Screensaver Lockscreen and Background GPO

Idle lock screen timeout settings:

Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security Options
  • Interactive logon: Machine inactivity limit
    • Enable
    • Set timeout in seconds.

Force a specific Background:

User Configuration > Policies > Administrative Templates > Desktop > Desktop
  • Desktop Wallpaper
    • Enable
    • Set a UNC path to the wallpaper ( i.e. \\path\to\file.jpg )

Disable Slow Link Detection GPO

Create a GPO and enable these settings. Related descriptions and values explained in citations.

Both Computer Configuration and User Configuration may have these policies modified:

Policies > Administrative Templates > System > Group Policy
  • Configure Group Policy slow link detection
    Enable the policy and set value to 0 to disable slow link detection.

Trust the Server/Intranet GPO and Trust Yourself

Create a GPO and enable three settings. Related descriptions and values explained in citations.

Both Computer Configuration and User Configuration need these policies modified:

Policies > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page
  • Intranet Zone Template > Enabled > Low
  • This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults.
  • Site to Zone Assignment List > Enabled > Show…
    • ValueNameyourserver.domain.com
      A host for an intranet site, or a fully qualified domain name for other sites. The valuename may also include a specific protocol. For example, if you enter http://www.contoso.com as the valuename, other protocols are not affected. If you enter just www.contoso.com, then all protocols are affected for that site, including http, https, ftp, and so on. The site may also be expressed as an IP address (e.g., 127.0.0.1) or range (e.g., 127.0.0.1-10).
    • Value1 (Intranet zone)
  • Intranet Zone (folder)
    • Show security warning for potentially unsafe files > Enabled > Enable
      If you enable this policy setting and set the drop-down box to Enable, these files open without a security warning. If you set the drop-down box to Prompt, a security warning appears before the files open.

You may also want to add trusted sites to the approved zone. Do that here:

Computer Configuration > Policies > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page > Site to Zone Assignment List

Trust Administrators

Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> User Account Control: Run all administrators in Admin Approval Mode = Disabled

Enable Linked Network Drives over UAC

Windows 10, Windows 8, Windows 7 and Windows Vista come with a special Group Policy option which unlocks network drives for programs running elevated:

  1. Open Registry Editor.
  2. Go to the following Registry key:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
  3. Create a new DWORD value called EnableLinkedConnections, and set it to 1.
  4. Reboot.

Server 2016 Command Line Activation

  1. Launch a CMD as an Administrator
  2. Type: slmgr.vbs /ipk xxxxx-xxxxx-xxxxx-xxxxx-xxxxx
  3. Press Enter

This process might take several days (!!!) to complete. Wait for it.

slmgr.vbs command help

Referenced Instructions

Alternate Activation Gui Method

  1. click START (gets you to the tiles)
  2. type RUN
  3. type slui 3 and press ENTER
    1. SLUI 1 brings up the activation status window
    2. SLUI 2 brings up the activation window
    3. SLUI 3 brings up the CHANGE PRODUCT KEY window
    4. SLUI 4 brings up the CALL MICROSOFT & MANUALLY ACTIVATE window
  4. Type in your product key
  5. Have a nice day.

Netlogon Not Accessible

  1. To resolve this issue run gpedit.msc, go to:
    Computer -> Administrative Templates -> Network -> Network Provider -> Hardened UNC Paths
  2. Enable the policy and click “Show” button.
  3. Enter your server name (\myservername) into “Value name” field.
  4. Enter the folowing text “RequireMutualAuthentication=0,RequireIntegrity=0,RequirePrivacy=0” wihtout quotes into the “Value” field.

Remove a Workstation from Linux Samba Domain Controller

pdbedit -x -m WorkstationName