Windows OS Hub
  • Windows Server
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
    • Windows Server 2012 R2
    • Windows Server 2008 R2
    • SCCM
  • Active Directory
    • Active Directory Domain Services (AD DS)
    • Group Policies
  • Windows Clients
    • Windows 11
    • Windows 10
    • Windows 8
    • Windows 7
    • Windows XP
    • MS Office
    • Outlook
  • Virtualization
    • VMWare
    • Hyper-V
    • KVM
  • PowerShell
  • Exchange
  • Cloud
    • Azure
    • Microsoft 365
    • Office 365
  • Linux
    • CentOS
    • RHEL
    • Ubuntu
  • Home
  • About

Windows OS Hub

  • Windows Server
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
    • Windows Server 2012 R2
    • Windows Server 2008 R2
    • SCCM
  • Active Directory
    • Active Directory Domain Services (AD DS)
    • Group Policies
  • Windows Clients
    • Windows 11
    • Windows 10
    • Windows 8
    • Windows 7
    • Windows XP
    • MS Office
    • Outlook
  • Virtualization
    • VMWare
    • Hyper-V
    • KVM
  • PowerShell
  • Exchange
  • Cloud
    • Azure
    • Microsoft 365
    • Office 365
  • Linux
    • CentOS
    • RHEL
    • Ubuntu

 Windows OS Hub / Group Policies / How to Disable or Enable USB Drives in Windows using Group Policy

June 8, 2023 Active DirectoryGroup PoliciesPowerShellWindows 10Windows 11Windows Server 2019

How to Disable or Enable USB Drives in Windows using Group Policy

When you connect a new USB device to your computer, Windows automatically detects the device and installs the appropriate driver. As a result, the user can use the connected USB drive or device almost immediately. If your organization’s security policy prohibits the use of portable USB storage devices (flash drives, USB hard drives, SD cards, etc.), you can block this behavior. In this article, we will show you how to block the use of external USB drives in Windows, prevent writing data to removable flash drives, or prevent executable files from running using Group Policy (GPO).

Contents:
  • Disabling USB Removable Drives in Windows with Group Policy
  • Block USB Drives for Certain Users via GPO
  • Disable Access to USB Drives via Registry and Group Policy Preferences
  • How to Completely Disable USB Storage Devices in Windows?
  • History of Connected USB Drives in Windows
  • Allow Only Specific USB Storage Devices in Windows

Disabling USB Removable Drives in Windows with Group Policy

In Windows, you can flexibly manage access to external drives (USB, CD / DVD, etc.) using Active Directory Group Policies (we do not consider a radical way to disable USB ports through BIOS settings). You can block only USB drives, while other types of USB devices (mouse, keyboard, printer, USB to COM port adapters) that are not recognized as a removable disk will be available to the user.

We are going to block USB drives on all computers in a domain OU named Workstations. You can apply the USB restriction policy to the entire domain, but this will affect the servers and other technological devices.

  1. Open the GPO management console (gpmc.msc), find the Workstations container in the Organizational Unit structure, right-click on it, and create a new policy (Create a GPO in this domain and Link it here);gpmc - Create a GPO in this domain and Link it
    Tip. You can configure a policy to restrict the use of USB ports on a standalone computer (home computer or workgroup computer) using the Local Group Policy Editor (gpedit.msc).
  2. Set the GPO name “Disable USB Access”;Policy Name: Disable USB Access
  3. Switch to GPO edit mode (Edit).Edit GPO

There are settings for blocking external storage devices in both the User and Computer Configuration sections of the GPO editor:

  • User Configuration -> Policies -> Administrative Templates -> System -> Removable Storage Access.
  • Computer Configuration -> Policies -> Administrative Templates -> System -> Removable Storage Access.
If you want to block USB storage devices for all computer users, you need to configure the settings in the “Computer Configuration” GPO section.  

In the Removable Storage Access section, there are several policies allowing you to disable the use of different types of storage classes: CD/DVDs, FDD, USB devices, tapes, etc.

  • CD and DVD: Deny execute access.
  • CD and DVD: Deny read access.
  • CD and DVD: Deny write access.
  • Custom Classes: Deny read access.
  • Custom Classes: Deny write access.
  • Floppy Drives: Deny execute access.
  • Floppy Drives: Deny read access.
  • Floppy Drives: Deny write access.
  • Removable Disks: Deny execute access.
  • Removable Disks: Deny read access.
  • Removable Disks: Deny write access.
  • All Removable Storage classes: Deny all access.
  • All Removable Storage: Allow direct access in remote sessions.
  • Tape Drives: Deny execute access.
  • Tape Drives: Deny read access.
  • Tape Drives: Deny write access.
  • Windows Portable Device – this class includes smartphones, tablets, players, etc.
  • WPD Devices: Deny write access.

As you can see, for each device class you can deny the launch of executable files (protect computers against viruses), prohibit reading data, and writing/editing files on external storage.

Removable Storage Access settings in GPO

You can implement the “strongest” restrict policy All Removable Storage Classes: Deny All Access to completely disable the access to all types of external storage devices. To enable this policy, open its properties and change from Not Configured to Enabled.

All Removable Storage Classes: Deny All Access

After enabling and updating the GPO settings on client computers (gpupdate /force), the Windows will detect the connected external devices (not only USB devices, but also any external drives), but when trying to open them, an error will appear:

Location is not available
Drive is not accessible. Access is denied.

Drive is not accessible. Access is denied

Tip. The same restriction can be set using the registry by creating DWORD parameter Deny_All with the value 00000001 under the registry key HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\RemovableStorageDevices.

In the same policy section, you can configure more flexible restrictions on the use of external USB drives.

For example, to prevent writing data to USB flash drives and other types of USB removable storage, you should enable the policy Removable Disk: Deny write access.

USB Removable Disk: Deny write access

In this case, users will be able to read the data from the USB flash drive, but when they attempt to write information to it, they will receive an access denied error:

Destination Folder Access Denied
You need permission to perform this action

USB media- write Access Denied

You can prevent executable and script files from running from USB drives using the Removable Disks: Deny execute access policy.

Removable Disks: Deny execute access

Block USB Drives for Certain Users via GPO

Quite often it is necessary to block USB drives for all users in the domain except for administrators.

You can use the GPO Security Filtering to make an exception in a policy. For example, you want to prevent the USB blocking policy from being applied to the Domain Admins group

  1. Select your Disable USB Access policy in the Group Policy Management console;
  2. Add the Domain Admins group in the Security Filtering section;block usb policy - security filtering
  3. Go to the Delegation tab and click the Advanced. In the security settings editor, specify that the Domain Admins group is not allowed to apply this GPO (Apply group policy – Deny).

block usb restriction gpo for admin users

There may be another task – you need to allow the use of external USB drives to everyone, except for a certain group of users. Create a security group “Deny USB” and add this group to the security settings of the GPO. For this group, set permissions to read and apply the GPO, and leave only read permission for the Authenticated Users or Domain Computers group (by unchecking the Apply group policy checkbox).

deny gpo applying to authenticated users

Add users to this AD group who need to block access to flash drives and removable USB disks.

Disable Access to USB Drives via Registry and Group Policy Preferences

You can more flexibly control access to external devices by configuring the registry settings that are set by the policies discussed above via the Group Policy Preferences (GPP). All the above policies correspond to certain registry keys in the HKLM (or HKCU) \SOFTWARE\Policies\Microsoft\Windows\RemovableStorageDevices key (by default this registry key is missing).

  1. To enable one of these policies, you must create a new subkey in the specified key with the GUID of the device class you want to block access to (column 2);
  2. In the new registry key, you need to create a REG_DWORD parameter with the name of the restriction that you want to implement:
    Deny_Read — disable reading data from the media class;
    Deny_Write – disable data writing;
    Deny_Execute — denies running executable files from an external media class.
  3. Set the parameter value:
    1 — block the specified type of access to devices of this class;
    0 – allow to use this class of devices.
Group Policy OptionDevice Class GUIDRegistry parameter name
Floppy Drives:
Deny read access
{53f56311-b6bf-11d0-94f2-00a0c91efb8b}Deny_Read
Floppy Drives:
Deny write access
{53f56311-b6bf-11d0-94f2-00a0c91efb8b}Deny_Write
CD and DVD:
Deny read access
{53f56308-b6bf-11d0-94f2-00a0c91efb8b}Deny_Read
CD and DVD:
Deny write access
{53f56308-b6bf-11d0-94f2-00a0c91efb8b}Deny_Write
Removable Disks:
Deny read access
{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Deny_Read
Removable Disks:
Deny write access
{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Deny_Write
Tape Drives:
Deny read access
{53f5630b-b6bf-11d0-94f2-00a0c91efb8b}Deny_Read
Tape Drives:
Deny write access
{53f5630b-b6bf-11d0-94f2-00a0c91efb8b}Deny_Write
WPD Devices:
Deny read access
{6AC27878-A6FA-4155-BA85-F98F491D4F33}
{F33FDC04-D1AC-4E8E-9A30-19BBD4B108AE}
Deny_Read
WPD Devices:
Deny write access
{6AC27878-A6FA-4155-BA85-F98F491D4F33}
{F33FDC04-D1AC-4E8E-9A30-19BBD4B108AE}
Deny_Write

You can create the specified registry keys and parameters manually. In the screenshot below, I’ve created a RemovableStorageDevices key, and a subkey named {53f5630d-b6bf-11d0-94f2-00a0c91efb8b}. Using the REG_DWORD parameters, I prevented writing and running executable files from USB drives.

RemovableStorageDevices set USB write and execute restrictions via registry

Disabling USB storage settings will take effect immediately after the policy is applied (no need to restart your computer). If a USB flash drive is connected to the computer, it will be available until it is reconnected.

To quickly block reading and writing data to USB drives in Windows, you can run the following PowerShell script:

$regkey='HKLM:\Software\Policies\Microsoft\Windows\RemovableStorageDevices\{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}'
$exists = Test-Path $regkey
if (!$exists) {
New-Item -Path 'HKLM:\Software\Policies\Microsoft\Windows\RemovableStorageDevices' -Name '{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}' -Force | Out-Null
}
New-ItemProperty -Path $regkey -Name 'Deny_Read -Value 1 -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -Path $regkey -Name 'Deny_Write' -Value 1 -PropertyType 'DWord' -Force | Out-Null

In a domain environment, you can deploy these registry parameters to user computers using Group Policy Preferences.

You can use these registry keys and GPP’s Item-level targeting to flexibly apply settings that restrict the use of external USB storage devices. You can apply policies to specific AD security groups, sites, OS versions, OUs (you can use even WMI filters).

For example, you can create the Storage-Devices-Restrict domain group and add the computer accounts for which you want to restrict the use of USB drives. This group must be specified in your GPP policy in the Item Level Targeting -> Security Group section with the Computer in Group option. This will apply the USB blocking policy to computers that are added to this AD group.

gpp targeting to security group

Note. Similarly, you can create your own policies for device classes that are not listed here. You can find out the device class ID in the driver properties in the value of the Device Class GUID attribute

How to Completely Disable USB Storage Devices in Windows?

You can completely disable the USBSTOR (USB Mass Storage) driver, which is required to properly detect and mount USB storage devices.

On a standalone computer, you can disable this driver by changing the value of the Start registry parameter from 3 to 4. You can do this through PowerShell:

Set-ItemProperty "HKLM:\SYSTEM\CurrentControlSet\services\USBSTOR" -name Start -Value 4

disable usbstor service in registry

Restart your computer and try to connect your USB storage device. Now it shouldn’t appear in File Explorer or Disk Management console, and you will see a device driver installation error in Device Manager.

You can disable the USBSTOR driver from running on domain computers using Group Policy Preferences. To do this, you need to make changes to the registry through the GPO.

These settings can be deployed to all domain computers. Create a new Group Policy, link it to the OU with computers and in the Computer Configuration -> Preferences -> Windows Settings -> Registry section, create a new parameter with the values:

  • Action: Update
  • Hive: HKEY_LOCAK_MACHINE
  • Key path: SYSTEM\CurrentControlSet\Services\USBSTOR
  • Value name: Start
  • Value type: REG_DWORD
  • Value data: 00000004

gpo to disable usbstor driver on domain computers

History of Connected USB Drives in Windows

When troubleshooting USB media blocking policies, you need to get the information about the history of connecting USB drives to a computer.

To list the USB drives currently connected to the computer, use the following PowerShell command:

Get-PnpDevice -PresentOnly | Where-Object { $_.deviceId -match '^USBSTOR' }

powershell: get list of connected usb drives in windows

Status OK indicates that this USB drive is connected and working properly.

The Windows event log allows you to track events of connecting/ejecting USB drives.

  1. You can find these events in Event Viewer -> Application and Services Logs -> Windows -> Microsoft-Windows-DriverFrameworks-UserMode -> Operational;
  2. By default, Windows doesn’t save a history of USB storage connections. So you will have to enable it manually (Enable Log) or via GPO;enable usb connection logs in windows event viewer
  3. Now you can use the EventID 2003 (Pnp or Power Management operation to a particular device) to get information about when the USB drive was connected and Event ID 2102 (Pnp or Power Management operation to a particular device) about the ejection of the flash drive: usbstorage connecting eventid 2102
    Forwarded a finished Pnp or Power operation (27, 2) to the lower driver for device SWD\WPDBUSENUM\_??_USBSTOR#DISK&VEN_UFD_2.0&PROD_SILICON-POWER16G&REV_PMAP#89283229E6C10D23CE7200A2&2#{12234567-B6BF-11D0-2233-00A0AFBB3321F} with status 0x0.

You can also use the free USBDriveLog tool from Nirsoft, which allows you to display the entire history of connecting USB drives to the user’s computer (displays information about the device, serial number, manufacturer, connection/disconnection time, and device id).

usbdrivelog nirsoft: show usb drive connection history

Allow Only Specific USB Storage Devices in Windows

On Windows, you can only allow certain (approved) USB drives to connect to your computer.

When you connect any USB storage device to the computer, the USBSTOR driver installs the device and creates a separate registry key under the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR. This registry key contains information about the USB drive (for example, Disk & Ven_Kingstom & Prod_DT_1010_G2 & Rev_12.00).

usbstor registry key

You can list the USB drives that have ever been connected to your computer with the following PowerShell command:

Get-ItemProperty –Path HKLM:\SYSTEM\CurrentControlSet\Enum\USBSTOR\*\*| select FriendlyName

usbstor - usb devices connection history in registry

Delete all entries for previously connected USB flash drives, except for the ones you need. Then you need to change the permissions on the USBSTOR registry key so that all users, including SYSTEM and administrators, have only read permissions. As a result, if you connect any USB drive other than the allowed one, Windows won’t be able to install the device.

You can also run a specific command/script when a USB connecting EventID appears in the Event Viewer (here is a detailed example of how to run a process when a specific event occurs). For example, you can make a simple PowerShell script that automatically ejects any USB drives if the serial number doesn’t match the one given in the script:

$usbdev = get-wmiobject win32_volume | where{$_.DriveType -eq '2'}
If ($usbdev.SerialNumber –notlike “31DF1233BKAD”)
{
$usbdev.DriveLetter = $null
$usbdev.Put()
$usbdev.Dismount($false,$false) | Out-Null

powershell: eject not allowed usb drive

Thus, you can perform the simplest check of USB flash drives connected to the computer.

20 comments
6
Facebook Twitter Google + Pinterest
previous post
Adding Domain Users to the Local Administrators Group in Windows
next post
Configuring Multiple VLAN Interfaces on Windows

Related Reading

Zabbix: How to Get Data from PowerShell Scripts

October 27, 2023

Tracking Printer Usage with Windows Event Viewer Logs

October 19, 2023

PowerShell: Configure Certificate-Based Authentication for Exchange Online (Azure)

October 15, 2023

How to Query and Change Teams User Presence...

October 8, 2023

How to Use Ansible to Manage Windows Machines

September 25, 2023

20 comments

jack September 12, 2016 - 7:18 pm

Have you test it on Windows 10?
I have tested it on Windows 10 Pro, but it is not work.  The policy is applied but the USB is not denied.
AD is Windows Server 2008 r2 and Windows 10 admx is installed.

Reply
admin September 20, 2016 - 5:11 am

I have not tested this policy on clients Windovs 10.
Can you check that the policy is working correctly on older clients (Win 7, 8.1)?

Reply
Ravinder Jaiswal October 10, 2016 - 10:47 am

I configured the GPO but it is not working on Win7. DC is 2008 R2.
The policy is applied but the USB is not denied.

Reply
Olrudy November 20, 2018 - 2:38 pm

Avez-vous pensé à désinstaller le périphérique USB au préalable ?

Reply
Mohammed Alshambaty September 21, 2020 - 7:03 am

By mistake i made the same but i evoked the policy but the USB is still blocked im also using win server 2008R2

Reply
Gary February 2, 2017 - 5:22 am

Can you teach how to limit to which user log-in to disable USB mass storage drive?

Reply
admin February 22, 2017 - 7:01 am

You can use GPO Security Filtering or GPO Delegation to allow/deny some users or group to apply this policy

Reply
amir August 23, 2017 - 5:00 am

A domain administrator disable usb access in GPO. How can i Enable in a local computer

Reply
admin August 30, 2017 - 4:40 am

Do you have local admin permissions on your workstation?

Reply
Jennifer November 27, 2018 - 2:42 pm

Hi, I applied this policy to the entire domain and added the administrators group as a deny as instructed above. When I go to test the usb as an administrator I can not access the usb.
What am I doing wrong?

Reply
admin December 4, 2018 - 12:50 pm

Do you linked the “Disable USB Access” policy to an OU with computers or users? Which GPP section is configured?

Reply
John Ree February 8, 2019 - 12:55 am

We’re using ThreatLocker in our company. It’s easy to manage and allows creating organization, groups and computer policies for blocking USB devices, DVD/BD, etc. It also helps with permitting or denying path access to our fileservers and application whitelisting.

Reply
phan anh July 23, 2019 - 1:09 pm

how to configure deny virtua usb

Reply
Roobeen Chummun July 25, 2019 - 6:17 am

Hello

i followed your steps above and it worked perfectly

however, lets say i have a user named John Smith and want to grant access only to John smith and all other are blocked

how do i proceed??

Reply
MR MUSTASHE September 11, 2019 - 2:54 am

Hi!…    
.
Does “Network Discovery”… whether On or Off!… apply to Folders and/ or Files within one’s USB/ Flash Drive, or just Folders and/ or Files within one’s Hard Drive? And if the answer be the latter, then how can Folders and/ or Files within one’s USB/ Flash Drive be shielded from EXTERNAL NETWORK DISCOVERY (i.e., EXTERNAL to one’s LOCALLY NETWORKED computer/ computers) when one is interprocessing data between one’s USB/ Flash Drive and one’s Hard Drive, or between another LOCALLY CONNECTED USB/ Flash Drive, or other USBs/ Flash Drives connected to one’s LOCALLY NETWORKED computer/ computers?… and, whether– and for example– adding or removing Folders and/ or Files, or copying and/ or pasting Folders and/ or Files to and/ or from one’s Hard Drive(s), or to and/ or from another LOCALLY CONNECTED USB/ Flash Drive or other USBs/ Flash Drives.
.
Further, unless one has downloaded material from a “Web source” to one’s USB… the which, may result in one receiving a “hidden algorithm (e.g., a cookie)” that will “Discover” other personal content on one’s USB/ Flash Drive (like a “trojan algorithm” that/ which can “open one’s USB door” afterupon its entry into one’s system)… I can see no way that a web source should be able to “Discover” other content within one’s USB(s)/ Flash Drive(s) when one is “PASSIVELY USING” one’s USB/ Flash Drive in association with one’s Hard Drive (i.e., adding or removing NEUTRAL Folders and/ or Files, or copying and/ or pasting NEUTRAL Folders and/ or Files!… i.e., those “NONPROPRIETARILY TAGGED”, from PROPRIETARY DOWNLOADS). Nevertheless, if “Network Discovery” does not generally apply to USBs/ Flash Drives, then even PASSIVE FOLDERS AND FILES within one’s USB(s)/ Flash Drive(s) may be routinely Discovered hundreds, or even thousands of miles away (and within seconds) by any number of Web sources. And, unbeknown to hapless netizens.
.
In my case, I want to deny EXTERNAL NETWORK DISCOVERY by way of an EXTERNAL WEB SOURCE’s USB(s)/ Flash Drive(s), of any data/ content within my USB(s)/ Flash Drive(s) LOCALLY CONNECTED to my locally networked computer/ computers, and any data/ content within another LOCALLY CONNECTED USB/ Flash Drive, or other USBs/ Flash Drives… in contrast to denying a permitted LOCALLY CONNECTED USB/ Flash Drive or other USBs/ Flash Drives locally networked to my computer/ computers, set up to accesss data/ content within my locally networked computer’s/ computers’ Hard Drive(s), or within a locally networked USB/ Flash Drive or USBs/ Flash Drives. In other words, I want an allowed LOCALLY CONNECTED USB/ Flash Drive that/ which is connected to my locally networked computer/ computers to locally process data/ content (whether on a HDD/ HDDs, or on another LOCALLY CONNECTED USB/ Flash Drive or other USBs/ Flash Drives), but not an EXTERNAL WEB SOURCE’s USBs/ Flash Drives that/ which are not a part of my LOCALLY NETWORKED computer/ computers!
.
No emails please!

Reply
Javier Arrospide August 15, 2022 - 3:15 pm

An alternative to all this is USB-Lock-RP.

Reply
dk June 23, 2023 - 2:11 pm

Restore Missing CD/DVD Drive in Window by resetting the custom CD/DVD settings in the registry:
1) Start regedit.exe
2) Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E965-E325-11CE-BFC1-08002BE10318}
3) Find and delete the keys UpperFilters and LowerFilters
4) Restart computer

Reply
Kevin October 23, 2023 - 2:02 pm

Hello, I have followed the instructions in this tutorial, and my USB drive is now disabled, thank you! Now however, management would like several users to have USB access no matter what PC they log into. My ‘Block USB’ is a user policy, and now has an AD group with ‘deny apply GPO’, and the group of users still gets access denied to USB drives. It seems the policy cannot be ‘undone’ without unlinking the policy from the OU. Any ideas?

Reply
admin October 25, 2023 - 6:11 am

What exactly is the policy you are implementing to disable USB devices?
You should apply the settings using the User Configuration section rather than the Computer Configuration section. You can then use Security Filtering to make an exception to the policy.

Reply
Javier Arrospide October 25, 2023 - 11:29 am

It’s a better idea to assign a specific device to a user
and then to authorize:
specific devices, on specific machines
or
specific devices, on groups of machines.

Reply

Leave a Comment Cancel Reply

Categories

  • Active Directory
  • Group Policies
  • Exchange Server
  • Microsoft 365
  • Azure
  • Windows 11
  • Windows 10
  • Windows Server 2022
  • Windows Server 2019
  • Windows Server 2016
  • PowerShell
  • VMWare
  • Hyper-V
  • Linux
  • MS Office

Recent Posts

  • Zabbix: How to Get Data from PowerShell Scripts

    October 27, 2023
  • Tracking Printer Usage with Windows Event Viewer Logs

    October 19, 2023
  • PowerShell: Configure Certificate-Based Authentication for Exchange Online (Azure)

    October 15, 2023
  • Reset Root Password in VMware ESXi

    October 12, 2023
  • How to Query and Change Teams User Presence Status with PowerShell

    October 8, 2023
  • How to Increase Size of Disk Partition in Ubuntu

    October 5, 2023
  • How to Use Ansible to Manage Windows Machines

    September 25, 2023
  • Installing Language Pack in Windows 10/11 with PowerShell

    September 15, 2023
  • Configure Email Forwarding for Mailbox on Exchange Server/Microsoft 365

    September 14, 2023
  • How to View and Change BIOS (UEFI) Settings with PowerShell

    September 13, 2023

Follow us

  • Facebook
  • Twitter
  • Telegram
Popular Posts
  • Configure Google Chrome Settings with Group Policy
  • Get-ADUser: Find Active Directory User Info with PowerShell
  • Allow Non-admin Users RDP Access to Windows Server
  • How to Find the Source of Account Lockouts in Active Directory
  • Get-ADComputer: Find Computer Properties in Active Directory with PowerShell
  • Configuring Proxy Settings on Windows Using Group Policy Preferences
  • Refresh AD Groups Membership without Reboot/Logoff
Footer Logo

@2014 - 2023 - Windows OS Hub. All about operating systems for sysadmins


Back To Top