| Default Domain Policy | |
| Data collected on: 4/4/2014 10:57:50 AM | |
Details
| Domain | netid.washington.edu |
| Owner | NETID\Domain Admins |
| Created | 6/13/2006 11:11:18 PM |
| Modified | 4/4/2014 10:57:30 AM |
| User Revisions | 4 (AD), 4 (SYSVOL) |
| Computer Revisions | 221 (AD), 221 (SYSVOL) |
| Unique ID | {31B2F340-016D-11D2-945F-00C04FB984F9} |
| GPO Status | Enabled |
Links
| Location | Enforced | Link Status | Path |
|---|---|---|---|
| netid | No | Enabled | netid.washington.edu |
| Exch 2010 | No | Enabled | netid.washington.edu/Delegated/uwit/Exchange/Exch 2010 |
This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
| Name |
|---|
| NT AUTHORITY\Authenticated Users |
Delegation
These groups and users have the specified permission for this GPO
| Name | Allowed Permissions | Inherited |
|---|---|---|
| NETID\Domain Admins | Edit settings, delete, modify security | No |
| NETID\Enterprise Admins | Edit settings, delete, modify security | No |
| NT AUTHORITY\Authenticated Users | Read (from Security Filtering) | No |
| NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS | Read | No |
| NT AUTHORITY\SYSTEM | Edit settings, delete, modify security | No |
Security Settings
Account Policies/Password Policy
| Policy | Setting |
|---|---|
| Enforce password history | 0 passwords remembered |
| Maximum password age | 0 days |
| Minimum password age | 0 days |
| Minimum password length | 1 characters |
| Password must meet complexity requirements | Disabled |
| Store passwords using reversible encryption | Disabled |
Account Policies/Kerberos Policy
| Policy | Setting |
|---|---|
| Enforce user logon restrictions | Enabled |
| Maximum lifetime for service ticket | 600 minutes |
| Maximum lifetime for user ticket | 10 hours |
| Maximum lifetime for user ticket renewal | 7 days |
| Maximum tolerance for computer clock synchronization | 5 minutes |
Local Policies/User Rights Assignment
| Policy | Setting |
|---|---|
| Add workstations to domain | NETID\u_windowsinfrastructure_computerjoiners |
Local Policies/Security Options
Accounts
| Policy | Setting |
|---|---|
| Accounts: Guest account status | Disabled |
| Accounts: Limit local account use of blank passwords to console logon only | Enabled |
Domain Member
| Policy | Setting |
|---|---|
| Domain member: Digitally encrypt secure channel data (when possible) | Enabled |
| Domain member: Digitally sign secure channel data (when possible) | Enabled |
Microsoft Network Client
| Policy | Setting |
|---|---|
| Microsoft network client: Digitally sign communications (if server agrees) | Enabled |
| Microsoft network client: Send unencrypted password to third-party SMB servers | Disabled |
Microsoft Network Server
| Policy | Setting |
|---|---|
| Microsoft network server: Digitally sign communications (if client agrees) | Enabled |
Network Access
| Policy | Setting |
|---|---|
| Network access: Allow anonymous SID/Name translation | Disabled |
| Network access: Do not allow anonymous enumeration of SAM accounts | Enabled |
| Network access: Do not allow anonymous enumeration of SAM accounts and shares | Enabled |
| Network access: Let Everyone permissions apply to anonymous users | Disabled |
Network Security
| Policy | Setting |
|---|---|
| Network security: Do not store LAN Manager hash value on next password change | Enabled |
| Network security: LAN Manager authentication level | Send NTLMv2 response only. Refuse LM & NTLM |
Other
| Policy | Setting |
|---|---|
| Network security: Allow Local System to use computer identity for NTLM | Enabled |
| Network security: Restrict NTLM: Audit Incoming NTLM Traffic | Enable auditing for all accounts |
| Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers | Audit all |
Public Key Policies/Encrypting File System
Certificates
| Issued To | Issued By | Expiration Date | Intended Purposes |
|---|---|---|---|
| administrator | administrator | 6/12/2009 11:15:54 PM | File Recovery |
For additional information about individual settings, launch the Local Group Policy Object Editor.
Public Key Policies/Trusted Root Certification Authorities
Certificates
| Issued To | Issued By | Expiration Date | Intended Purposes |
|---|---|---|---|
| AddTrust External CA Root | AddTrust External CA Root | 5/30/2020 3:48:38 AM | <All> |
| UW Services CA | UW Services CA | 9/3/2030 11:25:09 AM | <All> |
For additional information about individual settings, launch the Local Group Policy Object Editor.
Administrative Templates
Policy definitions (ADMX files) retrieved from the local computer.
System/Group Policy
| Policy | Setting | Comment |
|---|---|---|
| Allow cross-forest user policy and roaming user profiles | Enabled |
System/Kerberos
| Policy | Setting | Comment |
|---|---|---|
| Kerberos client support for claims, compound authentication and Kerberos armoring | Enabled |
System/Windows Time Service/Time Providers
| Policy | Setting | Comment |
|---|---|---|
| Enable Windows NTP Client | Enabled |
Administrative Templates
Policy definitions (ADMX files) retrieved from the local computer.
System/Ctrl+Alt+Del Options
| Policy | Setting | Comment |
|---|---|---|
| Remove Change Password | Enabled |
System/Power Management
| Policy | Setting | Comment |
|---|---|---|
| Prompt for password on resume from hibernate/suspend | Enabled |
