Skip to content

Group Policy Eater is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues that you may find in them.

EvotecIT/GPOZaurr

master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
June 17, 2020 23:22
September 17, 2023 10:10
September 11, 2022 23:17
September 17, 2023 07:30
September 16, 2023 09:42
November 12, 2020 12:18
September 16, 2023 09:38
September 17, 2023 07:32
November 11, 2020 22:34
September 17, 2023 10:10
May 17, 2021 23:14
October 24, 2021 16:08

GPOZaurr

Group Policy Eater is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues that you may find in them. GPOZaurr provides 360 degrees of information about Group Policies and their settings.

Just a single command (Invoke-GPOZaurr) provides following reports:

  • GPOBroken
  • GPOBrokenLink
  • GPOOwners
  • GPOConsistency
  • GPODuplicates
  • GPOOrganizationalUnit
  • GPOList
  • GPOLinks
  • GPOPassword
  • GPOPermissions
  • GPOPermissionsAdministrative
  • GPOPermissionsRead
  • GPOPermissionsRoot
  • GPOPermissionsUnknown
  • GPOFiles
  • GPOBlockedInheritance
  • GPOAnalysis
  • GPOUpdates
  • NetLogonOwners
  • NetLogonPermissions
  • SysVolLegacyFiles

But that's not all. There are over 50 other commands available that make it even more powerful helping with day to day tasks to manage Group Policies.

To understand the usage of Invoke-GPOZaurr I've created blog post you may find useful

Installing

GPOZaurr requires RSAT installed to provide results. If you don't have them you can install them as below. Keep in mind it also installs GUI tools so it shouldn't be installed on user workstations.

# Windows 10 Latest
Add-WindowsCapability -Online -Name 'Rsat.ActiveDirectory.DS-LDS.Tools~~~~0.0.1.0'
Add-WindowsCapability -Online -Name 'Rsat.GroupPolicy.Management.Tools~~~~0.0.1.0'

Finally just install module:

Install-Module -Name GPOZaurr -AllowClobber -Force

Force and AllowClobber aren't necessary, but they do skip errors in case some appear.

Updating

Update-Module -Name GPOZaurr

That's it. Whenever there's a new version, you run the command, and you can enjoy it. Remember that you may need to close, reopen PowerShell session if you have already used module before updating it.

The essential thing is if something works for you on production, keep using it till you test the new version on a test computer. I do changes that may not be big, but big enough that auto-update may break your code. For example, small rename to a parameter and your code stops working! Be responsible!