If you see GPO policies get implemented and re-implemented even though the settings have been removed, or if it just doesn’t happen, try the following in administrative Powershell. These clear the GPO cache on the machine you’re looking at.
Remove-Item "$env:windir\system32\GroupPolicy" -Force -Recurse
Remove-Item "HKLM:\Software\Policies\Microsoft" -Force -Recurse
Remove-Item "HKCU:\Software\Policies\Microsoft" -Force -Recurse
Remove-Item "HKCU:\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects" -Force -Recurse
Remove-Item "HKCU:\\Software\Microsoft\Windows\CurrentVersion\Policies" -Force -Recurse
It is often helpful to update the Group Policy templates for a domain. The most current set can be found quite easily via a Google search:
They install as an MSI which does nothing but dump them into a folder here:
C:\Program Files (x86)\Microsoft Group Policy
Once you have the above done, we have manual steps. The best way to approach this is probably in an administrative CMD.
First, look in here:
We will be wiping everything there. If there are many files with numbers at the end of their names, you probably have Microsoft Office templates as well as Windows templates, and you will have to replace them too. There are other templates which could be involved, so be warned and be ready.
For now, we are going to write as if you have just Microsoft default templates there. Wipe them all. Then replace them with all of the .ADMX files in the dump folder, plus just the language folder appropriate for you. The dump folder will have all of the language folders, you want just yours.
The second destination folder is:
where is the name of the Windows domain. If the folder does not exist, create it, this is creation of your Central Store. If the folder does exist, replace them as above.
If your Active Directory dates back to Server 2003, you may have “Internet Explorer Maintenance” items in GPO. These are obsolete IE control specifications which can not be edited on newer servers. To delete these items:
There is a setting in Windows Group Policy which will force lockscreen / locked screensaver after a machine considers itself inactive for a specified amount of time:
This overrides all other related (e.g. screen saver) settings and PC-local settings. It’s located here in group policy:
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options
and while creating/linking group policy on a server:
Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options
Have not tested these at all yet. But am rather glad someone has started working on them.
Repair / Restore Default Group Policy
Upgrade Group Policy
Fix Corrupt Local Group Policy
Local group policy has this here in Windows 10:
Computer Configuration, Administrative Templates, Windows Components, Data Collection and Preview Builds
We may disable “Allow Telemetry” and enable “Do not show feedback notifications” for excellent effect.
Domain group policy will only have the above, if it has been upgraded (or installed) with the appropriate very recent version of Group Policy templates.
It’s very possible, per user or per computer:
It’s done in Policies, Administrative Templates, System, Removable Storage Access. There are quite a few granulations available.
User Configuration, Preferences (not Policies!), Control Panel Settings, Folder Options. Create a new item. Choose “Launch folder windows in a separate process”.
Windows 10 has some sort of automatic thing built in which is pretended to read our minds and decide for us which of our printers should be the default at any time. Needless to say this makes no sense at all, and causes lots of user frustration. To turn this off with Group Policy, browse to:
User Configuration -> Administrative Templates -> Control Panel -> Printers
and set “Turn off Windows default printer management” to Enabled.