{"id":198,"date":"2026-05-02T02:11:03","date_gmt":"2026-05-02T00:11:03","guid":{"rendered":"https:\/\/eryann.fr\/?p=198"},"modified":"2026-05-02T14:07:39","modified_gmt":"2026-05-02T12:07:39","slug":"fiche-gpo-strategies-de-groupe-sous-active-directory","status":"publish","type":"post","link":"https:\/\/eryann.fr\/index.php\/windows\/fiche-gpo-strategies-de-groupe-sous-active-directory\/","title":{"rendered":"Fiche gpo : strat\u00e9gies de groupe sous active directory"},"content":{"rendered":"\n<p>Les <strong>GPO (Group Policy Objects)<\/strong> permettent de configurer et s\u00e9curiser les postes et utilisateurs d\u2019un domaine Active Directory.<\/p>\n\n\n\n<p>Elles servent \u00e0 :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>appliquer des r\u00e8gles automatiquement<\/li>\n\n\n\n<li>s\u00e9curiser les postes<\/li>\n\n\n\n<li>standardiser les configurations<\/li>\n<\/ul>\n\n\n\n<p>Objectif de cette fiche :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>comprendre le fonctionnement des GPO<\/li>\n\n\n\n<li>savoir les cr\u00e9er<\/li>\n\n\n\n<li>appliquer des cas concrets utiles en BTS et en entreprise<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Commandes et outils (bloc unique)<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code># Ouvrir la console GPO<br>gpmc.msc<br><br># Mettre \u00e0 jour les strat\u00e9gies<br>gpupdate \/force<br><br># V\u00e9rifier les GPO appliqu\u00e9es<br>gpresult \/r<br><br># Rapport complet<br>gpresult \/h rapport.html<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Fonctionnement des GPO<\/h2>\n\n\n\n<p>Une GPO est li\u00e9e \u00e0 :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>un domaine<\/li>\n\n\n\n<li>une OU (unit\u00e9 d\u2019organisation)<\/li>\n<\/ul>\n\n\n\n<p>Elle peut s\u2019appliquer :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>aux utilisateurs<\/li>\n\n\n\n<li>aux ordinateurs<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Ordre d\u2019application<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Local<\/li>\n\n\n\n<li>Site<\/li>\n\n\n\n<li>Domaine<\/li>\n\n\n\n<li>OU<\/li>\n<\/ol>\n\n\n\n<p>La derni\u00e8re appliqu\u00e9e a priorit\u00e9<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Cr\u00e9ation d\u2019une GPO (interface graphique)<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Ouvrir <strong>Group Policy Management (gpmc.msc)<\/strong><\/li>\n\n\n\n<li>Clic droit sur une OU<\/li>\n\n\n\n<li><strong>Create a GPO in this domain and Link it here<\/strong><\/li>\n\n\n\n<li>Nommer la GPO<\/li>\n\n\n\n<li><strong>Edit<\/strong><\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Structure d\u2019une GPO<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Computer Configuration \u2192 param\u00e8tres machine<\/li>\n\n\n\n<li>User Configuration \u2192 param\u00e8tres utilisateur<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Cas pratiques (indispensables)<\/h1>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">1. Bloquer le panneau de configuration<\/h2>\n\n\n\n<p>Chemin :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>User Configuration<br>\u2192 Administrative Templates<br>\u2192 Control Panel<br>\u2192 Prohibit access to Control Panel<\/code><\/pre>\n\n\n\n<p>Explication :<br>Emp\u00eache les utilisateurs de modifier la configuration du poste.<br>Utile en environnement scolaire ou entreprise.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">2. Imposer un mot de passe fort<\/h2>\n\n\n\n<p>Chemin :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Computer Configuration<br>\u2192 Windows Settings<br>\u2192 Security Settings<br>\u2192 Account Policies<br>\u2192 Password Policy<\/code><\/pre>\n\n\n\n<p>Configurer :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>longueur minimale<\/li>\n\n\n\n<li>complexit\u00e9 activ\u00e9e<\/li>\n<\/ul>\n\n\n\n<p>Explication :<br>Emp\u00eache les mots de passe faibles.<br>R\u00e9duit fortement les risques de compromission.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">3. Verrouillage automatique de session<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>User Configuration<br>\u2192 Administrative Templates<br>\u2192 Control Panel<br>\u2192 Personalization<br>\u2192 Screen saver timeout<\/code><\/pre>\n\n\n\n<p>Explication :<br>Verrouille automatiquement les postes inutilis\u00e9s.<br>\u00c9vite les acc\u00e8s non autoris\u00e9s.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">4. D\u00e9sactiver les ports USB<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>Computer Configuration<br>\u2192 Administrative Templates<br>\u2192 System<br>\u2192 Removable Storage Access<\/code><\/pre>\n\n\n\n<p>Explication :<br>Emp\u00eache l\u2019exfiltration de donn\u00e9es via cl\u00e9 USB.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">5. Mapper un lecteur r\u00e9seau<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>User Configuration<br>\u2192 Preferences<br>\u2192 Windows Settings<br>\u2192 Drive Maps<\/code><\/pre>\n\n\n\n<p>Explication :<br>Permet de connecter automatiquement un partage r\u00e9seau.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">6. Script de connexion (logon)<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>User Configuration<br>\u2192 Windows Settings<br>\u2192 Scripts (Logon\/Logoff)<\/code><\/pre>\n\n\n\n<p>Explication :<br>Automatise des actions au login (montage, config\u2026).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">7. D\u00e9ployer un fond d\u2019\u00e9cran<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>User Configuration<br>\u2192 Administrative Templates<br>\u2192 Desktop<br>\u2192 Desktop Wallpaper<\/code><\/pre>\n\n\n\n<p>Explication :<br>Uniformise l\u2019environnement utilisateur.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">8. Restreindre l\u2019acc\u00e8s \u00e0 une application<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>User Configuration<br>\u2192 Administrative Templates<br>\u2192 System<br>\u2192 Run only specified Windows applications<\/code><\/pre>\n\n\n\n<p>Explication :<br>Limite les applications utilisables.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">9. Configuration du pare-feu Windows<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>Computer Configuration<br>\u2192 Windows Settings<br>\u2192 Security Settings<br>\u2192 Windows Defender Firewall<\/code><\/pre>\n\n\n\n<p>Explication :<br>Permet de g\u00e9rer les r\u00e8gles firewall sur tous les postes.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">10. Mise \u00e0 jour automatique Windows<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>Computer Configuration<br>\u2192 Administrative Templates<br>\u2192 Windows Update<\/code><\/pre>\n\n\n\n<p>Explication :<br>Assure que les machines sont \u00e0 jour.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">V\u00e9rification des GPO<\/h1>\n\n\n\n<pre class=\"wp-block-code\"><code>gpresult \/r<\/code><\/pre>\n\n\n\n<p>Explication :<br>Permet de v\u00e9rifier quelles GPO sont appliqu\u00e9es \u00e0 un utilisateur.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Erreurs fr\u00e9quentes<\/h1>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">GPO non appliqu\u00e9e<\/h3>\n\n\n\n<p>Causes :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>mauvaise OU<\/li>\n\n\n\n<li>probl\u00e8me DNS<\/li>\n\n\n\n<li>pas de gpupdate<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Conflit de GPO<\/h3>\n\n\n\n<p> plusieurs r\u00e8gles oppos\u00e9es<\/p>\n\n\n\n<p>Solution :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>v\u00e9rifier priorit\u00e9<\/li>\n\n\n\n<li>utiliser gpresult<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Mauvais ciblage<\/h3>\n\n\n\n<p> GPO appliqu\u00e9e au mauvais groupe<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Bonnes pratiques<\/h1>\n\n\n\n<ul class=\"wp-block-list\">\n<li>organiser les OU correctement<\/li>\n\n\n\n<li>nommer clairement les GPO<\/li>\n\n\n\n<li>tester avant d\u00e9ploiement<\/li>\n\n\n\n<li>documenter les r\u00e8gles<\/li>\n\n\n\n<li>\u00e9viter les GPO trop larges<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">R\u00e9capitulatif<\/h1>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>\u00c9l\u00e9ment<\/th><th>R\u00f4le<\/th><\/tr><\/thead><tbody><tr><td>GPO<\/td><td>r\u00e8gles centralis\u00e9es<\/td><\/tr><tr><td>OU<\/td><td>organisation<\/td><\/tr><tr><td>gpupdate<\/td><td>mise \u00e0 jour<\/td><\/tr><tr><td>gpresult<\/td><td>v\u00e9rification<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusion<\/h1>\n\n\n\n<p>Les GPO permettent :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>de s\u00e9curiser un parc informatique<\/li>\n\n\n\n<li>de standardiser les configurations<\/li>\n\n\n\n<li>de gagner du temps en administration<\/li>\n<\/ul>\n\n\n\n<p>C\u2019est une comp\u00e9tence cl\u00e9 en BTS et en entreprise.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Suite logique<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>gestion utilisateurs \/ groupes<\/li>\n\n\n\n<li>int\u00e9gration client au domaine<\/li>\n\n\n\n<li>s\u00e9curit\u00e9 avanc\u00e9e AD<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><audio autoplay=\"\"><\/audio><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les GPO (Group Policy Objects) permettent de configurer et s\u00e9curiser les postes et utilisateurs d\u2019un domaine Active Directory. Elles servent \u00e0 : Objectif de cette fiche : Commandes et outils (bloc unique) Fonctionnement des GPO Une GPO est li\u00e9e \u00e0 : Elle peut s\u2019appliquer : Ordre d\u2019application La derni\u00e8re appliqu\u00e9e a priorit\u00e9 Cr\u00e9ation d\u2019une GPO [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[13],"tags":[],"class_list":["post-198","post","type-post","status-publish","format-standard","hentry","category-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fiche gpo : strat\u00e9gies de groupe sous active directory - Eryann Breizh SecOps<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eryann.fr\/index.php\/windows\/fiche-gpo-strategies-de-groupe-sous-active-directory\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fiche gpo : strat\u00e9gies de groupe sous active directory - Eryann Breizh SecOps\" \/>\n<meta property=\"og:description\" content=\"Les GPO (Group Policy Objects) permettent de configurer et s\u00e9curiser les postes et utilisateurs d\u2019un domaine Active Directory. Elles servent \u00e0 : Objectif de cette fiche : Commandes et outils (bloc unique) Fonctionnement des GPO Une GPO est li\u00e9e \u00e0 : Elle peut s\u2019appliquer : Ordre d\u2019application La derni\u00e8re appliqu\u00e9e a priorit\u00e9 Cr\u00e9ation d\u2019une GPO [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eryann.fr\/index.php\/windows\/fiche-gpo-strategies-de-groupe-sous-active-directory\/\" \/>\n<meta property=\"og:site_name\" content=\"Eryann Breizh SecOps\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-02T00:11:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-02T12:07:39+00:00\" \/>\n<meta name=\"author\" content=\"wpadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wpadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/windows\\\/fiche-gpo-strategies-de-groupe-sous-active-directory\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/windows\\\/fiche-gpo-strategies-de-groupe-sous-active-directory\\\/\"},\"author\":{\"name\":\"wpadmin\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/person\\\/d2ee98d2385cd045ed4fe1c07ca320b5\"},\"headline\":\"Fiche gpo : strat\u00e9gies de groupe sous active directory\",\"datePublished\":\"2026-05-02T00:11:03+00:00\",\"dateModified\":\"2026-05-02T12:07:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/windows\\\/fiche-gpo-strategies-de-groupe-sous-active-directory\\\/\"},\"wordCount\":460,\"publisher\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\"},\"articleSection\":[\"Windows\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/windows\\\/fiche-gpo-strategies-de-groupe-sous-active-directory\\\/\",\"url\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/windows\\\/fiche-gpo-strategies-de-groupe-sous-active-directory\\\/\",\"name\":\"Fiche gpo : strat\u00e9gies de groupe sous active directory - Eryann Breizh SecOps\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#website\"},\"datePublished\":\"2026-05-02T00:11:03+00:00\",\"dateModified\":\"2026-05-02T12:07:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/windows\\\/fiche-gpo-strategies-de-groupe-sous-active-directory\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eryann.fr\\\/index.php\\\/windows\\\/fiche-gpo-strategies-de-groupe-sous-active-directory\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/windows\\\/fiche-gpo-strategies-de-groupe-sous-active-directory\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/eryann.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fiche gpo : strat\u00e9gies de groupe sous active directory\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#website\",\"url\":\"https:\\\/\\\/eryann.fr\\\/\",\"name\":\"Eryann Breizh SecOps\",\"description\":\"Fiches techniques &amp; labs en syst\u00e8mes et r\u00e9seaux poor les \u00e9tudiants en BTS CEIL ET SIO\",\"publisher\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eryann.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\",\"name\":\"Breizh Sec Ops\",\"url\":\"https:\\\/\\\/eryann.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png\",\"contentUrl\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png\",\"width\":1246,\"height\":229,\"caption\":\"Breizh Sec Ops\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/person\\\/d2ee98d2385cd045ed4fe1c07ca320b5\",\"name\":\"wpadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"caption\":\"wpadmin\"},\"sameAs\":[\"https:\\\/\\\/eryann.fr\"],\"url\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/author\\\/wpadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fiche gpo : strat\u00e9gies de groupe sous active directory - Eryann Breizh SecOps","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eryann.fr\/index.php\/windows\/fiche-gpo-strategies-de-groupe-sous-active-directory\/","og_locale":"fr_FR","og_type":"article","og_title":"Fiche gpo : strat\u00e9gies de groupe sous active directory - Eryann Breizh SecOps","og_description":"Les GPO (Group Policy Objects) permettent de configurer et s\u00e9curiser les postes et utilisateurs d\u2019un domaine Active Directory. Elles servent \u00e0 : Objectif de cette fiche : Commandes et outils (bloc unique) Fonctionnement des GPO Une GPO est li\u00e9e \u00e0 : Elle peut s\u2019appliquer : Ordre d\u2019application La derni\u00e8re appliqu\u00e9e a priorit\u00e9 Cr\u00e9ation d\u2019une GPO [&hellip;]","og_url":"https:\/\/eryann.fr\/index.php\/windows\/fiche-gpo-strategies-de-groupe-sous-active-directory\/","og_site_name":"Eryann Breizh SecOps","article_published_time":"2026-05-02T00:11:03+00:00","article_modified_time":"2026-05-02T12:07:39+00:00","author":"wpadmin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wpadmin","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eryann.fr\/index.php\/windows\/fiche-gpo-strategies-de-groupe-sous-active-directory\/#article","isPartOf":{"@id":"https:\/\/eryann.fr\/index.php\/windows\/fiche-gpo-strategies-de-groupe-sous-active-directory\/"},"author":{"name":"wpadmin","@id":"https:\/\/eryann.fr\/#\/schema\/person\/d2ee98d2385cd045ed4fe1c07ca320b5"},"headline":"Fiche gpo : strat\u00e9gies de groupe sous active directory","datePublished":"2026-05-02T00:11:03+00:00","dateModified":"2026-05-02T12:07:39+00:00","mainEntityOfPage":{"@id":"https:\/\/eryann.fr\/index.php\/windows\/fiche-gpo-strategies-de-groupe-sous-active-directory\/"},"wordCount":460,"publisher":{"@id":"https:\/\/eryann.fr\/#organization"},"articleSection":["Windows"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/eryann.fr\/index.php\/windows\/fiche-gpo-strategies-de-groupe-sous-active-directory\/","url":"https:\/\/eryann.fr\/index.php\/windows\/fiche-gpo-strategies-de-groupe-sous-active-directory\/","name":"Fiche gpo : strat\u00e9gies de groupe sous active directory - Eryann Breizh SecOps","isPartOf":{"@id":"https:\/\/eryann.fr\/#website"},"datePublished":"2026-05-02T00:11:03+00:00","dateModified":"2026-05-02T12:07:39+00:00","breadcrumb":{"@id":"https:\/\/eryann.fr\/index.php\/windows\/fiche-gpo-strategies-de-groupe-sous-active-directory\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eryann.fr\/index.php\/windows\/fiche-gpo-strategies-de-groupe-sous-active-directory\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eryann.fr\/index.php\/windows\/fiche-gpo-strategies-de-groupe-sous-active-directory\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/eryann.fr\/"},{"@type":"ListItem","position":2,"name":"Fiche gpo : strat\u00e9gies de groupe sous active directory"}]},{"@type":"WebSite","@id":"https:\/\/eryann.fr\/#website","url":"https:\/\/eryann.fr\/","name":"Eryann Breizh SecOps","description":"Fiches techniques &amp; labs en syst\u00e8mes et r\u00e9seaux poor les \u00e9tudiants en BTS CEIL ET SIO","publisher":{"@id":"https:\/\/eryann.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eryann.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/eryann.fr\/#organization","name":"Breizh Sec Ops","url":"https:\/\/eryann.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/eryann.fr\/#\/schema\/logo\/image\/","url":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png","contentUrl":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png","width":1246,"height":229,"caption":"Breizh Sec Ops"},"image":{"@id":"https:\/\/eryann.fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eryann.fr\/#\/schema\/person\/d2ee98d2385cd045ed4fe1c07ca320b5","name":"wpadmin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","caption":"wpadmin"},"sameAs":["https:\/\/eryann.fr"],"url":"https:\/\/eryann.fr\/index.php\/author\/wpadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/comments?post=198"}],"version-history":[{"count":1,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/198\/revisions"}],"predecessor-version":[{"id":199,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/198\/revisions\/199"}],"wp:attachment":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/media?parent=198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/categories?post=198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/tags?post=198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}