I first discussed Gpresult in tip 2257.
The tool, which is also available in the Windows 2000 Server Resource Kit Supplement One, has a Verbose switch.
I logged onto my computer as TestAdmin and ran Gpresult /s. The following output (modified) was generated:
Microsoft (R) Windows (R) 2000 Operating System Group Policy Result toolCopyright (C) Microsoft Corp. 1981-1999Created on Saturday, January 27, 2001 at 13:24:51Operating System Information:Operating System Type:ProfessionalOperating System Version:5.0.2195.Service Pack 1############################################################### User Group Policy results for: CN=Test Administrator,CN=Users,DC=JSIINC,DC=COM Domain Name:JSIINC Domain Type:Windows 2000 Site Name:JSI Corporate Offices Roaming profile:(None) Local profile:C:Documents and SettingsTestAdmin The user is a member of the following security groups:JSIINCDomain UsersEveryone ....JSIINCEnterprise AdminsJSIINCSchema AdminsLOCALNT AUTHORITYINTERACTIVENT AUTHORITYAuthenticated Users The user has the following security privileges:Bypass traverse checkingManage auditing and security log ....Synchronize directory service dataEnable computer and user accounts to be trusted for delegation###############################################################Last time Group Policy was applied: Saturday, January 27, 2001 at 12:52:58Group Policy was applied from: JSI001.JSIINC.COM==========================================================
The user received "Registry" settings from these GPOs:Local Group Policy Revision Number:15 (Active Directory) 15 (Sysvol) Unique Name:Local Group Policy Domain Name: Linked to:Local computerDefault Domain Policy Revision Number:11 (Active Directory) 11 (Sysvol) Unique Name:{31B2F340-016D-11D2-945F-00C04FB984F9} Domain Name:JSIINC.COM Linked to:Domain (DC=JSIINC,DC=COM)The following settings were applied from: Local Group Policy KeyName:SoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer ValueName:StartMenuLogOff ValueType:REG_DWORD Value:0x00000001 .... KeyName:SoftwarePoliciesMicrosoftWindowsDirectory UI ValueName:EnableFilter ValueType:REG_DWORD Value:0x00000001The following settings were applied from: Default Domain Policy KeyName:SoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer ValueName:StartMenuLogOff ValueType:REG_DWORD Value:0x00000001 .... KeyName:SoftwarePoliciesMicrosoftWindowsApp Management ValueName:COMClassStore ValueType:REG_DWORD Value:0x00000001############################################################### Computer Group Policy results for: CN=JSI005,CN=Computers,DC=JSIINC,DC=COM Domain Name:JSIINC Domain Type:Windows 2000 Site Name:JSI Corporate Offices The computer is a member of the following security groups:BUILTINAdministratorsEveryoneBUILTINUsersJSIINCJSI005$JSIINCDomain ComputersNT AUTHORITYNETWORKNT AUTHORITYAuthenticated Users###############################################################Last time Group Policy was applied: Saturday, January 27, 2001 at 12:19:23Group Policy was applied from: JSI001.JSIINC.COM
=====================================================
The computer received "Registry" settings from these GPOs:Local Group Policy Revision Number:77 (Active Directory) 77 (Sysvol) Unique Name:Local Group Policy Domain Name: Linked to:Local computerDefault Domain Policy Revision Number:111 (Active Directory) 111 (Sysvol) Unique Name:{31B2F340-016D-11D2-945F-00C04FB984F9} Domain Name:JSIINC.COM Linked to:Domain (DC=JSIINC,DC=COM)The following settings were applied from: Local Group Policy KeyName:SoftwarePoliciesMicrosoftSystemCertificatesEFS ValueName:EFSBlob ValueType:REG_BINARY Value: 01 00 01 00 01 00 00 00 79 02 00 00 75 02 00 00 ........y...u... 1c 00 00 00 02 00 00 00 3d 02 00 00 38 00 00 00 ........=...8... 73 00 00 00 16 00 04 00 01 05 00 00 00 00 00 05 s............... 15 00 00 00 43 17 0a 32 32 62 1f 2a a8 37 d6 65 ....C..22b.*.7.e ..... KeyName:SoftwarePoliciesMicrosoftWindows NTPrinters ValueName:PublishPrinters ValueType:REG_DWORD Value:0x00000001 .... KeyName:SoftwarePoliciesMicrosoftWindows NTPrintersWizard ValueName:Auto Publishing ValueType:REG_DWORD Value:0x00000001The following settings were applied from: Default Domain Policy KeyName:SoftwarePoliciesMicrosoftSystemCertificatesEFS ValueName:EFSBlob ValueType:REG_BINARY Value: 01 00 01 00 01 00 00 00 77 02 00 00 73 02 00 00 ........w...s... 1c 00 00 00 02 00 00 00 3b 02 00 00 38 00 00 00 ........;...8... .... 67 c0 af 51 f5 15 18 d0 12 21 80 d0 89 5e 8c 5a g..Q.....!...^.Z 3d 43 fa e1 9f f1 41 ed bb 46 99 8d dc b2 bf 00 =C....A..F......
=====================================================
The computer received "Security" settings from these GPOs:Local Group Policy Revision Number:77 (Active Directory) 77 (Sysvol) Unique Name:Local Group Policy Domain Name: Linked to:Local computerDefault Domain Policy Revision Number:111 (Active Directory) 111 (Sysvol) Unique Name:{31B2F340-016D-11D2-945F-00C04FB984F9} Domain Name:JSIINC.COM Linked to:Domain (DC=JSIINC,DC=COM)Run the Security Configuration Editor for more information.
==========================================================The computer received "EFS recovery" settings from these GPOs:Local Group Policy Revision Number:77 (Active Directory) 77 (Sysvol) Unique Name:Local Group Policy Domain Name: Linked to:Local computerDefault Domain Policy Revision Number:111 (Active Directory) 111 (Sysvol) Unique Name:{31B2F340-016D-11D2-945F-00C04FB984F9} Domain Name:JSIINC.COM Linked to:Domain (DC=JSIINC,DC=COM)Additional information is not available for this type of policy setting.