Gpo/{A5D8D976-ECA9-489E-92C7-C05CDE6A434F}/gpreport.xml

<?xml version="1.0" encoding="utf-16"?>
<GPO xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.microsoft.com/GroupPolicy/Settings">
  <Identifier>
    <Identifier xmlns="http://www.microsoft.com/GroupPolicy/Types">{34A74C2D-D0D4-4511-ADC4-0D2C88F9155D}</Identifier>
    <Domain xmlns="http://www.microsoft.com/GroupPolicy/Types">jcadb2.local</Domain>
  </Identifier>
  <Name>JumpCloud ADMU GPO</Name>
  <IncludeComments>true</IncludeComments>
  <CreatedTime>2019-11-05T15:49:18</CreatedTime>
  <ModifiedTime>2019-11-05T15:58:59</ModifiedTime>
  <ReadTime>2019-11-05T16:00:53.7269693Z</ReadTime>
  <SecurityDescriptor>
    <SDDL xmlns="http://www.microsoft.com/GroupPolicy/Types/Security">O:DAG:DAD:PAI(OA;CI;CR;edacfd8f-ffb3-11d1-b41d-00a0c968f939;;AU)(A;;CCDCLCSWRPWPDTLOSDRCWDWO;;;DA)(A;CI;LCRPRC;;;S-1-5-21-2388011147-2301469728-2459572640-1156)(A;CI;CCDCLCSWRPWPDTLOSDRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOSDRCWDWO;;;S-1-5-21-2388011147-2301469728-2459572640-519)(A;CI;LCRPLORC;;;ED)(A;CI;LCRPLORC;;;AU)(A;CI;CCDCLCSWRPWPDTLOSDRCWDWO;;;SY)(A;CIIO;CCDCLCSWRPWPDTLOSDRCWDWO;;;CO)S:AI(OU;CIIDSA;WPWD;;f30e3bc2-9ff0-11d1-b603-0000f80367c1;WD)(OU;CIIOIDSA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CIIOIDSA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)</SDDL>
    <Owner xmlns="http://www.microsoft.com/GroupPolicy/Types/Security">
      <SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-21-2388011147-2301469728-2459572640-512</SID>
      <Name xmlns="http://www.microsoft.com/GroupPolicy/Types">JCADB2\Domain Admins</Name>
    </Owner>
    <Group xmlns="http://www.microsoft.com/GroupPolicy/Types/Security">
      <SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-21-2388011147-2301469728-2459572640-512</SID>
      <Name xmlns="http://www.microsoft.com/GroupPolicy/Types">JCADB2\Domain Admins</Name>
    </Group>
    <PermissionsPresent xmlns="http://www.microsoft.com/GroupPolicy/Types/Security">true</PermissionsPresent>
    <Permissions xmlns="http://www.microsoft.com/GroupPolicy/Types/Security">
      <InheritsFromParent>false</InheritsFromParent>
      <TrusteePermissions>
        <Trustee>
          <SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-21-2388011147-2301469728-2459572640-512</SID>
          <Name xmlns="http://www.microsoft.com/GroupPolicy/Types">JCADB2\Domain Admins</Name>
        </Trustee>
        <Type xsi:type="PermissionType">
          <PermissionType>Allow</PermissionType>
        </Type>
        <Inherited>false</Inherited>
        <Applicability>
          <ToSelf>true</ToSelf>
          <ToDescendantObjects>false</ToDescendantObjects>
          <ToDescendantContainers>true</ToDescendantContainers>
          <ToDirectDescendantsOnly>false</ToDirectDescendantsOnly>
        </Applicability>
        <Standard>
          <GPOGroupedAccessEnum>Edit, delete, modify security</GPOGroupedAccessEnum>
        </Standard>
        <AccessMask>0</AccessMask>
      </TrusteePermissions>
      <TrusteePermissions>
        <Trustee>
          <SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-9</SID>
          <Name xmlns="http://www.microsoft.com/GroupPolicy/Types">NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS</Name>
        </Trustee>
        <Type xsi:type="PermissionType">
          <PermissionType>Allow</PermissionType>
        </Type>
        <Inherited>false</Inherited>
        <Applicability>
          <ToSelf>true</ToSelf>
          <ToDescendantObjects>false</ToDescendantObjects>
          <ToDescendantContainers>true</ToDescendantContainers>
          <ToDirectDescendantsOnly>false</ToDirectDescendantsOnly>
        </Applicability>
        <Standard>
          <GPOGroupedAccessEnum>Read</GPOGroupedAccessEnum>
        </Standard>
        <AccessMask>0</AccessMask>
      </TrusteePermissions>
      <TrusteePermissions>
        <Trustee>
          <SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-21-2388011147-2301469728-2459572640-1156</SID>
          <Name xmlns="http://www.microsoft.com/GroupPolicy/Types">JCADB2\JumpCloud ADMU Computers</Name>
        </Trustee>
        <Type xsi:type="PermissionType">
          <PermissionType>Allow</PermissionType>
        </Type>
        <Inherited>false</Inherited>
        <Applicability>
          <ToSelf>true</ToSelf>
          <ToDescendantObjects>false</ToDescendantObjects>
          <ToDescendantContainers>true</ToDescendantContainers>
          <ToDirectDescendantsOnly>false</ToDirectDescendantsOnly>
        </Applicability>
        <Standard>
          <GPOGroupedAccessEnum>Read</GPOGroupedAccessEnum>
        </Standard>
        <AccessMask>0</AccessMask>
      </TrusteePermissions>
      <TrusteePermissions>
        <Trustee>
          <SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-18</SID>
          <Name xmlns="http://www.microsoft.com/GroupPolicy/Types">NT AUTHORITY\SYSTEM</Name>
        </Trustee>
        <Type xsi:type="PermissionType">
          <PermissionType>Allow</PermissionType>
        </Type>
        <Inherited>false</Inherited>
        <Applicability>
          <ToSelf>true</ToSelf>
          <ToDescendantObjects>false</ToDescendantObjects>
          <ToDescendantContainers>true</ToDescendantContainers>
          <ToDirectDescendantsOnly>false</ToDirectDescendantsOnly>
        </Applicability>
        <Standard>
          <GPOGroupedAccessEnum>Edit, delete, modify security</GPOGroupedAccessEnum>
        </Standard>
        <AccessMask>0</AccessMask>
      </TrusteePermissions>
      <TrusteePermissions>
        <Trustee>
          <SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-21-2388011147-2301469728-2459572640-519</SID>
          <Name xmlns="http://www.microsoft.com/GroupPolicy/Types">JCADB2\Enterprise Admins</Name>
        </Trustee>
        <Type xsi:type="PermissionType">
          <PermissionType>Allow</PermissionType>
        </Type>
        <Inherited>false</Inherited>
        <Applicability>
          <ToSelf>true</ToSelf>
          <ToDescendantObjects>false</ToDescendantObjects>
          <ToDescendantContainers>true</ToDescendantContainers>
          <ToDirectDescendantsOnly>false</ToDirectDescendantsOnly>
        </Applicability>
        <Standard>
          <GPOGroupedAccessEnum>Edit, delete, modify security</GPOGroupedAccessEnum>
        </Standard>
        <AccessMask>0</AccessMask>
      </TrusteePermissions>
      <TrusteePermissions>
        <Trustee>
          <SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-11</SID>
          <Name xmlns="http://www.microsoft.com/GroupPolicy/Types">NT AUTHORITY\Authenticated Users</Name>
        </Trustee>
        <Type xsi:type="PermissionType">
          <PermissionType>Allow</PermissionType>
        </Type>
        <Inherited>false</Inherited>
        <Applicability>
          <ToSelf>true</ToSelf>
          <ToDescendantObjects>false</ToDescendantObjects>
          <ToDescendantContainers>true</ToDescendantContainers>
          <ToDirectDescendantsOnly>false</ToDirectDescendantsOnly>
        </Applicability>
        <Standard>
          <GPOGroupedAccessEnum>Apply Group Policy</GPOGroupedAccessEnum>
        </Standard>
        <AccessMask>0</AccessMask>
      </TrusteePermissions>
    </Permissions>
    <AuditingPresent xmlns="http://www.microsoft.com/GroupPolicy/Types/Security">false</AuditingPresent>
  </SecurityDescriptor>
  <FilterDataAvailable>true</FilterDataAvailable>
  <Computer>
    <VersionDirectory>7</VersionDirectory>
    <VersionSysvol>7</VersionSysvol>
    <Enabled>true</Enabled>
    <ExtensionData>
      <Extension xmlns:q1="http://www.microsoft.com/GroupPolicy/Settings/Files" xsi:type="q1:FilesSettings">
        <q1:FilesSettings clsid="{215B2E53-57CE-475c-80FE-9EEC14635851}">
          <q1:File clsid="{50BE44C8-567A-4ed1-B1D0-9234FE1F38AF}" name="ADMU_Powershell" status="powershell" image="1" changed="2019-11-05 15:38:11" uid="{C1C804C1-FC8F-4592-957C-5571AAA4E1AA}" bypassErrors="1" removePolicy="1">
            <q1:GPOSettingOrder>1</q1:GPOSettingOrder>
            <q1:Properties action="R" fromPath="\\%ComputerName%\jumpcloudADMU\powershell\*.*" targetPath="c:\ADMU\powershell" readOnly="0" archive="1" hidden="0" suppress="0" />
            <q1:Filters />
          </q1:File>
        </q1:FilesSettings>
      </Extension>
      <Name>Files</Name>
    </ExtensionData>
    <ExtensionData>
      <Extension xmlns:q2="http://www.microsoft.com/GroupPolicy/Settings/Services" xsi:type="q2:ServiceSettings">
        <q2:NTServices clsid="{2CFB484A-4E96-4b5d-A0B6-093D2F91E6AE}">
          <q2:NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="WinRM" image="2" changed="2019-11-05 15:55:48" uid="{FB513581-F2B9-48CB-BE6C-11926C016EC3}">
            <q2:GPOSettingOrder>1</q2:GPOSettingOrder>
            <q2:Properties startupType="AUTOMATIC" serviceName="WinRM" serviceAction="START" timeout="30" />
            <q2:Filters />
          </q2:NTService>
        </q2:NTServices>
      </Extension>
      <Name>Services</Name>
    </ExtensionData>
    <ExtensionData>
      <Extension xmlns:q3="http://www.microsoft.com/GroupPolicy/Settings/WindowsFirewall" xsi:type="q3:WindowsFirewallSettings">
        <q3:GlobalSettings>
          <q3:PolicyVersion>
            <q3:Value>538</q3:Value>
          </q3:PolicyVersion>
        </q3:GlobalSettings>
        <q3:InboundFirewallRules>
          <q3:Version>2.26</q3:Version>
          <q3:Action>Allow</q3:Action>
          <q3:Name>@FirewallAPI.dll,-30253</q3:Name>
          <q3:Dir>In</q3:Dir>
          <q3:App>System</q3:App>
          <q3:Profile>Domain</q3:Profile>
          <q3:Profile>Private</q3:Profile>
          <q3:LPort>5985</q3:LPort>
          <q3:Protocol>6</q3:Protocol>
          <q3:Desc>@FirewallAPI.dll,-30256</q3:Desc>
          <q3:Active>true</q3:Active>
          <q3:EmbedCtxt>@FirewallAPI.dll,-30267</q3:EmbedCtxt>
        </q3:InboundFirewallRules>
      </Extension>
      <Name>Windows Firewall</Name>
    </ExtensionData>
    <ExtensionData>
      <Extension xmlns:q4="http://www.microsoft.com/GroupPolicy/Settings/Registry" xsi:type="q4:RegistrySettings">
        <q4:Policy>
          <q4:Name>Allow remote server management through WinRM</q4:Name>
          <q4:State>Enabled</q4:State>
          <q4:Explain>This policy setting allows you to manage whether the Windows Remote Management (WinRM) service automatically listens on the network for requests on the HTTP transport over the default HTTP port.
 
If you enable this policy setting, the WinRM service automatically listens on the network for requests on the HTTP transport over the default HTTP port.
 
To allow WinRM service to receive requests over the network, configure the Windows Firewall policy setting with exceptions for Port 5985 (default port for HTTP).
 
If you disable or do not configure this policy setting, the WinRM service will not respond to requests from a remote computer, regardless of whether or not any WinRM listeners are configured.
 
The service listens on the addresses specified by the IPv4 and IPv6 filters. The IPv4 filter specifies one or more ranges of IPv4 addresses, and the IPv6 filter specifies one or more ranges of IPv6addresses. If specified, the service enumerates the available IP addresses on the computer and uses only addresses that fall within one of the filter ranges.
 
You should use an asterisk (*) to indicate that the service listens on all available IP addresses on the computer. When * is used, other ranges in the filter are ignored. If the filter is left blank, the service does not listen on any addresses.
 
For example, if you want the service to listen only on IPv4 addresses, leave the IPv6 filter empty.
 
Ranges are specified using the syntax IP1-IP2. Multiple ranges are separated using "," (comma) as the delimiter.
 
Example IPv4 filters:\n2.0.0.1-2.0.0.20, 24.0.0.1-24.0.0.22
Example IPv6 filters:\n3FFE:FFFF:7654:FEDA:1245:BA98:0000:0000-3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562</q4:Explain>
          <q4:Supported>At least Windows Vista</q4:Supported>
          <q4:Category>Windows Components/Windows Remote Management (WinRM)/WinRM Service</q4:Category>
          <q4:EditText>
            <q4:Name>IPv4 filter:</q4:Name>
            <q4:State>Enabled</q4:State>
            <q4:Value>*</q4:Value>
          </q4:EditText>
          <q4:EditText>
            <q4:Name>IPv6 filter:</q4:Name>
            <q4:State>Enabled</q4:State>
            <q4:Value>*</q4:Value>
          </q4:EditText>
          <q4:Text>
            <q4:Name>Syntax:</q4:Name>
          </q4:Text>
          <q4:Text>
            <q4:Name>Type "*" to allow messages from any IP address, or leave the</q4:Name>
          </q4:Text>
          <q4:Text>
            <q4:Name>field empty to listen on no IP address. You can specify one</q4:Name>
          </q4:Text>
          <q4:Text>
            <q4:Name>or more ranges of IP addresses.</q4:Name>
          </q4:Text>
          <q4:Text>
            <q4:Name />
          </q4:Text>
          <q4:Text>
            <q4:Name>Example IPv4 filters:</q4:Name>
          </q4:Text>
          <q4:Text>
            <q4:Name>2.0.0.1-2.0.0.20, 24.0.0.1-24.0.0.22</q4:Name>
          </q4:Text>
          <q4:Text>
            <q4:Name>*</q4:Name>
          </q4:Text>
          <q4:Text>
            <q4:Name />
          </q4:Text>
          <q4:Text>
            <q4:Name>Example IPv6 filters:</q4:Name>
          </q4:Text>
          <q4:Text>
            <q4:Name>3FFE:FFFF:7654:FEDA:1245:BA98:0000:0000-3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562</q4:Name>
          </q4:Text>
          <q4:Text>
            <q4:Name>*</q4:Name>
          </q4:Text>
        </q4:Policy>
      </Extension>
      <Name>Registry</Name>
    </ExtensionData>
  </Computer>
  <User>
    <VersionDirectory>1</VersionDirectory>
    <VersionSysvol>1</VersionSysvol>
    <Enabled>true</Enabled>
  </User>
  <LinksTo>
    <SOMName>jcadb2</SOMName>
    <SOMPath>jcadb2.local</SOMPath>
    <Enabled>true</Enabled>
    <NoOverride>false</NoOverride>
  </LinksTo>
</GPO>