Group Policy Editor Guide: Access Options and How to Use

Group Policy Editor (gpedit) is an important part of the Active Directory system administrator’s toolkit. Read this blog for more details about gpedit.
Michael Buckbee
4 minuto de leitura
Ultima atualização 1 de Março de 2022

The Group Policy Editor is a Windows administration tool that allows users to configure many important settings on their computers or networks. Administrators can configure password requirements, startup programs, and define what applications or settings users can change.

These settings are called Group Policy Objects (GPOs). Attackers use GPO’s to turn off Windows Defender. System Administrators use GPOs to deal with locked out users.

Get the Free Pentesting Active
Directory Environments e-book

This blog will deal with the Windows 10 version of Group Policy Editor (also known as gpedit), but you can find it in Windows 7, 8, and Windows Server 2003 and later.

This piece will cover how to open and use Group Policy Editor, some important security settings in GPOs, and some alternatives to gpedit.

How To Access Group Policy Editor Windows 10: 5 Options

There are several ways to open Group Policy Editor. Choose your favorite!

Option 1: Open Local Group Policy Editor in Run

  • Open Search in the Toolbar and type Run, or select Run from your Start Menu.
  • Type ‘gpedit.msc’ in the Run command and click OK.

Option 2: Open Local Group Policy Editor in Search

  • Open Search on the Toolbar
  • Type ‘gpedit’ and click ‘Edit Group Policy.’

Option 3: Open Local Group Policy Editor in Command Prompt

  • From the Command Prompt, type ‘gpedit.msc’ and hit ‘Enter.’

Option 4: Open Local Group Policy Editor in PowerShell

Option 5: Open Local Group Policy Editor in Start Menu Control Panel

  • Open the Control Panel on the Start Menu.
  • Click the Windows icon on the Toolbar, and then click the widget icon for Settings.
  • Start typing ‘group policy’ or ‘gpedit’ and click the ‘Edit Group Policy’ option.

What Can You Do With Group Policy Editor

A better question would be, what can’t you do with Group Policy Editor! You can do anything from set a desktop wallpaper to disable services and remove Explorer from the default start menu. Group policies control what version of network protocols are available and enforce password rules. A corporate IT security team benefits significantly by setting up and maintaining a strict Group Policy. Here are a few examples of good IT security group policies:

  • Limit the applications users can install or access on their managed corporate devices.
  • Disable removable devices like USB drives or DVD drives.
  • Disable network protocols like TLS 1.0 to enforce usage of more secure protocols.
  • Limit the settings a user can change with the Control Panel. For example, let them change screen resolution but not the VPN settings.
  • Specify an excellent company-sanctioned wallpaper, and turn off the user’s ability to change it.
  • Keep users from accessing gpedit to change any of the above settings.

Those are just a few examples of how an IT security team could use Group Policies. If the goal is a more secure and hardened environment for your organization, use group policies to enforce good security habits.

Components of the Group Policy Editor

The Group Policy Editor window is a list view on the left and a contextual view on the right. When you click an item on the left side, it changes the focus of the right to show you details about that thing you clicked.

The top-level nodes on the left are “Computer Configuration” and “User Configuration.” If you open the tree for Computer Configuration, you can explore the options you have to manage different system behavior aspects.

For example, under Computer Configuration -> Administrative Templates -> Control Panel -> Personalization, you will see things like “Do not display the lock screen” on the right side.

gpedit personalization

You can edit the setting by double-clicking.

gpedit lock screen GPO

There are hundreds of different settings like this in Group Policy Editor. Click around or view the Microsoft documentation for a list of all of them.

Local Group Policy Editor Components

  • Computer Configuration: These policies apply to the local computer, and do not change per user.
  • User Configuration: These policies apply to users on the local machine, and will apply to any new users in the future, on this local computer.
  • Those two main categories are further broken down into sub-categories:
  • Software Settings: Software settings contain software specific group policies: this setting is empty by default.

How to Configure a Security Policy Setting Using the Local Group Policy Editor Console

Once you have an idea of what you GPOs you want to set, using Group Policy Editor to make the changes is pretty simple.

Let’s look at a quick password setting we can change:

  1. In gpedit, click Windows Settings, then Account Settings, then Password Policy.gpedit password policy
  2. Select the option for “Password must meet complexity requirements.”gpedit password complex
  3. Click “Enabled” and then “Apply,” and your change happens on this local computer. Applying changes to GPOs at the enterprise level is out of the scope of this blog.

How to use PowerShell to Administer Group Policies

Many sysadmins are moving to PowerShell instead of the UI to manage group policies. Here are a few of the PowerShell GroupPolicy cmdlets to get you started.

  • New-GPO: This cmdlet creates a new unassigned GPO. You can pass a name, owner, domain, and more parameters to the new GPO.
  • Get-GPOReport: This cmdlet returns all or the specified GPO(s) that exist in a domain in an XML or HTML file. Very useful for troubleshooting and documentation.
  • Get-GPResultantSetOfPolicy: This cmdlet returns the entire Resultant Set of Policy (RsoP) for a user or computer or both and creates an XML file with the results. This is a great cmdlet to research issues with GPOs. You might think that a policy is set to a certain value, but that policy could be overwritten by another GPO, and the only way to figure that out is to know the actual values applied to a user or computer.
  • Invoke-GPUpdate: This cmdlet allows you to refresh the GPOs on a computer, it’s the same as running gpupdate.exe. You can schedule the update to happen at a certain time on a remote computer with the cmdlet, which also means you can write a script to push out many refreshes if the need arises.

Limitations of Group Policy Editor

The gpedit application is very simplistic for a tool that is supposed to help secure your entire enterprise. GPO updates occur at some time interval on computers throughout the network differently or on a reboot. Therefore, the time between your changes and all computers on the network receiving this change is unknown.

Attackers can change local group policies using the same gpedit, or PowerShell, which can undo any protections you have enabled on that system.

Several companies provide alternative group policy editing tools, and you can learn how to make all the changes with PowerShell to make your job simpler. However, gpedit does not have any native auditing built-in, so you need to have a rock-solid change management plan and audit all GPO changes independently to ensure your enterprise remains secure.

It’s crucial to monitor Active Directory for any changes made to Group Policy – often, these changes are the first signals in APT attacks, where hackers intend to be in your network for a while, and they want to remain hidden. Varonis detects threats by monitoring and correlating current activity against normalized behavior and advanced data security threat models to detect APT attacks, malware infections, brute-force attacks, including attempts to change GPOs.

Check out this PowerShell course by Adam Bertram, where he teaches you how to use PowerShell to manage Active Directory. Once you learn the basics, you can start managing GPOs with PowerShell, and it’s worth 3 CPE credits!

O que devo fazer agora?

Listamos abaixo três recomendações para reduzir os riscos de dados na sua organização:

1

Agende uma demonstração conosco: Veja a usabilidade de Varonis em uma sessão personalizada com base nas necessidades de segurança de dados da sua organização. Responderemos a todas as suas perguntas.

2

Veja um exemplo do nosso Relatório de Risco de Dados: Conheça as ameaças que podem permanecer no seu ambiente. O Relatório da Varonis é gratuito e demonstra claramente como realizar a remediação automatizada.

3

Siga-nos no LinkedIn, YouTube e X (Twitter): Obtenha insights detalhados sobre todos os aspectos da segurança de dados, incluindo DSPM, detecção de ameaças, segurança de IA, entre outros.

Experimente Varonis gratuitamente.

Obtenha um relatório detalhado de risco de dados com base nos dados da sua empresa.
Implanta em minutos.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

como-descobrir-de-quais-grupos-do-active-directory-faço-parte?
Como descobrir de quais grupos do Active Directory faço parte?
A capacidade de administrar e manter listas de usuários e grupos atualizados é fundamental para a segurança de uma empresa. Existem várias maneiras de determinar a quais grupos...
compare-facilmente-as-permissões-de-usuário-do-salesforce
Compare facilmente as permissões de usuário do Salesforce
O DatAdvantage Cloud agora permite que os administradores comparem as permissões efetivas de dois usuários do Salesforce lado a lado com um único clique.
salesforce:-compare-as-permissões-de-usuário-facilmente
Salesforce: compare as permissões de usuário facilmente
A complexidade do Salesforce gera riscos e deixa administradores de rede com dores de cabeça. Com perfis, funções, conjuntos de permissões e grupos complexos, é extremamente difícil e demorado entender o que um usuário pode ou não fazer com a ferramenta de CRM líder de mercado. 
active-directory-users-and-computers-(aduc):-instalação-e-usos
Active Directory Users and Computers (ADUC): Instalação e usos
ADUC (Active Directory Users and Computers) é um MMC configurável usado para administrar o Active Directory. Leia este artigo para saber mais detalhes, casos de uso e advertências.