public.cyber.mil
Open in
urlscan Pro
2600:1f18:177b:3805:9c2b:e03c:4de5:5a40
Public Scan
Submitted URL: http://public.cyber.mil/stigs/gpo
Effective URL: https://public.cyber.mil/stigs/gpo/
Submission: On April 13 via manual from US — Scanned from DE
Effective URL: https://public.cyber.mil/stigs/gpo/
Submission: On April 13 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* Search * Login with CAC Menu * Topics * LIST OF TOPICS * * Cross Domain Enterprise Service (CDES) * Cyber Sam * Defense Collaboration Services (DCS) * * DevSecOps Operational Container Scanning * DoD Cloud Computing Security * DoD Cyber Scholarship Program (DoD CySP) * * DoD Workforce Innovation Directorate * Enterprise Connections * Identity and Access Management (IdAM) * National Centers of Academic Excellence in Cybersecurity (NCAE-C) Close * Training * CYBER EXCHANGE TRAINING * * Training Overview * Training Catalog * Cyber Awareness Challenge * Training Troubleshooting Guide Close * PKI/PKE * PUBLIC KEY INFRASTRUCTURE/ENABLING * * Public Key Infrastructure/Enabling (PKI/PKE) * External Certification Authorities (ECA) Close * SRGs/STIGs * Resources * LIST OF CYBER RESOURCES * * About the DoD Cyber Exchange * Approved Products List (APL) * Cybersecurity Acronyms * Cybersecurity Awareness Month Archives * * DoD Consent Banner with FAQ * External Resources * Policy and Guidance Close * Help * CYBER EXCHANGE HELP * * Email Directory * Frequently Asked Questions (FAQs) Close GROUP POLICY OBJECTS Security Technical Implementation Guides (STIGs) * SRG/STIGs Home * Automation * Security Content Automation Protocol (SCAP) * Supplemental Automation Content * Control Correlation Identifier (CCI) * Document Library * DoD Annex for NIAP Protection Profiles * DoD Cloud Computing Security * Frequently Asked Questions – FAQs * Group Policy Objects * Quarterly Release Schedule and Summary * SRG / STIG Library Compilations * SRG / STIG Mailing List * SRG/STIG Tools and Viewing Guidance * Sunset Products * Vendor STIG Development Process * Help SRG/STIGs HomeAutomation- Security Content Automation Protocol (SCAP)- Supplemental Automation ContentControl Correlation Identifier (CCI)Document LibraryDoD Annex for NIAP Protection ProfilesDoD Cloud Computing SecurityFrequently Asked Questions – FAQsGroup Policy ObjectsQuarterly Release Schedule and SummarySRG / STIG Library CompilationsSRG / STIG Mailing ListSRG/STIG Tools and Viewing GuidanceSunset ProductsVendor STIG Development ProcessHelp Home » Security Technical Implementation Guides (STIGs) » Group Policy Objects Group Policy Objects (GPOs) provides an infrastructure for centralized configuration management of the Windows operating system and applications that run on the operating system. GPOs are a collection of settings that define what a system will look like and how it will behave for a defined group of computers or users. GPOs are used within Active Directory to configure systems in accordance with Security Technical Implementation Guides (STIGs). Benefits of using GPOs are time and cost saving, centralized location for all configurations, increased productivity, enhanced security and standardization. This package is to be used to assist administrators implementing STIG settings within their environment. The administrator must fully test GPOs in test environments prior to live production deployments. The GPOs provided contain most applicable GPO STIG settings contained in STIG files. This package contains ADMX template files, GPO backup exports, GPO reports, and WMI filter exports and STIG Checklist files. It is to provide enterprise administrators the supporting GPOs and related files to aid them in the deployment of GPOs within their enterprise to meet STIG requirements. See the ReadMe.txt file for additional information. It must be noted that the Group Policy Objects (GPO) provided should be evaluated in a local, representative test environment before implementation within production environments. The extensive variety of environments makes it impossible to test these GPOs for all potential enterprise Active Directory and software configurations. For most environments, failure to test before implementation may lead to a loss of required functionality. It is especially important to fully test with all GPOs against all Windows Operating Systems, internet browsers, specific and legacy applications which are targeted by each STIG GPO which are currently used in the environment. GPO DOWNLOADS TitleSizeUpdated Group Policy Objects (GPOs) - January 2023 Group Policy Objects (GPOs) - January 2023 6.8 MB 2023 01 30 30 Jan 2023 Showing 1 to 1 of 1 entries Previous1Next The DoD Cyber Exchange is sponsored by Defense Information Systems Agency (DISA) * Training * SRGs/STIGs * PKI / PKE * External Resources * Privacy and Security * Section 508 * Site Map Login with CAC Help Scroll to top