Category: Group Policy

How to Install Microsoft ADMX Group Policy Templates
article #1082, updated 39 days ago

When we install new group policy templates from Microsoft, e.g., the Windows 10 set by which we may upgrade existing networks, they now come in the newer ADMX format. Do this on every domain controller:

  1. The package is downloaded as a self-installing EXE which requires you to specify a folder. Do not try to manually unpack this, for some reason the contents are in small pieces which the installer assembles. Just run the EXE and give a useful path, e.g., C:\IT.
  2. Open an administrative CMD, and CD to the extraction point. Then CD into the folder “admx”, one level down.
  3. Run the following. If your language is not en-us, replace it in the last two lines. If your servers have multiple languages, you’ll need to replicate lines with multiple language specifications.
xcopy *.admx \\%userdnsdomain%\sysvol\%userdnsdomain%\Policies\PolicyDefinitions /Y /I
xcopy *.admx %SystemRoot%\PolicyDefinitions /Y /I
xcopy en-US\*.adml \\%userdnsdomain%\sysvol\%userdnsdomain%\Policies\PolicyDefinitions\en-us /Y /I
xcopy en-US\*.adml %SystemRoot%\PolicyDefinitions\en-us /Y /I

Another very common set needing this install, is the Office Administrative Templates.

Multiple versions of Office templates coexist nicely. But the same cannot be said for Windows OS templates. It appears that when a complete refresh of OS templates is required, good results obtain by removing all of the OS templates and then installing new.



When Group Policy doesn't work, or works wrong
article #1458, updated 179 days ago

If you see GPO policies get implemented and re-implemented even though the settings have been removed, or if it just doesn’t happen, try the following in administrative Powershell. These clear the GPO cache on the machine you’re looking at.

Remove-Item "$env:windir\system32\GroupPolicy" -Force -Recurse
Remove-Item "HKLM:\Software\Policies\Microsoft" -Force -Recurse
Remove-Item "HKCU:\Software\Policies\Microsoft" -Force -Recurse
Remove-Item "HKCU:\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects" -Force -Recurse
Remove-Item "HKCU:\\Software\Microsoft\Windows\CurrentVersion\Policies" -Force -Recurse



Use Group Policy to set PC/Laptop Local Admins
article #1443, updated 305 days ago

Here’s a very nice article.



Latest Microsoft Group Policy Templates
article #1183, updated 841 days ago

It is often helpful to update the Group Policy templates for a domain. The most current set can be found quite easily via a Google search:

They install as an MSI which does nothing but dump them into a folder here:

 C:\Program Files (x86)\Microsoft Group Policy

Once you have the above done, we have manual steps. The best way to approach this is probably in an administrative CMD.

First, look in here:


We will be wiping everything there. If there are many files with numbers at the end of their names, you probably have Microsoft Office templates as well as Windows templates, and you will have to replace them too. There are other templates which could be involved, so be warned and be ready.

For now, we are going to write as if you have just Microsoft default templates there. Wipe them all. Then replace them with all of the .ADMX files in the dump folder, plus just the language folder appropriate for you. The dump folder will have all of the language folders, you want just yours.

The second destination folder is:


where is the name of the Windows domain. If the folder does not exist, create it, this is creation of your Central Store. If the folder does exist, replace them as above.



Remove "Internet Explorer Maintenance" settings from GPO
article #1321, updated 1025 days ago

If your Active Directory dates back to Server 2003, you may have “Internet Explorer Maintenance” items in GPO. These are obsolete IE control specifications which can not be edited on newer servers. To delete these items:



Group Policy: Machine Inactivity Limit (Lock Screen Force) in Security Settings
article #1298, updated 1130 days ago

There is a setting in Windows Group Policy which will force lockscreen / locked screensaver after a machine considers itself inactive for a specified amount of time:

This overrides all other related (e.g. screen saver) settings and PC-local settings. It’s located here in group policy:

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options

and while creating/linking group policy on a server:

Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options



Tools to Update and Repair Group Policy
article #1297, updated 1130 days ago

Have not tested these at all yet. But am rather glad someone has started working on them.

Repair / Restore Default Group Policy

Upgrade Group Policy

Fix Corrupt Local Group Policy



Disable Microsoft compatibility telemetry by Group Policy
article #1248, updated 1332 days ago

Local group policy has this here in Windows 10:

Computer Configuration, Administrative Templates, Windows Components, Data Collection and Preview Builds

We may disable “Allow Telemetry” and enable “Do not show feedback notifications” for excellent effect.

Domain group policy will only have the above, if it has been upgraded (or installed) with the appropriate very recent version of Group Policy templates.



Block Removable Devices by Group Policy
article #1247, updated 1332 days ago

It’s very possible, per user or per computer:

It’s done in Policies, Administrative Templates, System, Removable Storage Access. There are quite a few granulations available.



"Launch folder windows in a separate process", by Group Policy
article #1246, updated 1333 days ago

User Configuration, Preferences (not Policies!), Control Panel Settings, Folder Options. Create a new item. Choose “Launch folder windows in a separate process”.