For the best web experience, please use IE11+, Chrome, Firefox, or Safari

GPOADmin

Simplify Group Policy management and administration

As one of the most robust configuration tools in your Windows infrastructure, Group Policy plays a key role in establishing a secure and compliant networking environment for your users. Because Group Policy regulates everything – from critical business processes and security settings to individual workstations and printers – managing and administering Group Policy objects (GPOs) is an expensive, time-consuming task.

With GPOADmin, you can automate critical GPO management tasks and reduce your costs while eliminating time-intensive manual processes. Quickly and effectively administer changes to GPOs to support change management best practices, enable effective approval processes and secure your critical data. You can also easily verify, compare, update and roll back GPO versions over time to confirm the consistency of various GPO settings.

Key Benefits

Version comparisons
Improve GPO auditing and verify setting consistency quickly and easily with advanced, side-by-side GPO version comparisons at various intervals.
Rapid rollback
Quickly revert back to a working GPO in the event that a GPO change has an undesired effect. In seconds, the environment can be running smoothly again.
Approval-based workflow
Ensure changes adhere to change management best practices prior to deployment.
Delete version history
Delete the history of multiple versions to help you manage and reduce the size of your backup store.
Workflow commenting
Track requests, reviews and approvals with comments and e-mail notifications at any stage in the process. Requests to modify GPOs can also be approved or rejected by email without opening the GPOADmin console.
Custom email templates
Enable customization of e-mail notifications with specific text and/or attachments by role (e.g., help desk).

Features

Intuitive scheduling

Immediately implement or schedule approved changes to simplify the process.

Enhanced Group Policy comparison

Verify setting consistency with side-by-side GPO version comparisons.

Group Policy lineage

Test pre-production GPO clones before rolling them out to ensure their impact on the live environment.

Hidden pre-production GPO

Limit pre-production GPO access to you and other selected administrators.

Protected settings policies

Define a list of GPO settings with predetermined values that must exist and cannot be modified.

Object management

Assign responsibility for specific policies, either at the object- or GPOADmin container-level, to specific users, enabling administrators to identify who is responsible for managing specific policies.

GPO check-in and check-out, locking

Easily prevent simultaneous editing conflicts or unwanted and unauthorized changes to production GPOs.

Pre- and post- actions

Enable users to execute custom actions before or after a GPOADmin change to facilitate integration with internal processes and systems.

    GPO comparison

  • Ensure GPO setting integrity and reduce the risk of policy violations.

  • Rollback

  • Easily roll back GPOs to previous versions and eliminate ill effects.

  • Custom workflow actions

  • Define automated actions for different scenarios in GPOADmin.

  • Protected settings policies

  • Define a list of settings that policies are then checked against.

  • Object management

  • Easily identify who is responsible for managing specific policies.

  • Email approval

  • Approve or reject GPO modification workflow requests by email.

  • Custom email templates

  • Customize notifications with text or attachments for specific roles.

  • GPO synchronization

  • Synchronize GPO settings across multiple GPOs.

Specifications

Processor

2Ghz CPU Memory

Memory

8Gb RAM

Hard disk space

1 Gb (prefer 50Gb if backups and reports stored on the same drive)

Operating systems
  • Windows® 7
  • Windows® 8
  • Windows® 8.1
  • Windows® 10 
  • Windows® Server 2008
  • Windows® Server 2008 R2
  • Windows® Server 2012
  • Windows® Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
  • .NET Framework 4.5 and 4.6
  • GPMC Extension compatible for the system where you are installing GPOADmin.
  • Microsoft® Group Policy Management Console with Service Pack 1 or Remote Server Administration Tools
  • Active Directory® or ADAM/AD LDS
  • Network Share (recommended)
  • Active Directory® (not recommended)
  • ADAM/AD LDS
  • SQL Server
  • Same system requirements as GPOADmin.

Resources

GPOADmin
Datasheet
GPOADmin
GPOADmin
Control and simplify Group Policy management.
Read Datasheet
How to create containers in GPOADmin
How to create containers in GPOADmin

05:07

Video
How to create containers in GPOADmin
In this demo, we show how to create a container in GPOADmin, allowing an administrator to assign very specific tasks to individual users who are responsible for managing GPOs. Click "Learn More" to download a free trial of GPOADmin:
Watch Video
The approval process workflow in GPOADmin
The approval process workflow in GPOADmin

06:23

Video
The approval process workflow in GPOADmin
Learn how to use the approval process in GPOADmin, the solution for simplified Group Policy management and administration.
Watch Video
Howard County, Maryland, improves security and service availability, while saving hours of IT work, with solutions from Quest.
Case Study
Howard County, Maryland, improves security and service availability, while saving hours of IT work, with solutions from Quest.
Howard County, Maryland, improves security and service availability, while saving hours of IT work, with solutions from Quest.
Howard County, Maryland, uses Microsoft platform management solutions from Quest, which enable accurate and efficient account provisioning, Group Policy administration, change auditing, disaster recovery, and more — while saving the IT team hours of work.
Read Case Study
Governing GPOs with a Layered Security Framework
White Paper
Governing GPOs with a Layered Security Framework
Governing GPOs with a Layered Security Framework
This white paper describes how GPOs can be abused or exploited when the proper security controls are not in place and explains how to implement a layered security architecture that allows you to detect, alert and prevent unauthorized access to GPOs.
Read White Paper
Three ways a privileged user can hose your Active Directory
E-book
Three ways a privileged user can hose your Active Directory
Three ways a privileged user can hose your Active Directory
This eBook reviews insider threats and eight AD security best practices to reduce risk and recovery time.
Read E-book
Active Directory and Azure AD Security Best Practices
E-book
Active Directory and Azure AD Security Best Practices
Active Directory and Azure AD Security Best Practices
Unless you’ve been hiding under a rock, it’s going to come as no surprise that Office 365 adoption is increasing rapidly. With primary drivers like Exchange Online, SharePoint Online and OneDrive, Office 365 is obtaining an average of around 1 million new
Read E-book
Designing a Multilayered, In-Depth Defense Approach to AD Security
White Paper
Designing a Multilayered, In-Depth Defense Approach to AD Security
Designing a Multilayered, In-Depth Defense Approach to AD Security
This white paper details the logical and administrative layers of security that you should implement to improve your AD security posture and describes the features you should look for in third-party solutions, such as the Active Directory security suite
Read White Paper

Get started now

Improve and simplify Group Policy management

Support & services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Education Services

Training courses delivered through online web-based, on-site or virtual instructor-led.