Support
 
Phone Live Chat
 
Support
 
US: +1 888 720 9500
US: +1 800 443 6694
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9393

 
 
 
 
 
Features

What are Group Policy Preferences?

Group Policy Preferences (GPPs) are a set of client-side extensions introduced with Windows Server 2008 that let administrators configure settings users would normally manage themselves, such as drive maps, printers, registry values, scheduled tasks, services, environment variables, INI files, and shortcuts. Preferences are deployed through Group Policy Objects (GPOs) and refreshed at the same intervals as policies, but they behave differently in one important way: A user can change a preference after it applies, and the change persists until the next Group Policy refresh. At that point, the preference reverts to whatever the GPO defines.

This is the key distinction between preferences and standard Group Policy settings:

  • Policies are enforced. The target setting is locked, and the user cannot change it through the OS user interface. Use policies for security baselines, password rules, account lockout, and anything tied to compliance.
  • Preferences are deployed defaults. The user can change them, but the GPO will reapply them on the next refresh. Use preferences for user experience configuration where flexibility matters more than enforcement: drive maps that vary by department, printers that follow the user, and environment variables an application expects.

Both preferences and policies are written to the registry, but if the same setting is defined in both places, the policy wins. That ordering is the safety net you fall back on when a preference is being undone by something else.

Where GPPs live in the GPMC

In the Group Policy Management Console (GPMC), open the Group Policy Management Editor by right-clicking a GPO and selecting Edit. Preferences appear in two places:

  • Computer Configuration > Preferences: Preferences that apply to a computer regardless of who logs on. Use this for printers, services, scheduled tasks, and registry values that should be tied to the machine.
  • User Configuration > Preferences: Preferences that apply when a particular user logs on, on whichever machine they sign in to. Use this for drive maps, environment variables tied to a user profile, user-specific registry hives, and shortcuts on the desktop.

Each side then splits into two further nodes:

  • Windows Settings: This node covers configuration that is part of Windows itself, such as drive maps, environment variables, files and folders, INI files, network shares, registry keys, and shortcuts.
  • Control Panel Settings: This node covers items the user would otherwise configure in Control Panel, such as data sources, devices, folder options, internet settings, local users and groups, network options, power options, printers, regional options, scheduled tasks, services, and Start menu options.

There are roughly 20 client-side extensions in total, so almost any system setting an end user could configure on a single machine has an equivalent preference item that can deploy that setting to thousands of machines through a GPO.

Managing system settings and preferences

Step 1: Create or edit a GPO for system settings

  1. Open the GPMC (gpmc.msc).
  2. Right-click the OU containing the target users or computers and select Create a GPO in this domain, and Link it here.
  3. Give the GPO a descriptive, scope-aware name; for example, User Drive Maps - Finance or Workstation Power Plan - Default. Group preference items into GPOs by purpose rather than packing every setting into one large policy; this makes link audits and troubleshooting easier later on.
  4. Right-click the new GPO and select Edit.

Step 2: Add a preference item

Step 3: Choose the action: Create, Replace, Update, or Delete

Step 4: Configure common options for each preference item

Step 5: Apply item-level targeting

Step 6: Apply, force the update, and verify

Common troubleshooting issues

  1. User preference does not apply on first logon

    gpupdate/force was run, but user-side preferences only refresh on logon, not on a manual policy update from within an active session. Have the user log off and back on rather than relying on gpupdate alone for user-side preferences.

  2. Preference is set, then immediately reverts at next refresh

    A policy setting in another GPO is overriding the same registry value, so the preference applies and is then overwritten on the next cycle. Run gpresult/h report.html and find the GPO that is winning, then remove the conflicting policy or change the link order so the intended preference takes precedence.

  3. Preference applies once, then nothing happens for subsequent changes to the GPO

    Apply once and do not reapply was enabled on the Common tab, which writes a tracking value to the client and skips the preference on every subsequent refresh. Disable the option on the preference item, or update the registry tracking value on the client to force a reapply.

  4. Drive map or printer preference fails silently

    The user's logon context cannot reach the target server, or the credentials being used are wrong. Confirm Run in logged-on user's security context is enabled on the Common tab, and verify the user has permissions on the share or print queue.

  5. ILT filter for a security group evaluates incorrectly

    Group membership tokens are cached in the user's Kerberos ticket, so a user added to a new group won't reflect that membership until the token refreshes. Have the user log off and back on, and run klist purge for stubborn cases where the cached ticket doesn't clear on its own.

  6. A GPP-deployed shortcut, file, or folder reappears after a user deletes it

    The action is set to Replace or Update, both of which reapply the item on every refresh regardless of whether the user removed it. Switch to Create if the user should be allowed to delete the item permanently, or enable Apply once and do not reapply so the preference runs only at first deployment.

  7. Item stop-processing flag halts unrelated preferences.

    Stop processing items in this extension if an error occurs is enabled on a preference earlier in the order, which causes a single failure to skip every preference after it. Disable the option on the offending item, or reorder the preferences so dependencies come first and optional items sit at the end.

Preferences vs. policies: When to use which

The choice between a preference and a policy is rarely arbitrary; each tool is right for a particular kind of setting.

Use policies when: The setting is part of a security baseline (password rules, account lockout, audit policy, or firewall rules), compliance auditing requires that the setting cannot be changed by the user, you need the OS to grey out the corresponding UI control, or you want a clear managed by Group Policy indicator on the client.

Use preferences when: The setting is normally configurable by the user and only needs a sensible default (default printer, mapped drives, power plan, or regional settings), the deployed configuration may legitimately differ across users or machines (drive maps that vary by department, printers that follow location), you need item-level targeting, or the setting is not exposed as a policy at all.

An example worth knowing about: Windows Services

The native policy node at Computer Configuration > Policies > Windows Settings > Security Settings > System Services controls service startup type, but it has two limitations:

  1. The list of services available is fixed to whatever exists on the machine you are editing the GPO from, and you can only set startup type and permissions.
  2. The preference at Computer Configuration > Preferences > Control Panel Settings > Services accepts an arbitrary service name; can stop, start, or restart a service; can configure recovery options; and supports ILT. For most service management, the preference is more flexible; however, for security-critical services where compliance requires enforcement, the policy is the right choice.

Best practices for system settings GPOs

A few patterns worth following from the start:

  1. Group preference items by purpose, not by target: A GPO named User Drive Maps - Finance is easier to reason about than a GPO named Finance Settings that mixes drive maps, printers, registry values, and a startup script.
  2. Use ILT instead of multiple GPOs where possible: Filtering 10 preferences inside one GPO with ILT scales far better than maintaining 10 near-identical GPOs scoped to different OUs.
  3. Default to the Update action: Update is the safest action for most cases; it converges the target to the GPO without churning the underlying object or making creation conditional on prior state.
  4. Use environment variables to keep paths portable: %LogonServer%, %ProgramFiles%, %USERPROFILE%, and %COMPUTERNAME% make preferences work across architectures and locales without per-target customization.
  5. Test in a scoped OU first: Link any new GPP-heavy GPO to a small test OU containing one user and one workstation, run gpupdate /force plus a logoff/logon, and confirm with gpresult /h and rsop.msc before applying it broadly.
  6. Document the preference's purpose in the description field: Preference items have a Description field on most tabs. Use it for the requesting team, the application name, and the date the preference was added; this is the only context a future admin will have when auditing why something exists.

Limitations of native GPP management

GPPs are powerful, but managing them through the GPMC alone has friction at scale:

  • No bulk linking: Linking the same drive map GPO to 30 OUs is 30 right-click operations.
  • No version comparison built in: Comparing two versions of a GPP-heavy GPO to see which preference changed requires manual gpresult /h exports or a third-party tool.
  • No scoped delegation for preference-only changes: Granting a help desk technician the right to add a printer preference without granting GPO editing rights as a whole is awkward in the native model.
  • No scheduled or audit-ready reporting: GPO scope, settings, and link reports are manual exports. There is no built-in scheduling to deliver them to a compliance inbox.
  • No central console across forests: Multi-forest environments require switching contexts in the GPMC for each forest.
  • Stale preferences accumulate: Without a regular review process, drive maps for shares that no longer exist, printers that have been retired, and registry values for software no longer installed tend to stay forever.

How to manage GPOs at scale with ADManager Plus

Once your GPP-based GPO is configured in the GPMC, ManageEngine ADManager Plus extends what you can do with it across the rest of the domain through a single web console:

  • Bulk linking across OUs: Link a settings GPO (for drive maps, printers, or registry values) to multiple OUs in one action instead of linking each container individually in the GPMC.
  • On-demand policy refresh: Force an immediate GPO refresh on selected computers when a preference change (a new printer, a corrected registry value, or an updated scheduled task) needs to apply before the default 90-minute interval.
  • Link order management: Adjust GPO precedence where multiple preference GPOs overlap on the same container, so the right drive map, printer, or registry value wins.
  • Cross-domain reuse: Copy or merge GPOs to reuse a complete preference set (drive maps, printers, scheduled tasks, or registry values) across domains without rebuilding the items by hand.
  • GPO version comparison: Compare two versions of a preference-heavy GPO side by side to see exactly which preference items were added, modified, or removed. This is the fastest way to identify what changed when a recent edit broke a drive mapping or printer connection.
  • Comprehensive GPO reports: Get complete visibility into your GPO environment with prebuilt reports covering GPO links, inheritance, delegation, and resultant policy.
  • Delegated help desk access: Technicians can add a printer preference, update a drive mapping, or change a scheduled task through scoped role-based delegation without domain admin rights, and every change moves through an audit-logged workflow before it applies to AD.

ADManager Plus Trusted By

The one-stop solution to Active Directory Management and Reporting