For the best web experience, please use IE11+, Chrome, Firefox, or Safari

GPOADmin

Simplify Group Policy management and governance

Using group policy merge in GPOADmin 04:07

Getting GPOs right is critical – one wrong GPO with a seemingly innocuous setting can inflict massive detrimental effects to the security posture of thousands of systems in your network within minutes. With GPOADmin, you can automate critical Group Policy management and governance tasks to reduce risk and eliminate manual processes.

GPOADmin offers a host of features that allows for comprehensive GPO management and governance, allowing you to search, administer, verify, compare, update, roll back and consolidate GPOs to ensure consistency and avoid long-term GPO proliferation. With GPO comparison features combined with enhanced security and workflow capabilities, you’ll be able to effectively control and secure your Windows infrastructure — while proactively supporting governance initiatives. Moreover, for our die-hard customers, you can maximize your investment with GPOADmin’s integration with Change Auditor, where you can track and access all changes in real-time.

Key Benefits

Version comparisons
Improve GPO auditing and verify setting consistency quickly and easily with advanced, side-by-side GPO version comparisons at various intervals.
Rapid rollback
Quickly revert back to a working GPO in the event that a GPO change has an undesired effect. In seconds, the environment can be running smoothly again.
Approval-based workflow
Ensure changes adhere to change management best practices prior to deployment.
GPO consolidation
Search for redundant or conflicting Group Policy settings, and merge them into a single GPO or create a new GPO based on the merged settings to avoid long-term GPO proliferation.
Delete version history
Delete the history of multiple versions to help you manage and reduce the size of your backup store.
GPO Syncing
Automate settings synchronization from master GPO to selected target GPOs.

Features

Intuitive scheduling

Immediately implement or schedule approved changes to simplify the process.

Custom email templates

Enable customization of e-mail notifications with specific text and/or attachments by role (e.g., help desk).

Group Policy lineage

Test pre-production GPO clones before rolling them out to ensure their impact on the live environment.

Hidden pre-production GPO

Limit pre-production GPO access to you and other selected administrators.

Protected settings policies

Define a list of GPO settings with predetermined values that must exist and cannot be modified.

GPO check-in and check-out locking

Easily prevent simultaneous editing conflicts or unwanted and unauthorized changes to production GPOs.

Object management

Assign responsibility for specific policies, either at the object- or container-level, to specific users, enabling admins to identify who is responsible for managing specific policies.

Pre- and post- actions

Enable users to execute custom actions before or after a GPOADmin change to facilitate integration with internal processes and systems.

    New! GPO Consolidation

  • Select redundant or conflicting Group Policy settings and merge into a single GPO or create a new GPO

  • Rollback

  • Easily roll back GPOs to previous versions and eliminate ill effects.

  • Custom workflow actions

  • Define automated actions for different scenarios in GPOADmin.

  • Protected settings policies

  • Define a list of settings that policies are then checked against.

  • Object management

  • Easily identify who is responsible for managing specific policies.

  • Email approval

  • Approve or reject GPO modification workflow requests by email.

  • Custom email templates

  • Customize notifications with text or attachments for specific roles.

  • GPO synchronization

  • Synchronize GPO settings across multiple GPOs.

  • GPO comparison

  • Ensure GPO setting integrity and reduce the risk of policy violations.

Specifications

Processor

2Ghz CPU Memory

Memory

8Gb RAM

Hard disk space

1 Gb (prefer 50Gb if backups and reports stored on he same drive)

Operating systems
  • Windows® 8.1
  • Windows® 10
  • Windows® Server 2012
  • Windows® Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
  • Note: Nane Server is not supported
  • .NET Framework 4.7.2
  • Microsoft® Group Policy Management Console with Service Pack 1 or Remote Server Administration Tools
  • Microsoft Exchange 2013
  • Microsoft Exchange 2016
  • Microsoft Exchange 2019
  • Active Directory (not recommended)
  • AD LDS
  • SQL Server (Supported version includes 2012, 2012 R2, 2014, 2016, 2017 and 2019)
  • Note: GPOADmin supports SQL AlwaysOn Availability Groups and SQL Clusters for SQL data
  • Network Share (recommended)
  • Active Directory (not recommended)
  • AD LDS
  • SQL Server (Supported version includes 2012, 2012 R2, 2014, 2016, 2017 and 2019)
  • Note: GPOADmin supports SQL AlwaysOn Availability Groups and SQL Clusters for SQL data
  • Same system requirements as GPOADmin.

Resources

GPOADmin
Datasheet
GPOADmin
GPOADmin
Control and simplify Group Policy management.
Read Datasheet
Using group policy merge in GPOADmin
Using group policy merge in GPOADmin

04:07

Video
Using group policy merge in GPOADmin
Learn how to use group policy merge in GPOADmin in this brief video.
Watch Video
Governing GPOs with a Layered Security Framework
White Paper
Governing GPOs with a Layered Security Framework
Governing GPOs with a Layered Security Framework
This white paper describes how GPOs can be abused or exploited when the proper security controls are not in place and explains how to implement a layered security architecture that allows you to detect, alert and prevent unauthorized access to GPOs.
Read White Paper
Using search and replace in GPOADmin
Using search and replace in GPOADmin

03:58

Video
Using search and replace in GPOADmin
Learn how to use search and replace in GPOADmin in this short demo.
Watch Video
Designing a Multilayered, In-Depth Defense Approach to AD Security
White Paper
Designing a Multilayered, In-Depth Defense Approach to AD Security
Designing a Multilayered, In-Depth Defense Approach to AD Security
This white paper details the logical and administrative layers of security that you should implement to improve your AD security posture and describes the features you should look for in third-party solutions, such as the Active Directory security suite
Read White Paper
The approval process workflow in GPOADmin
The approval process workflow in GPOADmin

06:23

Video
The approval process workflow in GPOADmin
Learn how to use the approval process in GPOADmin, the solution for simplified Group Policy management and administration.
Watch Video
How to create containers in GPOADmin
How to create containers in GPOADmin

05:07

Video
How to create containers in GPOADmin
In this demo, we show how to create a container in GPOADmin, allowing an administrator to assign very specific tasks to individual users who are responsible for managing GPOs. Click "Learn More" to download a free trial of GPOADmin:
Watch Video
How to implement NIST, ESAE and Red Forest Cybersecurity Principles in Active Directory
White Paper
How to implement NIST, ESAE and Red Forest Cybersecurity Principles in Active Directory
How to implement NIST, ESAE and Red Forest Cybersecurity Principles in Active Directory
Smart companies are adopting NIST Cybersecurity and Microsoft’s ESAE (“Red Forest”) as models for protecting credentials, particularly those that reside in Active Directory. Download your complimentary copy of this white paper today to learn more.
Read White Paper

Get started now

Improve and simplify Group Policy management

Support & services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Education Services

Training courses delivered through online web-based, on-site or virtual instructor-led.