Search for a Group Policy Object
Updated: April 17, 2012
Applies To: Windows 8, Windows Server 2008 R2, Windows Server 2012
To search for a Group Policy object
In the Group Policy Management Console (GPMC) console tree, double-click the forest containing the domain where you want to search for a Group Policy object (GPO). Double-click Domains , right-click the domain, and then click Search .
In the Search for Group Policy objects dialog box, in the Search for GPOs in this domain box, select a domain or select All domains shown in this forest .
In the Search item box, select the type of object on which you want to base your search.
If you select Security Group , the Select User, Computer, or Group dialog box appears. Specify the appropriate object type, location of the object, and object name, and then click OK .
You can choose GPO-links on the Search item dropdown menu to find unlinked GPOs and GPOs linked across domains.
In the Condition box, select the condition that you want to use in the search.
In the Value box, select or specify the value that you want to use to filter the search, and then click Add .
Repeat Steps 4 and 5 until you complete the definition of all search criteria, and then click Search .
When search results are returned, do one of the following:
To save the search results, click Save results and then, in the Save GPO Search Results dialog box, specify the file name for the saved results, and then click Save .
To navigate to a GPO found in the search, double-click the GPO in the search results list.
To clear the search results, click Clear .
You can also open the search dialog box by right-clicking a forest and then clicking Search . In this case, the search for GPOs in this domain box defaults to All domains shown in this forest .
If a policy setting is enabled and then all the policy settings in that extension are removed, there can be false-positive search results for certain types of settings. This happens because the GPO has the extension listed as active. The extensions with this behavior are Security Settings, Software Installation, Folder Redirection, Internet Explorer Maintenance, and Encrypting File System (EFS).