You can use sccm compliance settings to validate and plus you can use built-in reports.
On Mon, Jul 18, 2016, 12:29 PM Kennedy, Jim <[email protected]> wrote: > What about hitting the remote machines. Must be a registry setting with > the GPO you can query. Or run gpresult.exe against the targets. > > > > > http://www.windowsnetworking.com/articles-tutorials/netgeneral/reporting-application-gpos-remote-computers-and-generating-report-part1.html > > > > > > > > > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *David McSpadden > *Sent:* Monday, July 18, 2016 3:15 PM > > > *To:* [email protected] > *Subject:* [NTSysADM] RE: Powershell question > > > > I have a GPO that I want to push to x number of OU’s. > > I have auditors that want me to prove that it is on the computers in those > OU’s. > > I am looking for a what to get that information. > > If I can get the Scope of a GPO from a GPO report? then pipe the Scope > into a Get-ADComputer that might be enough to show that I am pushing the > GPO to the workstations? > > > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *Brian Desmond > *Sent:* Monday, July 18, 2016 12:01 PM > *To:* [email protected] > *Subject:* [NTSysADM] RE: Powershell question > > > > *You can’t link a GPO to a computer. Given that, is the requirement that > you want to find all the computers that a given GPO applies to? How many > OUs is the GPO linked to? Does it have security or WMI filtering applied? > What about Group Policy Preferences with item level targeting?* > > > > *Thanks,* > > *Brian Desmond* > > > > *w – 312.625.1438 | c – 312.731.3132* > > > > *From:* [email protected] [ > mailto:[email protected] <[email protected]>] *On > Behalf Of *David McSpadden > *Sent:* Monday, July 18, 2016 10:43 AM > *To:* [email protected] > *Subject:* [NTSysADM] Powershell question > > > > I would like to find all computernames that have a specific GPO linked to > them? > > Get-GPO > > Get-ADComputer > > > > > > Just not sure where to go? > > > > > > *David McSpadden* > > System Administrator > > Indiana Members Credit Union > > P: 317.554.8190 > > [image: Description: Description: imcu email icon] <http://imcu.com/> [image: > Description: Description: facebook email icon] > <https://www.facebook.com/IndianaMembersCU> [image: Description: > Description: twitter email icon] <https://twitter.com/IndMembersCU> > > > > [image: Description: Description: email logo] > > [image: http://www.amuletsolutions.com/images/mcp.gif] > <http://www.google.com/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0ahUKEwjFztf-tePJAhXK5iYKHcPtAxEQjRwIBw&url=http://www.amuletsolutions.com/awards.aspx&bvm=bv.110151844,d.amc&psig=AFQjCNHkrx8CednTEOOq4zUxYyrRUGzUsg&ust=1450459757284499> > > > > This e-mail and any files transmitted with it are property of Indiana > Members Credit Union, are confidential, and are intended solely for the use > of the individual or entity to whom this e-mail is addressed. If you are > not one of the named recipient(s) or otherwise have reason to believe that > you have received this message in error, please notify the sender and > delete this message immediately from your computer. Any other use, > retention, dissemination, forwarding, printing, or copying of this email is > strictly prohibited. > > > > Please consider the environment before printing this email. > > This e-mail and any files transmitted with it are property of Indiana > Members Credit Union, are confidential, and are intended solely for the use > of the individual or entity to whom this e-mail is addressed. If you are > not one of the named recipient(s) or otherwise have reason to believe that > you have received this message in error, please notify the sender and > delete this message immediately from your computer. Any other use, > retention, dissemination, forwarding, printing, or copying of this email is > strictly prohibited. > > > > Please consider the environment before printing this email. >

