Out Now: Group Policy Settings spread sheet for Windows 8.1, Windows Server 2012 R2 and Internet Explorer 11

excel2013

Update: It’s been pointed out that column D does represent if it is a new policy setting which has revealed many more settings.

The complete reference guild to all the new Windows 8 group policy setting has now been published. A quick search through this spread sheet show there are 216 new administrative settings (27 161 Unique) specific to Windows 8.1, Windows Server 2012 R2.

For your references below is a list of all the new Group Policy Administrator Template settings. (There does not appear to be any new security settings).

Allow development of Windows Store apps without installing a developer license 
Prevent enabling lock screen slide show
Prevent enabling lock screen camera
Force a specific background and accent color
Force a specific Start background
Force a specific default lock screen image
Allow users to select when a password is required when resuming from connected standby
Restrict delegation of credentials to remote servers
Prevent adding
App switching
Charms
WinX
Automatically send memory dumps for OS-generated error reports
Configure Group Policy Caching
Configure Logon Script Delay
Turn off loading websites and content in the background to optimize performance
Turn on the swiping motion on Internet Explorer for the desktop
Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows
Allow Internet Explorer to use the SPDY/3 network protocol
Turn off phone number detection
Allow Microsoft services to provide enhanced suggestions as the user types in the Address bar
Prevent deleting ActiveX Filtering
Allow cut
Don’t run antimalware programs against ActiveX controls
KDC support for claims
Kerberos client support for claims
Automatic Maintenance Random Delay
Use DNS name resolution when a single-label domain name is used
At logoff
Run Windows PowerShell scripts first at computer startup
Run Windows PowerShell scripts first at user logon
Disable indexing of removable drives
Don’t search the web or display web results in Search
Don’t search the web or display web results in Search over metered connections
Set what information is shared in Search
Set the SafeSearch setting for Search
Do not sync Apps
Do not sync start settings
Pin Apps to Start when installed
Start Screen Layout
Remove and prevent access to the Shut Down
Default
Default app
Default search
Sort
Multimon
For tablet pen input
For touch input
Include rarely used Chinese
Set remote control session UAC desktop
Set remote control permission request timeout
Use advanced RemoteFX graphics for RemoteApp
Enable Remote Desktop Protocol 8.0
User management of sharing user name
Choose drive encryption method and cipher strength (Windows Vista
Configure TPM platform validation profile (Windows Vista
Allow antimalware service to startup with normal priority
Turn on virus definitions
Configure local administrator merge behavior for lists
Define addresses to bypass proxy server
Define proxy server for connecting to the network
Randomize scheduled task times
Allow antimalware service to remain running always
Extension Exclusions
Path Exclusions
Process Exclusions
Turn on protocol recognition
Turn on definition retirement
Define the rate of detection events for logging
IP address range Exclusions
Port number  Exclusions
Process Exclusions for outbound traffic
Threat ID Exclusions
Specify additional definition sets for network traffic inspection
Configure local setting override for the removal of items from Quarantine folder
Configure removal of items from Quarantine folder
Turn on behavior monitoring
Turn on Information Protection Control
Turn on network protection against exploits of known vulnerabilities
Scan all downloaded files and attachments
Monitor file and program activity on your computer
Turn on raw volume write notifications
Turn on process scanning whenever real-time protection is enabled
Define the maximum size of downloaded files and attachments to be scanned
Configure local setting override for turn on behavior monitoring
Configure local setting override for monitoring file and program activity on your computer
Configure local setting override to turn off Intrusion Prevention System
Configure local setting override for scanning all downloaded files and attachments
Configure local setting override to turn on real-time protection
Configure local setting override for monitoring for incoming and outgoing file activity
Configure monitoring for incoming and outgoing file and program activity
Configure local setting override for the time of day to run a scheduled full scan to complete remediation
Specify the day of the week to run a scheduled full scan to complete remediation
Specify the time of day to run a scheduled full scan to complete remediation
Configure time out for detections requiring additional action
Configure time out for detections in critically failed state
Configure Watson events
Configure time out for detections in non-critical failed state
Configure time out for detections in recently remediated state
Configure Windows software trace preprocessor components
Configure WPP tracing level
Allow users to pause scan
Specify the maximum depth to scan archive files
Specify the maximum size of archive files to be scanned
Specify the maximum percentage of CPU utilization during a scan
Scan archive files
Turn on catch-up full scan
Turn on catch-up quick scan
Turn on e-mail scanning
Turn on heuristics
Scan packed executables
Scan removable drives
Turn on reparse point scanning
Create a system restore point
Run full scan on mapped network drives
Scan network files
Configure local setting override for maximum percentage of CPU utilization
Configure local setting override for the scan type to use for a scheduled scan
Configure local setting override for schedule scan day
Configure local setting override for scheduled quick scan time
Configure local setting override for scheduled scan time
Turn on removal of items from scan history folder
Specify the interval to run quick scans per day
Start the scheduled scan only when computer is on but not in use
Specify the scan type to use for a scheduled scan
Specify the day of the week to run a scheduled scan
Specify the time for a daily quick scan
Specify the time of day to run a scheduled scan
Define the number of days before spyware definitions are considered out of date
Define the number of days before virus definitions are considered out of date
Define file shares for downloading definition updates
Turn on scan after signature update
Allow definition updates when running on battery power
Initiate definition update on startup
Define the order of sources for downloading definition updates
Allow definition updates from Microsoft Update
Allow real-time definition updates based on reports to Microsoft MAPS
Specify the day of the week to check for definition updates
Specify the time to check for definition updates
Allow notifications to disable definitions based reports to Microsoft MAPS
Define the number of days after which a catch-up definition update is required
Specify the interval to check for definition updates
Check for the latest virus and spyware definitions on startup
Configure local setting override for reporting to Microsoft MAPS
Specify threats upon which default action should not be taken when detected
Specify threat alert levels at which default action should not be taken when detected
Display notifications to clients when they need to perform actions
Display additional text to clients when they need to perform an action
Always automatically restart at the scheduled time
Specify Work Folders settings
Turn off tile notifications
Turn off toast notifications
Turn off toast notifications on the lock screen
Turn off notifications network usage
Turn off Quiet Hours
Set the time Quiet Hours begins each day
Set the time Quiet Hours ends each day
Turn off calls during Quiet Hours
Set 3G Cost
Set 4G Cost

Unfortunately, Microsoft has removed the Reboot Required, Logoff Required Require Schema and Status columns that were introduced in the Windows 8/2012 version. But if you need this information you can still download that version from the same page.

 

Download Link http://www.microsoft.com/en-us/download/details.aspx?id=25250

6 Comments

Leave a Reply

Your email address will not be published. Required fields are marked *