Group Policy Best Practices
Group Policy Best Practices
Best Practices
Group Policy enables organizations to control a wide variety of activity across the IT environment. For example,
you can use Group Policy to prevent the use of USB drives, run a certain script when the system starts up or shuts
down, deploy software, or force a particular home page to open for every Active Directory user in the network.
This guide provides both general Group Policy best practices and recommendations for specific settings. It also
offers guidance for troubleshooting issues with your Group Policy objects (GPOs).
Note that the root Users and Computers folders in Active Directory are not OUs. If a new user or computer object
appears in these folders, move it to the appropriate OU immediately.
▪ Local: Group Policy settings applied at the local computer level have the lowest precedence.
▪ Site: Settings for Active Directory sites are applied next.
▪ Domain: Next are Group Policy settings that affect all OUs in the domain.
▪ OU: Last applied are GPO settings at the OU level.
▪ Browser Settings
▪ Security Settings
▪ Software Installation Settings
▪ AppLocker Settings
▪ Network Settings
▪ Drive Mappings
However, keep in mind that loading many small GPOs can require more time and processing at logon than having
a few GPOs that each have more settings.
Instead, apply GPOs at the OU level. A sub OU inherits the policies applied to its parent OU; you don’t need to
link the policy to each sub OU. If you have users or computers that you don’t want to inherit a setting, put them
in their own OU.
Avoid blocking policy inheritance and policy enforcement
Blocking policy inheritance and policy enforcement make GPO management and troubleshooting much more
difficult. Instead, strive for a well-designed OU structure that makes these settings unnecessary.
To learn more about how to track changes to Group Policy, see the Group Policy Auditing Quick Reference Guide.
Speed GPO processing by disabling unused computer and user
configurations
If you have a GPO that has computer settings but no user settings, you should disable the User configuration for
that GPO to speed GPO processing time.
In addition, be aware of the following additional factors that can cause slow startup and logon times:
The Default Domain Policy affects all users and computers in the domain, so it should be used for account,
account lockout, password and Kerberos policy settings only.
Use the Default Domain Controller Policy for the User Rights Assignment Policy and Audit Policy only.
However, it is even better to use separate GPOs even for the policies listed above.
You can disable the use of removable drives using the “Prevent installation of removable devices” policy. You can
also disable the use of DVDs, CDs and even floppy drives if you want, though they present less risk.
Disabling automatic driver updates on your system
Driver updates can cause serious problems for Windows users: They can cause Windows errors, performance
drop or even the dreaded blue screen of death (BSOD). Regular users can’t switch updates off since it’s an
automated feature.
As an administrator, you can can disable automatic driver updates using the “Turn off Windows Update device driver
searching” Group Policy. You will need the hardware IDs of the devices, which you can find in Device Manager.
Admins who need to use PowerShell can be excluded from the policy. Alternatively, you can require them to run
PowerShell scripts only on a designated machine for better security.
Using Group Policy, you can remove unnecessary accounts from the Local Administrators group on all computers.
Keep in mind that while stringent requirements for factors like password length, complexity and password age
theoretically increase security, it doesn’t always work that way in practice. Instead, such policies can lead users to
adopt insecure workarounds like writing passwords down to avoid the hassle of account lockouts.
To get the full benefit of strong password policies, consider adopting a tool like Netwrix Password Secure, which
will automatically create, store and enter credentials for users. That way, you can improve security by requiring
passwords to be long, include special characters, be changed frequently and so on.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
Be sure to back up the registry before making any changes, and exercise caution when editing registry settings.
Changes should be performed only by knowledgeable and authorized personnel.
Computer Configuration > Administrative Templates > Windows Components > Windows
Defender Antivirus
Configure the Group Policy setting “Turn off Windows Defender Antivirus” as Disabled.
How Netwrix PolicyPak Can Help
Group Policy is an effective tool for detailed management of settings within a Windows environment. However,
challenges such as the proliferation of Group Policy Object (GPO), organizational changes due to mergers,
acquisitions, divestitures, fluctuating staff levels, and the formation of new entities have made its management
increasingly difficult. Netwrix PolicyPak addresses these challenges by reducing GPO sprawl and streamlining the
management process by merging multiple GPOs into fewer entities. This consolidation leads to improved login
times, enhanced security, increased system reliability, and a reduction in configuration errors. Netwrix PolicyPak also
enables administrators to deploy nearly 100% of Group Policy settings to Microsoft Intune without the added
complexity of OMA-URI.
▪ In Windows 10 and Windows Server 2016, use the gpresult command to display Group Policy information for
a remote user and computer, including how long it takes to process the GPO.
▪ Check the Event Viewer for any Group Policy-related errors or warnings.
▪ Use the Group Policy Results tool to see which policies are being applied to a specific user or computer, and
which policies are not being applied.
▪ Use the Group Policy Modeling tool to simulate the application of Group Policies for a specific user or computer
and identify any issues.
▪ Check that the affected user or computer is in the correct OU in Active Directory and that the Group Policy is
linked to the correct OU.
▪ Check for any conflicting GPOs that may be overriding the desired settings using the Resultant Set of Policy
(RSoP) tool.
▪ Use the Group Policy Management Console to check whether the user or computer has the necessary
permissions to apply the GPO settings.
▪ Check for any network connectivity issues that may be preventing the user or computer from receiving the
Group Policy settings.
▪ For issues with Group Policy Preferences settings, use the Group Policy Preferences troubleshooting extension.
▪ If all else fails, consider resetting the Group Policy settings for the affected user or computer by running the “gpupdate
/force” command or using the “Reset Group Policy Settings” option in the Group Policy Management Console.
Streamline Group Policy
Management
with Netwrix Solutions
Gain visibility into your Group Policy settings.
See before and after values for each Group Policy change.
Next Steps
Get a live demo — Take a personalized product tour with a Netwrix expert: netwrix.com/livedemo