If you want to see which Group Policies are applied to a client, you can run the RSOP command (Resultant Set of Policies).
Exporting the results from RSOP can be accomplished via the GUI as well as via Powershell.
In this blog post, I explain how to export the results from RSOP to an HTML report using Powershell.
What is the RSOP command line?
The RSOP command gathers results of all Active Directory Group Policies that are being applied on the machine.
The look and feel is similar to that of the Local Group Policy (gpedit.msc) and of that in the Group Policy Manager MMC console in Active Directory.
How to export an RSOP report
Gather RSOP results using the command-line
Open an elevated command-line (CMD) and enter:
RSOP will now gather which Group Policies have been applied for your client.
Note: As mentioned in the text “Starting with Microsoft Windows Vista Service Pack 1 (SP1), the Resultant Set of Policies (RSOP) report does not show all Microsoft Group Policy settings. To see the full set of Microsoft Group Policy settings applied for a computer or user, use the command-line tool gpresult.
This means that it is fine to use RSOP, but if you want to be sure that all Groupm Policies are included, use gpresult instead.
Gather RSOP results using Powershell
Export RSOP results in HTML using Powershell
In this example, I retrieve the Resultant Set of Policies (RSOP) for user Daniel in the Contoso domain, who uses the computer Windows10-Client. The output is in HTML, and the filename is D:\rsop.html.
Get-GPResultantSetOfPolicy -user Contoso\Daniel -Computer Windows10-Client -ReportType Html -Path "D:\rsop.html"
Using Powershell to export the results from RSOP is a much faster way than using the GUI. How do you export these results? Please leave a comment below!
- Run the Powershell window in another version for backward compatibility
- Copy a file to a new directory using Powershell
- Powershell script to add AD users to a group using a CSV
- Powershell script for checking Execution Policy and changing if required
- Read files and detect strings using Powershell detection methods in SCCM
- How to run Powershell as an administrator
Subscribe to newsletter:
If you want to receive the latest news for MEMCM, Windows 10, and Powershell, please subscribe to my monthly newsletter!