not Configured
- Disable stateful PPTP Not Configured
- IPsec exempt Not Configured
- IPsec through NAT Not Configured
- Preshared key encoding Not Configured
- SA idle time Not Configured
- Strong CRL check Not Configured
- Inbound Ruleshide
- Name Description Winning GPO
- File and Printer Sharing (LLMNR-UDP-In) Inbound rule for File and Printer Sharing to allow Link Local Multicast Name Resolution. [UDP XXXX] NetCrunch - Windows Firewall Rules
- This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
- Enabled True
- Program %SystemRoot%\system32\svchost.exe
- Action Allow
- Security Require authentication
- Authorized computers
- Authorized users
- Protocol XX
- Local port XXXX
- Remote port Any
- ICMP settings Any
- Local scope Any
- Remote scope Local subnet
- Profile All
- Network interface type All
- Service dnscache
- Allow edge traversal False
- Group File and Printer Sharing
- File and Printer Sharing (NB-Datagram-In) Inbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP XXXX] NetCrunch - Windows Firewall Rules
- This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
- Enabled True
- Program System
- Action Allow
- Security Require authentication
- Authorized computers
- Authorized users
- Protocol XX
- Local port XXXX
- Remote port Any
- ICMP settings Any
- Local scope Any
- Remote scope Any
- Profile All
- Network interface type All
- Service All programs and services
- Allow edge traversal False
- Group File and Printer Sharing
- File and Printer Sharing (NB-Session-In) Inbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP XXXX] NetCrunch - Windows Firewall Rules
- This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
- Enabled True
- Program System
- Action Allow
- Security Require authentication
- Authorized computers
- Authorized users
- Protocol XX
- Local port XXXX
- Remote port Any
- ICMP settings Any
- Local scope Any
- Remote scope Any
- Profile All
- Network interface type All
- Service All programs and services
- Allow edge traversal False
- Group File and Printer Sharing
- File and Printer Sharing (NB-Name-In) Inbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP XXXX] NetCrunch - Windows Firewall Rules
- This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
- Enabled True
- Program System
- Action Allow
- Security Require authentication
- Authorized computers
- Authorized users
- Protocol XX
- Local port XXXX
- Remote port Any
- ICMP settings Any
- Local scope Any
- Remote scope Any
- Profile All
- Network interface type All
- Service All programs and services
- Allow edge traversal False
- Group File and Printer Sharing
- File and Printer Sharing (Echo Request - ICMPv6-In) Echo Request messages are sent as ping requests to other nodes. NetCrunch - Windows Firewall Rules
- This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
- Enabled True
- Program Any
- Action Allow
- Security Require authentication
- Authorized computers
- Authorized users
- Protocol XX
- Local port Any
- Remote port Any
- ICMP settings type XXXX:code any
- Local scope Any
- Remote scope Any
- Profile All
- Network interface type All
- Service All programs and services
- Allow edge traversal False
- Group File and Printer Sharing
- File and Printer Sharing (Spooler Service - RPC-EPMAP) Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Spooler Service. NetCrunch - Windows Firewall Rules
- This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
- Enabled True
- Program Any
- Action Allow
- Security Require authentication
- Authorized computers
- Authorized users
- Protocol XX
- Local port RPC endpoint mapping
- Remote port Any
- ICMP settings Any
- Local scope Any
- Remote scope Any
- Profile All
- Network interface type All
- Service Rpcss
- Allow edge traversal False
- Group File and Printer Sharing
- File and Printer Sharing (SMB-In) Inbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP XXXX] NetCrunch - Windows Firewall Rules
- This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
- Enabled True
- Program System
- Action Allow
- Security Require authentication
- Authorized computers
- Authorized users
- Protocol XX
- Local port XXXX
- Remote port Any
- ICMP settings Any
- Local scope Any
- Remote scope Any
- Profile All
- Network interface type All
- Service All programs and services
- Allow edge traversal False
- Group File and Printer Sharing
- File and Printer Sharing (Echo Request - ICMPv4-In) Echo Request messages are sent as ping requests to other nodes. NetCrunch - Windows Firewall Rules
- This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
- Enabled True
- Program Any
- Action Allow
- Security Require authentication
- Authorized computers
- Authorized users
- Protocol XX
- Local port Any
- Remote port Any
- ICMP settings type 8:code any
- Local scope Any
- Remote scope Any
- Profile All
- Network interface type All
- Service All programs and services
- Allow edge traversal False
- Group File and Printer Sharing
- File and Printer Sharing (Spooler Service - RPC) Inbound rule for File and Printer Sharing to allow the Print Spooler Service to communicate via TCP/RPC. NetCrunch - Windows Firewall Rules
- This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
- Enabled True
- Program %SystemRoot%\system32\spoolsv.exe
- Action Allow
- Security Require authentication
- Authorized computers
- Authorized users
- Protocol XX
- Local port Dynamic RPC
- Remote port Any
- ICMP settings Any
- Local scope Any
- Remote scope Any
- Profile All
- Network interface type All
- Service Spooler
- Allow edge traversal False
- Group File and Printer Sharing
- Remote Scheduled Tasks Management (RPC) Inbound rule for the Task Scheduler service to be remotely managed via RPC/TCP. NetCrunch - Windows Firewall Rules
- This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
- Enabled True
- Program %SystemRoot%\system32\svchost.exe
- Action Allow
- Security Require authentication
- Authorized computers
- Authorized users
- Protocol XX
- Local port Dynamic RPC
- Remote port Any
- ICMP settings Any
- Local scope Any
- Remote scope Any
- Profile All
- Network interface type All
- Service schedule
- Allow edge traversal False
- Group Remote Scheduled Tasks Management
- Remote Scheduled Tasks Management (RPC-EPMAP) Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Task Scheduler service. NetCrunch - Windows Firewall Rules
- This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
- Enabled True
- Program %SystemRoot%\system32\svchost.exe
- Action Allow
- Security Require authentication
- Authorized computers
- Authorized users
- Protocol XX
- Local port RPC endpoint mapping
- Remote port Any
- ICMP settings Any
- Local scope Any
- Remote scope Any
- Profile All
- Network interface type All
- Service RPCSS
- Allow edge traversal False
- Group Remote Scheduled Tasks Management
- Windows Management Instrumentation (WMI-In) Inbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP] NetCrunch - Windows Firewall Rules
- This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
- Enabled True
- Program %SystemRoot%\system32\svchost.exe
- Action Allow
- Security Require authentication
- Authorized computers
- Authorized users
- Protocol XX
- Local port Any
- Remote port Any
- ICMP settings Any
- Local scope Any
- Remote scope Any
- Profile All
- Network interface type All
- Service winmgmt
- Allow edge traversal False
- Group Windows Management Instrumentation (WMI)
- Outbound Ruleshide
- Name Description Winning GPO
- WSUS Server Connection WSUS Policy - Servers
- This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
- Enabled True
- Program Any
- Action Allow
- Security Require authentication
- Authorized computers
- Protocol XX
- Local port Any
- Remote port XXXX
- ICMP settings Any
- Local scope Any
- Remote scope Any
- Profile Domain
- Network interface type All
- Service All programs and services
- Group
- Connection Security Settingshide
- Administrative Templateshide
- Policy definitions (ADMX files) retrieved from the local computer.
- Windows Components/Windows Updatehide
- Policy Setting Winning GPO
- Allow Automatic Updates immediate installation Enabled WSUS Policy - Servers
- Configure Automatic Updates Enabled WSUS Policy - Servers
- Configure automatic updating: 3 - Auto download and notify for install
- The following settings are only required and applicable if 4 is selected.
- Install during automatic maintenance Disabled
- Scheduled install day: 0 - Every day
- Scheduled install time: 12:00
- Install updates for other Microsoft products Enabled
- Policy Setting Winning GPO
- Enable client-side targeting Enabled WSUS Policy - Servers
- Target group name for this computer Servers
- Policy Setting Winning GPO
- Specify intranet Microsoft update service location Enabled WSUS Policy - Servers
- Set the intranet update service for detecting updates: XXXX
- Set the intranet statistics server: XXXX
- Set the alternate download server:
- (example: http://IntranetUpd01)
- Download files with no Url in the metadata if alternate download server is set. Disabled
- Policy Setting Winning GPO
- Turn off auto-restart for updates during active hours Enabled WSUS Policy - Servers
- Active Hours
- Start: 6 AM
- End: 6 PM
- Policy Setting Winning GPO
- Turn on recommended updates via Automatic Updates Enabled WSUS Policy - Servers
- Group Policy Objectshide
- Applied GPOshide
- Default Domain Policy [{31B2F340-016D-11D2-945F-00C04FB984F9}]hide
- Link Location XXXXXX.local
- Extensions Configured {B1BE8D72-6EAC-11D2-A4EA-00C04F79F83A}
- Security
- Registry
- Enforced No
- Disabled None
- Security Filters XXXXXX\Domain Admins
- NT AUTHORITY\Authenticated Users
- Revision AD (36), SYSVOL (36)
- WMI Filter
- NetCrunch - Enable Remote Registry & RPC [{3D009066-FB45-420A-A263-04196C70A3EC}]hide
- Link Location XXXXXX.local
- Extensions Configured Security
- Enforced No
- Disabled None
- Security Filters NT AUTHORITY\Authenticated Users
- Revision AD (5), SYSVOL (5)
- WMI Filter
- NetCrunch - Windows Firewall Rules [{70BFCE9E-CA9C-4758-AC3D-5A9CF3410757}]hide
- Link Location XXXXXX.local
- Extensions Configured Registry
- Enforced No
- Disabled None
- Security Filters NT AUTHORITY\Authenticated Users
- Revision AD (12), SYSVOL (12)
- WMI Filter
- NetCrunch - Windows Services [{2E5C4AF7-84B3-4A93-8F24-D9A58C504166}]hide
- Link Location XXXXXX.local
- Extensions Configured Security
- Enforced No
- Disabled None
- Security Filters NT AUTHORITY\Authenticated Users
- Revision AD (2), SYSVOL (2)
- WMI Filter
- UninstallFreshServiceAgent [{8FBD40EC-0432-4457-BF15-E071A0CC03EF}]hide
- Link Location XXXXXX.local
- Extensions Configured Scripts
- Enforced No
- Disabled None
- Security Filters NT AUTHORITY\Authenticated Users
- Revision AD (2), SYSVOL (2)
- WMI Filter
- WSUS Policy - Servers [{580CC063-9E1D-4CFF-9733-D05834AD4FB4}]hide
- Link Location XXXXXX.local/Computer/Servers
- Extensions Configured Registry
- Enforced No
- Disabled None
- Security Filters NT AUTHORITY\Authenticated Users
- Revision AD (35), SYSVOL (35)
- WMI Filter
- Denied GPOshide
- Local Group Policy [LocalGPO]hide
- Link Location Local
- Extensions Configured
- Enforced No
- Disabled None
- Security Filters
- Revision AD (0), SYSVOL (0)
- WMI Filter
- Reason Denied Empty
- WMI Filtershide
- Name Value Reference GPO(s)
- None
- User Detailshide
- Generalhide
- User name XXXXXX
- Domain XXXXXX.local
- Organizational Unit XXXXXX.local/Accounts/Technology/IT Accounts
- Security Group Membership
- show
- Component Statushide
- Component Name Status Time Taken Last Process Time Event Log
- Group Policy Infrastructure Success 742 Millisecond(s) 1/17/2019 7:17:08 AM View Log
- Settingshide
- No settings defined.
- Group Policy Objectshide
- Applied GPOshide
- Denied GPOshide
- Local Group Policy [LocalGPO]hide
- Link Location Local
- Extensions Configured
- Enforced No
- Disabled None
- Security Filters
- Revision AD (0), SYSVOL (0)
- WMI Filter
- Reason Denied Empty
- WMI Filtershide
- Name Value Reference GPO(s)
- None
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement