Select Page

Group Policy Blog by Darren Mar-Elia (The “GPOGUY”)

Managing Windows Services using Group Policy

Happy New Year! On Twitter recently (sorry, I can't bring myself to call it 'X') there was a thread about managing Windows Services using GP. The poster talked about using the setting area under Computer Configuration\Policies\Windows Settings\Security Settings\System...

SwiftSlicer Malware and Group Policy

You may have caught the recent article about a new malware variant, called SwiftSlicer--attributed to a Russian APT group--that is making its way around Active Directory environments. There's not a ton of details about how this malware is delivered, but the one detail...

Removing Orphaned Delegation on GPOs

One of the annoying things about Group Policy, is that delegations to GPOs are not cleaned up when the underlying security principal (e.g. user, computer or group) is deleted in Active Directory. For example, if you create a security filter on a GPO for a particular...

SDM Software and CVE-2021-44228

We've had several customers ask us about the very widely reported CVE-2021-44228 "Log4j" vulnerability. We have reviewed our products and confirmed that none of SDM Software's solutions use or rely on Log4j for any functions and therefore are not subject to this...

Categories