public.cyber.mil Open in urlscan Pro
2600:1f18:177b:3805:9c2b:e03c:4de5:5a40  Public Scan

Submitted URL: http://public.cyber.mil/stigs/gpo
Effective URL: https://public.cyber.mil/stigs/gpo/
Submission: On April 13 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * Search
 * Login with CAC


Menu
 * Topics
   
   
    * LIST OF TOPICS
   
    * * Cross Domain Enterprise Service (CDES)
      * Cyber Sam
      * Defense Collaboration Services (DCS)
    * * DevSecOps Operational Container Scanning
      * DoD Cloud Computing Security
      * DoD Cyber Scholarship Program (DoD CySP)
    * * DoD Workforce Innovation Directorate
      * Enterprise Connections
      * Identity and Access Management (IdAM)
      * National Centers of Academic Excellence in Cybersecurity (NCAE-C)
   
   Close
 * Training
   
   
    * CYBER EXCHANGE TRAINING
   
    * * Training Overview
      * Training Catalog
      * Cyber Awareness Challenge
      * Training Troubleshooting Guide
   
   Close
 * PKI/PKE
   
   
    * PUBLIC KEY INFRASTRUCTURE/ENABLING
   
    * * Public Key Infrastructure/Enabling (PKI/PKE)
      * External Certification Authorities (ECA)
   
   Close
 * SRGs/STIGs
 * Resources
   
   
    * LIST OF CYBER RESOURCES
   
    * * About the DoD Cyber Exchange
      * Approved Products List (APL)
      * Cybersecurity Acronyms
      * Cybersecurity Awareness Month Archives
    * * DoD Consent Banner with FAQ
      * External Resources
      * Policy and Guidance
   
   Close
 * Help
   
   
    * CYBER EXCHANGE HELP
   
    * * Email Directory
      * Frequently Asked Questions (FAQs)
   
   Close




GROUP POLICY OBJECTS

Security Technical Implementation Guides (STIGs)
 * SRG/STIGs Home
 * Automation
   * Security Content Automation Protocol (SCAP)
   * Supplemental Automation Content
 * Control Correlation Identifier (CCI)
 * Document Library
 * DoD Annex for NIAP Protection Profiles
 * DoD Cloud Computing Security
 * Frequently Asked Questions – FAQs
 * Group Policy Objects
 * Quarterly Release Schedule and Summary
 * SRG / STIG Library Compilations
 * SRG / STIG Mailing List
 * SRG/STIG Tools and Viewing Guidance
 * Sunset Products
 * Vendor STIG Development Process
 * Help

SRG/STIGs HomeAutomation- Security Content Automation Protocol (SCAP)-
Supplemental Automation ContentControl Correlation Identifier (CCI)Document
LibraryDoD Annex for NIAP Protection ProfilesDoD Cloud Computing
SecurityFrequently Asked Questions – FAQsGroup Policy ObjectsQuarterly Release
Schedule and SummarySRG / STIG Library CompilationsSRG / STIG Mailing
ListSRG/STIG Tools and Viewing GuidanceSunset ProductsVendor STIG Development
ProcessHelp
Home » Security Technical Implementation Guides (STIGs) » Group Policy Objects


Group Policy Objects (GPOs) provides an infrastructure for centralized
configuration management of the Windows operating system and applications that
run on the operating system.  GPOs are a collection of settings that define what
a system will look like and how it will behave for a defined group of computers
or users.  GPOs are used within Active Directory to configure systems in
accordance with Security Technical Implementation Guides (STIGs). Benefits of
using GPOs are time and cost saving, centralized location for all
configurations, increased productivity, enhanced security and standardization.

This package is to be used to assist administrators implementing STIG settings
within their environment. The administrator must fully test GPOs in test
environments prior to live production deployments. The GPOs provided contain
most applicable GPO STIG settings contained in STIG files.

This package contains ADMX template files, GPO backup exports, GPO reports, and
WMI filter exports and STIG Checklist files. It is to provide enterprise
administrators the supporting GPOs and related files to aid them in the
deployment of GPOs within their enterprise to meet STIG requirements.  See the
ReadMe.txt file for additional information.



It must be noted that the Group Policy Objects (GPO) provided should be
evaluated in a local, representative test environment before implementation
within production environments. The extensive variety of environments makes it
impossible to test these GPOs for all potential enterprise Active Directory and
software configurations. For most environments, failure to test before
implementation may lead to a loss of required functionality.

It is especially important to fully test with all GPOs against all Windows
Operating Systems, internet browsers, specific and legacy applications which are
targeted by each STIG GPO which are currently used in the environment.




GPO DOWNLOADS



 TitleSizeUpdated Group Policy Objects (GPOs) - January 2023 Group Policy
Objects (GPOs) - January 2023

6.8 MB 2023 01 30
30 Jan 2023

Showing 1 to 1 of 1 entries
Previous1Next

The DoD Cyber Exchange is sponsored by
Defense Information Systems Agency (DISA)

 * Training
 * SRGs/STIGs
 * PKI / PKE
 * External Resources

 * Privacy and Security
 * Section 508
 * Site Map

Login with CAC

Help

Scroll to top