Group Policy
Applies To: Windows Server 2008
What does Group Policy do?
Group Policy provides an infrastructure for centralized configuration management of the operating system and applications that run on the operating system.
Who will be interested in this feature?
Group Policy is designed to benefit the following types of IT professionals:
IT professionals who need to manage users and computers in a domain environment
Dedicated Group Policy administrators
IT generalists
Support personnel
What new functionality does this feature provide?
Expanding on the foundation established in previous versions of the operating system, Group Policy in Windows Server® 2008 includes new features:
New categories of policy management
New format and functionality of Administrative template files (ADMX)
Starter Group Policy objects
Comments for GPOs and policy settings
Network Location Awareness
Preferences
Additionally, Windows Server 2008 provides enhancements to Group Policy:
Group Policy service
Events and logging
Multiple local Group Policy objects
Finding specific Administrative template policy settings
Finally, see:
Which policy settings are added or changed?
Are there any special considerations?
Group Policy is included in domain-based versions of Windows Server 2008. Although Group Policy is distributed with the operating system, you must install it as a feature through Server Manager.
Do I need to change any existing code?
If you have created custom Administrative templates specific to your environment using the ADM format, you can continue to use them in Windows Server 2008 without changing them to the ADMX format. However, you must change custom Administrative templates to the ADMX format if you want to use the multilanguage features.
If you have developed components to work with the Local Group Policy Editor or the Group Policy Management Console (GPMC), you might need to modify the components to work with new features in Windows Server 2008. For more information, see the Group Policy Software Development Kit (https://go.microsoft.com/fwlink/?LinkId=144).
How do I prepare to deploy this feature?
For information about deploying Group Policy, see the Group Policy TechCenter (https://go.microsoft.com/fwlink/?linkid=31191).
What new functionality does this feature provide?
Windows Server 2008 includes new categories of policy management, a new format for Administrative template files (ADMX) with increased functionality, Starter Group Policy objects, comments for GPOs and policy settings, Network Location Awareness, and preferences.
New categories of policy management
Group Policy in Windows Server 2008 provides new ways to manage your organization. The examples in this section demonstrate how you can use policy settings introduced in Windows Server 2008 to manage your resources in an enterprise.
Why are new categories of policy management important?
The new categories of policy management provide cost savings through power options, the ability to block device installation, improved security settings, expanded Internet Explorer settings management, the ability to assign printers based on location, and the ability to delegate printer driver installation to users.
Cost savings through power options
In Windows Server 2008, all power options have been Group Policy enabled, providing a potentially significant cost savings. Controlling power options through Group Policy could save organizations a significant amount of money. You can modify specific power options through individual Group Policy settings or build a custom power plan that is deployable by using Group Policy.
Ability to block device installation
In Windows Server 2008, you can centrally restrict devices from being installed on computers in your organization. You will now be able to create policy settings to control access to devices such as USB drives, CD-RW drives, DVD-RW drives, and other removable media.
Improved security settings
In Windows Server 2008, the firewall and IPsec Group Policy settings are combined to allow you to leverage the advantages of both technologies, while eliminating the need to create and maintain duplicate functionality. Some scenarios supported by these combined firewall and IPsec policy settings are secure server-to-server communications over the Internet, limiting access to domain resources based on trust relationships or health of a computer, and protecting data communication to a specific server to meet regulatory requirements for data privacy and security.
Expanded Internet Explorer settings management
In Windows Server 2008, you can open and edit Internet Explorer Group Policy settings without the risk of inadvertently altering the state of the policy setting based on the configuration of the administrative workstation. This change replaces earlier behavior in which some Internet Explorer policy settings would change based on the policy settings enabled on the administrative workstation used to view the settings.
Printer assignment based on location
The ability to assign printers based on location in the organization or a geographic location is a new feature in Windows Server 2008. In Windows Server 2008, you can assign printers based on site location. When mobile users move to a different location, Group Policy can update their printers for the new location. Mobile users returning to their primary locations see their usual default printers.
Printer driver installation delegated to users
In Windows Server 2008, administrators can now delegate to users the ability to install printer drivers by using Group Policy. This feature helps to maintain security by limiting distribution of administrative credentials.
What works differently?
In Windows Server 2008, there are changes to deploying power options, blocking device installation, security settings, Internet Explorer settings management, and printer settings management.
Deploying power options
For details, edit a Group Policy object (GPO) in the Group Policy Management Console (GPMC), and see the power options settings located under:
Computer Configuration
└ Administrative Templates
└ System
└ Power Management
Blocking device installation
For details, edit a GPO in the GPMC, and see the device installation settings located under:
Computer Configuration
└ Administrative Templates
└ System
└ Device Installation
Security settings
For details, edit a GPO in the GPMC, and see the security protection settings located under:
Computer Configuration
└ Windows Settings
└ Security Settings
└ Windows Firewall with Advance Security
Internet Explorer settings management
For details, edit a GPO in the GPMC, and see the policy settings for Internet Explorer located under:
Computer Configuration
└ Administrative Templates
└ Windows Components
└ Internet Explorer
User Configuration
└ Administrative Templates
└ Windows Components
└ Internet Explorer
Assigning printers based on location
For details, edit a GPO in the GPMC, and see the deployed printer connections policy settings located under:
Computer Configuration
└ Windows Settings
└ Deployed Printers
User Configuration
└ Windows Settings
└ Deployed Printers
Note
Group Policy will not automatically refresh the printer policy settings when a computer moves to a new site location. New printer assignments will be available after a Group Policy refresh following the site location change.
Delegating printer driver installation to users
For details, edit a GPO in the GPMC, and see the "Allow non-administrators to install drivers for these device classes" policy setting located under:
Computer Configuration
└ Administrative Templates
└ System
└ Driver Installation
New format and functionality of Administrative template files (ADMX)
Administrative template files contain markup language that is used to describe registry-based Group Policy. First released in the Microsoft® Windows NT Server® 4.0 operating system, Administrative template files used a unique file format known as ADM files. In Windows Server 2008, these files are replaced by an XML-based file format known as ADMX files. These new Administrative template files make it easier to manage registry-based policy settings in Windows Vista and Windows Server 2008.
Why is the new format and functionality of Administrative template files important?
The new format includes multilanguage support, an optional centralized datastore, and version control capabilities. In Windows Server 2008, ADMX files are divided into language-neutral and language-specific resources, available to all Group Policy administrators. These factors allow Group Policy tools to adjust their user interface according to the administrator's configured language. Adding a new language to a set of policy definitions is achieved by ensuring that the language-specific resource file is available.
For example, a Group Policy administrator creates a Group Policy object (GPO) from a Windows Server 2008 administrative workstation configured for English. He saves the GPO and links it to the domain deployed across geographic boundaries. A colleague in Paris browses the same domain using GPMC and selects the GPO created in English. She can view and edit the policy settings in French. The original Group Policy administrator who created this GPO will still see all the settings in his native language of English, including the changes from the French administrator.
This table summarizes the new features of ADMX files.
Feature | Description | Benefit |
---|---|---|
XML-based policy definition files |
Administrative template files are replaced by an XML-based file format that incorporates multilanguage support and strong versioning. |
|
Central store of ADMX files |
The central store is a domain-wide directory created in the Sysvol. |
Reduces the need for additional storage and greater replication traffic resulting from increasing numbers of GPOs |
Group Policy administrative tools read both ADMX and ADM files |
Group Policy administrative tools use the core operating system ADMX files from the local computer before the creation of the central store. In addition, the administrative tools can read any other ADM file stored locally or in a GPO. This ensures interoperability between administration from a Windows Vista or Windows Server 2008 and Windows 2000 or Windows Server 2003 platforms. Any policy settings that exist only in the ADMX files will be available only from the Windows Vista or Windows Server 2008. |
Ensures interoperability with earlier platforms for administering Group Policy |
How should I prepare for this change?
You can convert existing ADM files to the ADMX format using the ADMX Migrator Tool (https://go.microsoft.com/fwlink?LinkID=77409). You can also use this tool to edit ADMX files.
Starter Group Policy objects
Group Policy in Windows Server 2008 provides the ability to create Starter Group Policy objects. Using a Starter GPO, you can store a collection of Administrative template policy settings in a single object and incorporate those policy settings into new GPOs.
Why are Starter GPOs important?
You can import and export Starter GPOs, so you can distribute them to other environments. When you create a new GPO from a Starter GPO, the new GPO includes all of the Administrative template policy settings and their values defined in the Starter GPO.
What works differently?
Rather than recreate a configuration of common Administrative template policy settings in each new GPO, you can create a Starter GPO using the GPMC, configure Administrative template policy settings that you want to use in multiple GPOs, and then create GPOs from that Starter GPO. Any comments included in a Starter GPO are automatically included in GPOs created from that Starter GPO.
To use the Starter GPO in another environment, you export it by saving it as a cabinet file. After transferring it to the other environment, you import it by loading the cabinet file.
Comments for GPOs and policy settings
Group Policy in Windows Server 2008 provides the option to add comments at the GPO level and at the policy setting level for Administrative templates.
Why are comments important?
To support an enterprise organization, you may create many GPOs and configure complex combinations of policy settings. You can use comments to document the purpose of a GPO and the configuration of a particular policy setting.
What works differently?
The Comment tab is displayed when you edit a GPO and view the properties of the GPO or an Administrative template policy setting.
Network Location Awareness
Network Location Awareness allows Group Policy to respond better to changing network conditions. One benefit of the Network Location Awareness feature is the end of the reliance on the ICMP protocol (PING) for policy application.
Network Location Awareness ensures that client computers are both aware of and responsive to changing network conditions and resource availability. With Network Location Awareness, Group Policy has access to resource detection and event notification capabilities in the operating system, such as recovery from hibernation or standby, establishment of VPN sessions, and moving in or out of a wireless network.
Why is Network Location Awareness important?
Network Location Awareness provides these benefits:
Startup times for the workstation or server will improve. Network Location Awareness provides an accurate indicator to Group Policy of when the network is ready. Group Policy will also be able to determine if the adapter is disabled or disconnected, enabling Group Policy to shorten its wait time for those scenarios in which the network will not be available.
The Group Policy client will apply policy settings whenever domain controller availability returns. Examples of connection events that trigger Group Policy processing include establishing VPN sessions, recovering from hibernation or standby, and the docking of a laptop. This benefit can potentially increase the level of security on the workstation by more quickly applying Group Policy changes.
The Group Policy client will use Network Location Awareness for bandwidth determination and removing the reliance on the ICMP protocol (PING). This benefit allows organizations to secure their networks with firewalls, filter the ICMP protocol, and apply Group Policy.
New Group Policy settings provide administrators with more control over computer boot processing scenarios.
What works differently?
The following scenarios show how network location awareness can improve policy application and processing.
Connecting over Virtual Private Networks (VPN)
Network Location Awareness allows you to make changes to policy settings and ensure that they are applied efficiently to mobile users.
When mobile users connect to the corporate network, the Group Policy client will detect the availability of a domain controller. If the Group Policy refresh cycle has elapsed or the previous policy application has failed, Group Policy will initiate a background refresh over the VPN connection, updating both the computer and user policy. There is no need to reboot or log off before connecting to the corporate network over a VPN.
Ability to process Group Policy through a firewall filtering ICMP
Group Policy processes even if you have removed the ability for computers to respond to the ICMP protocol (PING). In the past, Group Policy settings would fail in this situation because slow link detection relied on ICMP. The Group Policy client in Windows Server 2008 now utilizes Network Location Awareness to determine the network bandwidth and successfully continues to process Group Policy.
Preferences
Preferences provide more than twenty Group Policy extensions that expand the range of configurable preference settings within a Group Policy object. Group Policy preferences allow you to manage drive mappings, registry settings, local users and groups, services, files, and folders without the need to learn a scripting language.
Why are preferences important?
You can use preference items to reduce scripting and system imaging, standardize management, and better secure your networks. Using preference targeting, you can streamline desktop management by reducing the number of Group Policy objects needed.
What works differently?
Domain-based Group Policy for Windows Server 2008 includes a Preferences node under the Computer Configuration and User Configuration nodes. The user interface for most preference items is similar to the Windows settings and Control Panel settings they configure, making configuration intuitive for Group Policy administrators.
Unlike policy settings, preference items do not exist until a Group Policy administrator creates them, and each preference item contains multiple properties. You can create and modify multiple preference items within each GPO, and you can filter each preference item to target only specific computers or users.
Preference Extension | Effect of Preference Item | Scope of Preference Item |
---|---|---|
Applications |
Configures settings for a specific version of an application |
Users to whom the preference item applies |
Data Sources |
Configures an ODBC system or other user data source |
Computers or users to whom the preference item applies |
Devices |
Enables or disables a class or type of hardware device |
Computers or users to whom the preference item applies |
Drive Maps |
Creates, configures, or deletes dynamic drive mapping |
Users to whom the preference item applies |
Environment |
Creates, modifies, or deletes a persistent user or system environment variable |
Computers or users to whom the preference item applies |
Files |
Copies or replaces files and configures their attributes, or deletes files |
Computers or users to whom the preference item applies |
Folder Options |
Modifies Folder Options in Windows Explorer, associates a file name extension with a particular program, or associates a file name extension with a particular class of files |
Computers (File Type items only) or users (Folder Options and Open With items only) to whom the preference item applies |
Folders |
Creates folders and configures their attributes, or deletes folders and their contents |
Computers or users to whom the preference item applies |
Ini Files |
Creates or changes a property/value pair in an .ini or .inf file, or deletes part or all of an .ini or .inf file |
Computers or users to whom the preference item applies |
Internet Settings |
Modifies Internet settings |
Computers or users to whom the preference item applies |
Local Users and Groups |
Creates, modifies or deletes local users (performing tasks such as setting passwords) or local security groups (performing tasks such as creating restricted groups and modifying the list of members). |
Computers or users to whom the preference item applies |
Network Options |
Creates, modifies, or deletes a virtual private network (VPN) or dial-up network connection |
Computers or users to whom the preference item applies |
Network Shares |
Creates, modifies, or deletes a share. Can configure Access-Based Enumeration |
Computers to which the preference item applies |
Power Options |
Configures power options, either modifying power options or creating, modifying, or deleting a power scheme |
Computers or users to whom the preference item applies |
Printers |
Creates, modifies, or deletes a local, shared, or TCP/IP printer connection |
Computers (local or TCP/IP printers only) or users to whom the preference item applies |
Regional Options |
Configures how most programs format numbers, currencies, dates, and times for end users |
Users to whom the preference item applies |
Registry |
Creates, modifies, or deletes a setting in the Windows registry |
Computers or users to whom the preference item applies |
Scheduled Tasks |
Creates, modifies, or deletes a scheduled task or an immediate task in the Control Panel |
Computers or users to whom the preference item applies |
Services |
Modifies an operating system service |
Computers to which the preference item applies |
Shortcuts |
Creates, modifies, or deletes a shortcut to a file system object (such as a file, folder, drive, share, or computer), a shell object (such as a printer, Desktop item, or Control Panel item), or a URL (such as a Web page or an FTP site) |
Computers or users to whom the preference item applies |
Start Menu |
Modifies the look and feel of the Start menu |
Users to whom the preference item applies |
You can use item-level targeting to change the scope of individual preference items, so they apply only to selected users or computers. Within a single GPO, you can include multiple preference items, each customized for selected users or computers and each targeted to apply settings only to the relevant users or computers. You can apply the following targeting items to preference items:
Battery Present
Computer Name
CPU Speed
Date Match
Dial-Up Connection
Disk Space
Domain
Environment Variable
File Match
IP Address Range
Language
LDAP Query
MAC Address Range
MSI Query
Operating System
Organizational Unit
PCMCIA Present
Portable Computer
Processing Mode
RAM
Registry Match
Security Group
Site
Terminal Session
Time Range
User
WMI Query
Additionally, you can apply multiple targeting items to a preference item and select the logical operation (AND or OR) by which to combine each targeting item with the preceding one. Using targeting collections, you can also create parenthetical expressions.
What existing functionality is changing?
Windows Server 2008 includes improvements to the GPMC, Group Policy service, events and logging, multiple local Group Policy objects, and more options for finding Administrative template policy settings.
Group Policy service
The Group Policy infrastructure is improved with complete isolation from Winlogon, delivering a new architecture for how Group Policy performs notification and processing.
Why is this change important?
The new Group Policy service provides better reliability for Windows and Group Policy, and includes these additional benefits:
Microsoft can deliver new Group Policy files, which can be updated without requiring a restart of the operating system.
The application of policy is more efficient because of the reduction of resources used for background processing.
A performance increase and a reduction in memory usage are results of the new design. These changes eliminate the need to load Group Policy functionality in multiple services.
Events and logging
The Group Policy infrastructure has changed significantly in Windows Server 2008. Group Policy processing no longer exists within the Winlogon process but is hosted as its own service. Additionally, the Group Policy engine no longer relies on the trace logging found in userenv.dll.
Why is this change important?
Much of the troubleshooting for Group Policy in earlier versions of Windows relied on logging being enabled inside the component userenv.dll. This created a log file named userenv.log in the %WINDIR%\Debug\Usermode folder. This log file contained function trace statements with supporting data. In addition, profile load and unload functions shared this log file, making the log sometimes difficult to diagnose. This log file, used in conjunction with the Resultant Set of Policy Microsoft Management Console (RSoP MMC) was the primary way to diagnose and resolve Group Policy problems.
In Windows Server 2008, Group Policy is treated as its own component with a new Group Policy Service, a stand-alone service that runs under the Svchost process for the purpose of reading and applying Group Policy. The new service includes changes with event reporting. Group Policy event messages, previously appearing in the application log, now appear in the system log. The event viewer lists these new messages with an event source of Microsoft-Windows-GroupPolicy. The Group Policy Operational log replaces previous userenv logging. The operational event log provides improved event messages specific to Group Policy processing.
Multiple local Group Policy objects
Windows Server 2008 introduces greater flexibility in administering local Group Policy objects (LGPOs), providing the means to manage multiple LGPOs on a single computer. This increased flexibility eases managing environments that involve shared computing on a single computer, such as libraries or computer labs. In addition, in a workgroup each computer maintains its own policy settings. Multiple LGPOs may be assigned to local users or built-in groups. This feature will work with domain-based Group Policy or can be disabled through a Group Policy setting.
Why is this change important?
Multiple Local Group Policy gives you the flexibility to manage Group Policy based on built-in groups. For example, if you wanted to set up kiosk computers in a library, you could create tightly managed policy settings for built-in User groups and lightly managed policy settings for the built-in Administrator accounts. This approach allows patrons to use the Internet kiosk in a secure environment. Local administrators no longer have to explicitly disable or remove Group Policy settings that interfere with their ability to manage the workstation before performing administrative tasks. In addition, Windows Server 2008 administrators can turn off local Group Policy settings without having to explicitly enable domain-based Group Policy.
Finding specific Administrative template policy settings
Administrative templates are registry-based policy settings listed under the Administrative Templates node of both the Computer Configuration and User Configuration nodes when you edit a GPO in the GPMC. Windows Server 2008 provides a comprehensive list of Administrative template policy settings and new options for filtering and sorting the list of settings.
Why is this change important?
Windows Server 2008 provides many Administrative template policy settings. Filtering or sorting these settings can enable you to find a specific policy setting more quickly.
What works differently?
In Windows Server 2008, an All Settings node is displayed under the Administrative Templates node, providing a comprehensive list of all Administrative template policy settings, including both those in ADMX and ADM formats. You can sort this list alphabetically by setting name, state, comment, or path.
Additionally, you can filter the list of Administrative template settings using the options available when you right-click the All Settings node. When filtered, the list includes only policy settings in the ADMX format, and you can further restrict the list to include only policy settings:
That have been configured (or that have not been configured).
To which comments have been added (or to which comments have not been added).
That include specified keywords in the setting title, Explain text, or comments.
That are managed (or unmanaged).
Which policy settings are added or changed?
In Windows Server 2008, you can use Group Policy to centrally manage a greater number of features and component behaviors. The number of Group Policy settings has increased from approximately 1,700 in Windows Server 2003 with Service Pack 1 (SP1) to approximately 2,400 in Windows Server 2008.
This table summarizes new or expanded categories of Group Policy settings.
Group Policy Category | Description | Location of Group Policy Setting |
---|---|---|
Antivirus |
Manages behavior for evaluating high-risk attachments. |
User Configuration └ Administrative Templates └ Windows Components └ Attachment Manager |
Background Intelligent Transfer Service (BITS) |
Configures the BITS Neighbor Casting feature (new in Windows Vista and Windows Server 2008) to facilitate peer-to-peer file transfer within a domain. |
Computer Configuration └ Administrative Templates └ Network └ Background Intelligent Transfer Service |
Client Help |
Determines where your users access Help systems that may include untrusted content. You can direct your users to Help or to local offline Help. |
Computer Configuration └ Administrative Templates └ Online Assistance User Configuration └ Administrative Templates └ Online Assistance |
Deployed Printer Connections |
Deploys a printer connection to a computer. This is useful when the computer is shared in a locked-down environment, such as a school or when a user roams to a different location and needs to have a printer connected automatically. |
Computer Configuration └ Windows Settings └ Deployed Printers User Configuration └ Windows Settings └ Deployed Printers |
Device Installation |
Allows or denies a device installation, based upon the device class or ID. |
Computer Configuration └ Administrative Templates └ System └ Device Installation |
Disk Failure Diagnostic |
Controls the level of information displayed by the disk failure diagnostic. |
Computer Configuration └ Administrative Templates └ System └ Troubleshooting and Diagnostics └ Disk Diagnostic |
DVD Video Burning |
Customizes the video disc authoring experience. |
Computer Configuration └ Administrative Templates └ Windows Components └ Import Video User Configuration └ Administrative Templates └ Windows Components └ Import Video |
Enterprise Quality of Service (QoS) |
Alleviates network congestion issues by enabling central management of Windows Server 2008 network traffic. Without requiring changes to applications, you can define flexible policies to prioritize the Differentiated Services Code Point (DSCP) marking and throttle rate. |
Computer Configuration └ Windows Settings └ Policy-based QoS |
Hybrid Hard Disk |
Configures the hybrid hard disk (with non-volatile cache) properties, allowing you to manage:
|
Computer Configuration └ Administrative Templates └ System └ Disk NV Cache |
Internet Explorer 7 |
Replaces and expands the current settings in the Internet Explorer Maintenance extension to allow administrators the ability to read the current settings without affecting values. |
Computer Configuration └ Administrative Templates └ Windows Components └ Internet Explorer User Configuration └ Administrative Templates └ Windows Components └ Internet Explorer |
Networking: Quarantine |
Manages three components:
|
Computer Configuration └ Windows Settings └ Security Settings └ Network Access Protection |
Networking: Wired Wireless |
Applies a generic architecture for centrally managing existing and future media types. |
Computer Configuration └ Windows Settings └ Security Settings └ Wired Network (IEEE 802.11) Policies Computer Configuration └ Windows Settings └ Security Settings └ Wireless Network (IEEE 802.11) Policies |
Power Options |
Configures any power options in the Control Panel. |
Computer Configuration └ Administrative Templates └ System └ Power Management |
Removable Storage |
Allows administrators to protect corporate data by limiting the data that can be read from and written to removable storage devices. Administrators can enforce restrictions on specific computers or users without relying on third party products or disabling the buses. |
Computer Configuration └ Administrative Templates └ System └ Removable Storage Access User Configuration └ Administrative Templates └ System └ Removable Storage Access |
Security Protection |
Combines the management of both the Windows Firewall and IPsec technologies to reduce the possibility of creating conflicting rules. Administrators can specify which applications or ports to open and whether or not connections to those resources must be secure. |
Computer Configuration └ Windows Settings └ Security Settings └ Windows Firewall with Advanced Security |
Shell Application Management |
Manages access to the toolbar, taskbar, Start menu, and icon displays. |
User Configuration └ Administrative Templates └ Start Menu and Taskbar |
Shell First Experience, Logon, and Privileges |
Configures the logon experience to include expanded Group Policy settings in:
|
User Configuration └ Administrative Templates └ Windows Components |
Shell Sharing, Sync, and Roaming |
Customizes:
|
User Configuration └ Administrative Templates └ Windows Components |
Shell Visuals |
Configures the desktop display to include:
|
User Configuration └ Administrative Templates └ Windows Components |
Tablet PC |
Configures Tablet PC to include:
|
Computer Configuration └ Administrative Templates └ Windows Components └ Tablet PC User Configuration └ Administrative Templates └ Windows Components └ Tablet PC |
Terminal Services |
Configures the following features to enhance the security, ease-of-use, and manageability of Terminal Services remote connections. You can:
|
Computer Configuration └ Administrative Templates └ Windows Components └ Terminal Services User Configuration └ Administrative Templates └ Windows Components └ Terminal Services |
Troubleshooting and Diagnostics |
Controls the diagnostic level from automatically detecting and fixing problems to indicating to the user that assisted resolution is available for:
|
Computer Configuration └ Administrative Templates └ System └ Troubleshooting and Diagnostics |
User Account Protection |
Configures the properties of user accounts to:
|
Computer Configuration └ Windows Settings └ Security Settings └ Local Policies └ Security Options |
Windows Error Reporting |
Disables Windows Feedback only for Windows or for all components. By default, Windows Feedback is turned on for all Windows components. |
Computer Configuration └ Administrative Templates └ Windows Components └ Windows Error Reporting User Configuration └ Administrative Templates └ Windows Components └ Windows Error Reporting |