For the best web experience, please use IE11+, Chrome, Firefox, or Safari

GPOADmin

Simplify Group Policy management and governance

Using group policy merge in GPOADmin 04:07

Getting GPOs right is critical – one wrong GPO with a seemingly innocuous setting can inflict massive detrimental effects to the security posture of thousands of systems in your network within minutes. With GPOADmin, you can automate critical Group Policy management and governance tasks to reduce risk and eliminate manual processes.

GPOADmin offers a host of features that allows for comprehensive GPO management and governance, allowing you to search, administer, verify, compare, update, roll back and consolidate GPOs to ensure consistency and avoid long-term GPO proliferation. With GPO comparison features combined with enhanced security and workflow capabilities, you’ll be able to effectively control and secure your Windows infrastructure — while proactively supporting governance initiatives. Moreover, for our die-hard customers, you can maximize your investment with GPOADmin’s integration with Change Auditor, where you can track and access all changes in real-time.

Key Benefits

Version comparisons
Improve GPO auditing and verify setting consistency quickly and easily with advanced, side-by-side GPO version comparisons at various intervals.
Rapid rollback
Quickly revert back to a working GPO in the event that a GPO change has an undesired effect. In seconds, the environment can be running smoothly again.
Approval-based workflow
Ensure changes adhere to change management best practices prior to deployment.
GPO consolidation
Search for redundant or conflicting Group Policy settings, and merge them into a single GPO or create a new GPO based on the merged settings to avoid long-term GPO proliferation.
Delete version history
Delete the history of multiple versions to help you manage and reduce the size of your backup store.
GPO Syncing
Automate settings synchronization from master GPO to selected target GPOs.

Features

Intuitive scheduling

Immediately implement or schedule approved changes to simplify the process.

Custom email templates

Enable customization of e-mail notifications with specific text and/or attachments by role (e.g., help desk).

Group Policy lineage

Test pre-production GPO clones before rolling them out to ensure their impact on the live environment.

Hidden pre-production GPO

Limit pre-production GPO access to you and other selected administrators.

Protected settings policies

Define a list of GPO settings with predetermined values that must exist and cannot be modified.

GPO check-in and check-out locking

Easily prevent simultaneous editing conflicts or unwanted and unauthorized changes to production GPOs.

Object management

Assign responsibility for specific policies, either at the object- or container-level, to specific users, enabling admins to identify who is responsible for managing specific policies.

Pre- and post- actions

Enable users to execute custom actions before or after a GPOADmin change to facilitate integration with internal processes and systems.

    New! GPO Consolidation

  • Select redundant or conflicting Group Policy settings and merge into a single GPO or create a new GPO

  • Rollback

  • Easily roll back GPOs to previous versions and eliminate ill effects.

  • Custom workflow actions

  • Define automated actions for different scenarios in GPOADmin.

  • Protected settings policies

  • Define a list of settings that policies are then checked against.

  • Object management

  • Easily identify who is responsible for managing specific policies.

  • Email approval

  • Approve or reject GPO modification workflow requests by email.

  • Custom email templates

  • Customize notifications with text or attachments for specific roles.

  • GPO synchronization

  • Synchronize GPO settings across multiple GPOs.

  • GPO comparison

  • Ensure GPO setting integrity and reduce the risk of policy violations.

Specifications

Processor

2Ghz CPU Memory

Memory

8Gb RAM

Hard disk space

1 Gb (prefer 50Gb if backups and reports stored on he same drive)

Operating systems
  • Windows® 8.1
  • Windows® 10
  • Windows® Server 2012
  • Windows® Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
  • Note: Nane Server is not supported
  • .NET Framework 4.7.2
  • Microsoft® Group Policy Management Console with Service Pack 1 or Remote Server Administration Tools
  • Microsoft Exchange 2013
  • Microsoft Exchange 2016
  • Microsoft Exchange 2019
  • Active Directory (not recommended)
  • AD LDS
  • SQL Server (Supported version includes 2012, 2012 R2, 2014, 2016, 2017 and 2019)
  • Note: GPOADmin supports SQL AlwaysOn Availability Groups and SQL Clusters for SQL data
  • Network Share (recommended)
  • Active Directory (not recommended)
  • AD LDS
  • SQL Server (Supported version includes 2012, 2012 R2, 2014, 2016, 2017 and 2019)
  • Note: GPOADmin supports SQL AlwaysOn Availability Groups and SQL Clusters for SQL data
  • Same system requirements as GPOADmin.

Resources

GPOADmin
Datasheet
GPOADmin
GPOADmin
Control and simplify Group Policy management.
Read Datasheet
Protecting Group Policy: Under Attack and Under the Radar
On Demand Webcast
Protecting Group Policy: Under Attack and Under the Radar
Protecting Group Policy: Under Attack and Under the Radar
Protecting Group Policy: Under Attack and Under the Radar
Watch Webcast
Governing GPOs with a Layered Security Framework
White Paper
Governing GPOs with a Layered Security Framework
Governing GPOs with a Layered Security Framework
This white paper describes how GPOs can be abused or exploited when the proper security controls are not in place and explains how to implement a layered security architecture that allows you to detect, alert and prevent unauthorized access to GPOs.
Read White Paper
Group Policy Management - GPOADmin Demo
On Demand Webcast
Group Policy Management - GPOADmin Demo
Group Policy Management - GPOADmin Demo
Watch this 30-minute demo where we'll cover how GPOADmin is a proxy-based administration and governance system for Group Policy.
Watch Webcast
How to implement NIST, ESAE and Red Forest Cybersecurity Principles in Active Directory
White Paper
How to implement NIST, ESAE and Red Forest Cybersecurity Principles in Active Directory
How to implement NIST, ESAE and Red Forest Cybersecurity Principles in Active Directory
Smart companies are adopting NIST Cybersecurity and Microsoft’s ESAE (“Red Forest”) as models for protecting credentials, particularly those that reside in Active Directory. Download your complimentary copy of this white paper today to learn more.
Read White Paper
Using group policy merge in GPOADmin
Using group policy merge in GPOADmin

04:07

Video
Using group policy merge in GPOADmin
Learn how to use group policy merge in GPOADmin in this brief video.
Watch Video
Using search and replace in GPOADmin
Using search and replace in GPOADmin

03:58

Video
Using search and replace in GPOADmin
Learn how to use search and replace in GPOADmin in this short demo.
Watch Video
The approval process workflow in GPOADmin
The approval process workflow in GPOADmin

06:23

Video
The approval process workflow in GPOADmin
Learn how to use the approval process in GPOADmin, the solution for simplified Group Policy management and administration.
Watch Video

Get started now

Improve and simplify Group Policy management

Support & services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Education Services

Training courses delivered through online web-based, on-site or virtual instructor-led.