Crypto Prevention Vista and Higher Data collected on: 17/02/2015 8:29:13 PM General Details Domain gasmotors.local Owner GASMOTORS\Domain Admins Created 27/01/2015 7:12:28 PM Modified 17/02/2015 1:38:24 PM User Revisions 1 (AD), 1 (sysvol) Computer Revisions 8 (AD), 8 (sysvol) Unique ID {26A56E4A-7B36-4927-AA16-DBD1B908FC2F} GPO Status Links All settings disabled Location Enforced Link Status Path gasmotors No Disabled gasmotors.local This list only includes links in the domain of the GPO. Security Filtering The settings in this GPO can only apply to the following groups, users, and computers: Name Everyone WMI Filtering WMI Filter Name Windows SBS Client - Windows 7 and Windows Vista Description None Delegation These groups and users have the specified permission for this GPO Name Allowed Permissions Inherited Everyone Read (from Security Filtering) No GASMOTORS\Domain Admins Edit settings, delete, modify security No GASMOTORS\Enterprise Admins Edit settings, delete, modify security No NT AUTHORITY\ENTERPRISE Read No DOMAIN CONTROLLERS NT AUTHORITY\SYSTEM Edit settings, delete, modify security Computer Configuration (Disabled) Policies Windows Settings Security Settings An error has occurred while collecting data for Software Restriction Policies. This error impacts the following settings: Software Restriction Policies Software Restriction Policies/Security Levels Software Restriction Policies/Additional Rules The following errors apply to all of the above settings: No An unknown error occurred while data was gathered for this extension. Details: Unable to cast object of type 'System.String[]' to type 'Microsoft.GroupPolicy.Reporting.Extensions.Registry.UnknownType'. Public Key Policies/Trusted Root Certification Authorities Properties Policy Setting Allow users to select new root certification authorities (CAs) Enabled to trust Client computers can trust the following certificate stores Third-Party Root Certification Authorities and Enterprise Root Certification Authorities To perform certificate-based authentication of users and Registered in Active Directory only computers, CAs must meet the following criteria Windows Firewall with Advanced Security Global Settings Policy Setting Policy version 2.10 Disable stateful FTP Not Configured Disable stateful PPTP Not Configured IPsec exempt Not Configured IPsec through NAT Not Configured Preshared key encoding Not Configured SA idle time Not Configured Strong CRL check Domain Profile Settings Not Configured Policy Setting Firewall state Off Inbound connections Not Configured Outbound connections Not Configured Apply local firewall rules Not Configured Apply local connection security rules Not Configured Display notifications Not Configured Allow unicast responses Not Configured Log dropped packets Not Configured Log successful connections Not Configured Log file path Not Configured Log file maximum size (KB) Not Configured Connection Security Settings Administrative Templates Policy definitions (ADMX files) retrieved from the local machine. Network/Network Connections/Windows Firewall/Domain Profile Policy Setting Comment Windows Firewall: Protect all network Disabled connections Windows Components/Remote Desktop Services/Remote Desktop Session Host/Connections Policy Setting Allow users to connect remotely using Enabled Comment Remote Desktop Services Extra Registry Settings Display names for some settings cannot be found. You might be able to resolve this issue by updating the .ADM files used by Group Policy Management. Setting State Software\Policies\Microsoft\Windows\Safer\CodeIdentifier Disables ability for executables(exe files) from running under s\0\Paths\{28422771-f01e-4589-91e1- AppData\<Vendor>\ folder 3cdd50b9f606}\Description Software\Policies\Microsoft\Windows\Safer\CodeIdentifier %AppData%\*\*.exe s\0\Paths\{28422771-f01e-4589-91e13cdd50b9f606}\ItemData Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 130256281662662950 s\0\Paths\{28422771-f01e-4589-91e13cdd50b9f606}\LastModified Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 0 s\0\Paths\{28422771-f01e-4589-91e13cdd50b9f606}\SaferFlags Software\Policies\Microsoft\Windows\Safer\CodeIdentifier Block executables run from archive attachments opened with s\0\Paths\{284ad8b1-73af-45a7-aa58- 7zip 60a813203329}\Description Software\Policies\Microsoft\Windows\Safer\CodeIdentifier %Temp%\7z*\*.exe s\0\Paths\{284ad8b1-73af-45a7-aa5860a813203329}\ItemData Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 130265170728316628 s\0\Paths\{284ad8b1-73af-45a7-aa5860a813203329}\LastModified Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 0 s\0\Paths\{284ad8b1-73af-45a7-aa5860a813203329}\SaferFlags Software\Policies\Microsoft\Windows\Safer\CodeIdentifier Block executables run from archive attachments opened with s\0\Paths\{3c35d155-10ff-4424-a697- WinRAR 4f0602c2c31b}\Description Software\Policies\Microsoft\Windows\Safer\CodeIdentifier %Temp%\Rar*\*.exe s\0\Paths\{3c35d155-10ff-4424-a6974f0602c2c31b}\ItemData Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 130265170437625369 s\0\Paths\{3c35d155-10ff-4424-a6974f0602c2c31b}\LastModified Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 0 s\0\Paths\{3c35d155-10ff-4424-a6974f0602c2c31b}\SaferFlags Software\Policies\Microsoft\Windows\Safer\CodeIdentifier s\0\Paths\{3d27ee63-761d-45ca-b15059db39c08747}\Description Software\Policies\Microsoft\Windows\Safer\CodeIdentifier %localAppData%\*.exe s\0\Paths\{3d27ee63-761d-45ca-b15059db39c08747}\ItemData Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 130256287291502543 s\0\Paths\{3d27ee63-761d-45ca-b15059db39c08747}\LastModified Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 0 s\0\Paths\{3d27ee63-761d-45ca-b15059db39c08747}\SaferFlags Software\Policies\Microsoft\Windows\Safer\CodeIdentifier Block executables run from archive attachments opened using s\0\Paths\{431c1074-5bc6-4045-a8e4- Windows built-in Zip support. 50ddb52c0719}\Description Software\Policies\Microsoft\Windows\Safer\CodeIdentifier %Temp%\*.zip\*.exe s\0\Paths\{431c1074-5bc6-4045-a8e450ddb52c0719}\ItemData Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 130265171302597245 s\0\Paths\{431c1074-5bc6-4045-a8e450ddb52c0719}\LastModified Software\Policies\Microsoft\Windows\Safer\CodeIdentifier s\0\Paths\{431c1074-5bc6-4045-a8e450ddb52c0719}\SaferFlags Software\Policies\Microsoft\Windows\Safer\CodeIdentifier s\0\Paths\{542edcef-766b-4b80-94e242e180f6675d}\Description 0 Software\Policies\Microsoft\Windows\Safer\CodeIdentifier %localAppData%\*\*.exe s\0\Paths\{542edcef-766b-4b80-94e242e180f6675d}\ItemData Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 130256287866378911 s\0\Paths\{542edcef-766b-4b80-94e242e180f6675d}\LastModified Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 0 s\0\Paths\{542edcef-766b-4b80-94e242e180f6675d}\SaferFlags Software\Policies\Microsoft\Windows\Safer\CodeIdentifier Disables ability for executables(exe files) from running under s\0\Paths\{6c395c0b-7a7c-4864-971e- AppData folder cdaf9c49f924}\Description Software\Policies\Microsoft\Windows\Safer\CodeIdentifier %AppData%\*.exe s\0\Paths\{6c395c0b-7a7c-4864-971ecdaf9c49f924}\ItemData Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 130256280793141186 s\0\Paths\{6c395c0b-7a7c-4864-971ecdaf9c49f924}\LastModified Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 0 s\0\Paths\{6c395c0b-7a7c-4864-971ecdaf9c49f924}\SaferFlags Software\Policies\Microsoft\Windows\Safer\CodeIdentifier Block executables run from archive attachments opened with s\0\Paths\{d6fb7216-9b35-41b6-8f52- WinZip. 4b2dfed154d2}\Description Software\Policies\Microsoft\Windows\Safer\CodeIdentifier %Temp%\wz*\*.exe s\0\Paths\{d6fb7216-9b35-41b6-8f524b2dfed154d2}\ItemData Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 130265171023808469 s\0\Paths\{d6fb7216-9b35-41b6-8f524b2dfed154d2}\LastModified Software\Policies\Microsoft\Windows\Safer\CodeIdentifier s\0\Paths\{d6fb7216-9b35-41b6-8f524b2dfed154d2}\SaferFlags Software\Policies\Microsoft\Windows\Safer\CodeIdentifier s\262144\Paths\{191cd7fa-f240-4a17-898694d480a6c8ca}\Description 0 Software\Policies\Microsoft\Windows\Safer\CodeIdentifier %HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows s\262144\Paths\{191cd7fa-f240-4a17-8986- NT\CurrentVersion\SystemRoot% 94d480a6c8ca}\ItemData Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 130256279868371892 s\262144\Paths\{191cd7fa-f240-4a17-898694d480a6c8ca}\LastModified Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 0 s\262144\Paths\{191cd7fa-f240-4a17-898694d480a6c8ca}\SaferFlags Software\Policies\Microsoft\Windows\Safer\CodeIdentifier s\262144\Paths\{d2c34ab2-529a-46b2-b293fc853fce72ea}\Description Software\Policies\Microsoft\Windows\Safer\CodeIdentifier %HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Cu s\262144\Paths\{d2c34ab2-529a-46b2-b293- rrentVersion\ProgramFilesDir% fc853fce72ea}\ItemData Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 130256279868371892 s\262144\Paths\{d2c34ab2-529a-46b2-b293fc853fce72ea}\LastModified Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 0 s\262144\Paths\{d2c34ab2-529a-46b2-b293fc853fce72ea}\SaferFlags Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 262144 s\DefaultLevel Software\Policies\Microsoft\Windows\Safer\CodeIdentifier ADE s\ExecutableTypes ADP BAS BAT CHM CMD COM CPL CRT EXE HLP HTA INF INS ISP LNK MDB MDE MSC MSI MSP MST OCX PCD PIF REG SCR SHS URL VB WSC Software\Policies\Microsoft\Windows\Safer\CodeIdentifier 0 s\PolicyScope Software\Policies\Microsoft\Windows\Safer\CodeIdentifier s\TransparentEnabled User Configuration (Disabled) No settings defined. 1