My Works

Group Policy (GPO) — Domain Governance & Configuration Management

Group Policy (GPO) — Domain Governance & Configuration Management

Overview

Designed and deployed a comprehensive suite of Group Policy Objects (GPOs) to enforce consistent governance, security, and configuration management across all domain-joined office and POS computers at 12 sites. Policies are centrally managed via Active Directory and applied automatically — ensuring every machine is configured correctly without manual intervention at individual sites.

Problem Being Solved

With 12 sites and over a hundred machines, manual configuration was not scalable. Computers had inconsistent browser bookmarks, irregular restart schedules leading to performance degradation, ad-hoc software installation without governance, and inconsistent firewall configurations creating security gaps. A centralised policy management approach was needed to enforce standards at scale.

Policies Implemented

Managed Edge Bookmarks

  • GPO deployed to push a standardised set of managed bookmarks to Microsoft Edge on all machines
  • Bookmarks include links to internal systems, SharePoint portals, supplier login pages, and key tools
  • Managed bookmarks appear in a dedicated "Company" folder in Edge — users cannot delete them
  • Updates to the bookmark list automatically propagate to all machines on next policy refresh
  • Ensures all staff have consistent, quick access to key resources without IT support tickets

Scheduled Auto-Restart

  • GPO configured to schedule automatic restarts for all office and POS computers every week
  • Restarts timed for low-activity periods (e.g., Sunday 2 AM) to avoid business disruption
  • Ensures machines apply pending Windows updates, clear memory leaks, and start fresh each week
  • Reduces IT support calls related to slow machines, software hangs, and update-related issues
  • Notification shown to users before restart to save work if logged in outside scheduled hours

Logon Script Execution & App Installation

  • GPO assigns logon and startup scripts that run automatically when users log in or machines start
  • Scripts handle: drive mapping, printer mapping by site, environment variable setup, and silent app installations
  • Applications deployed via GPO software installation (MSI packages) or script-driven installers
  • Ensures required tools are present on every machine without manual IT visits to each site
  • Scripts conditionally check whether software is already installed — idempotent execution prevents reinstalls

Domain-Wide Firewall Rules

  • GPO used to enforce Windows Defender Firewall rules consistently across all domain computers
  • Rules define which inbound/outbound ports and applications are allowed or blocked by default
  • Business-critical application ports explicitly whitelisted; all unnecessary inbound traffic blocked
  • Firewall profiles (Domain, Private, Public) configured appropriately for each machine class
  • Centralised rules prevent individual users or local admins from disabling firewall protection
  • Audit logging enabled for blocked connections to detect potential intrusion attempts

Additional Governance Policies

  • Password Policy: Enforced minimum length, complexity, and rotation requirements domain-wide
  • Screen Lock: Automatic screen lock after inactivity threshold on all machines
  • USB Restrictions: Removable storage restricted on POS machines to reduce data exfiltration risk
  • Software Restriction: Blocked execution of unauthorised executables from temp directories
  • Windows Update: WSUS/update settings managed via GPO to control patch deployment timing

Desired State Configuration via Task Scheduler

  • Built a custom Desired State Configuration (DSC) system using Windows Task Scheduler and PowerShell scripts deployed via GPO
  • Scheduled task runs every 30 minutes on all POS machines — checking whether required POS applications are running
  • Script enumerates a defined list of critical POS processes; if any are not running, it automatically relaunches them
  • Handles edge cases: detects crashed processes, hung instances, and services that failed to start after a restart
  • Operates silently in the background — no user interaction required; store staff are unaffected
  • Significantly reduces POS downtime and eliminates the need for staff to call IT when an app closes unexpectedly
  • Task and script deployed centrally via GPO — any new POS machine joining the domain receives it automatically

GPO Architecture

  • GPOs organised in Active Directory using an OU (Organisational Unit) hierarchy: Company → Sites → Roles
  • Policies scoped by OU to ensure site-specific and role-specific configurations where needed
  • GPO inheritance and blocking used deliberately to handle exceptions (e.g., IT admin workstations)
  • Security filtering applied to target specific machine groups without affecting unintended OUs
  • All GPOs documented with naming conventions and purpose descriptions for maintainability
  • gpresult and Group Policy Management Console used for verification and troubleshooting

Outcome & Impact

  • Consistent configuration enforced across all 12 sites and dozens of machines — no manual per-machine setup
  • Security posture improved significantly with standardised firewall rules, password policies, and USB restrictions
  • IT support tickets reduced — bookmarks, printers, and drives are always correctly configured
  • Machines perform better week-to-week thanks to regular scheduled restarts and update enforcement
  • Scalable — new machines joining the domain automatically receive all policies
  • Audit capability improved — central logging and policy enforcement provides a clear compliance record

Skills & Tools Used

  • Active Directory — OU design, GPO linking, security filtering, and inheritance management
  • Group Policy Management Console (GPMC) — GPO creation, editing, and troubleshooting
  • Windows Defender Firewall — inbound/outbound rule design via GPO
  • PowerShell / Batch scripting — logon scripts, startup scripts, conditional app installation
  • Microsoft Edge administrative templates — managed bookmarks, browser policy enforcement
  • Windows Server — WSUS integration, DNS, and domain services administration
  • Security hardening — CIS benchmark principles applied to domain policy design