{"id":4681,"date":"2012-11-12T11:59:00","date_gmt":"2012-11-12T11:59:00","guid":{"rendered":"https:\/\/blogs.technet.microsoft.com\/heyscriptingguy\/2012\/11\/12\/powertip-use-a-powershell-cmdlet-to-get-default-group-policies\/"},"modified":"2012-11-12T11:59:00","modified_gmt":"2012-11-12T11:59:00","slug":"powertip-use-a-powershell-cmdlet-to-get-default-group-policies","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/scripting\/powertip-use-a-powershell-cmdlet-to-get-default-group-policies\/","title":{"rendered":"PowerTip: Use a PowerShell Cmdlet to Get Default Group Policies"},"content":{"rendered":"<p><strong>Summary:<\/strong>&nbsp;Learn how to use a Windows PowerShell cmdlet to receive information about default domain policies.<\/p>\n<p><strong><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/q-for-powertip.jpg\" alt=\"Hey, Scripting Guy! Question\" \/>&nbsp;<\/strong>How can I use a Windows PowerShell cmdlet to find information about default group policies in our domain?<\/p>\n<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/a-for-powertip.jpg\" alt=\"Hey, Scripting Guy! Answer\" \/>&nbsp;Use the&nbsp;<strong>Get-GPO<\/strong>&nbsp;cmdlet (available from the RSAT tools) and pipe the results to a&nbsp;<strong>Where-Object<\/strong>&nbsp;cmdlet. This is required because the&nbsp;<strong>Get-GPO<\/strong>&nbsp;cmdlet does not permit the use of wildcards.<\/p>\n<p style=\"padding-left: 120px\">Here is an example by using Windows PowerShell&nbsp;3.0 syntax:<\/p>\n<p style=\"padding-left: 150px\">get-gpo -Domain iammred.net -all | where displayname -match &#8216;default&#8217;<\/p>\n<p style=\"padding-left: 120px\">This example uses Windows PowerShell&nbsp;2.0 syntax:<\/p>\n<p style=\"padding-left: 150px\">get-gpo -Domain iammred.net -all | where { $_.displayname -match &#8216;default&#8217;}<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/7610.Dr.ScriptoForTips.jpg\"><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/29\/2019\/02\/7610.Dr.ScriptoForTips.jpg\" alt=\"\" border=\"0\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary:&nbsp;Learn how to use a Windows PowerShell cmdlet to receive information about default domain policies. &nbsp;How can I use a Windows PowerShell cmdlet to find information about default group policies in our domain? &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp;Use the&nbsp;Get-GPO&nbsp;cmdlet (available from the RSAT tools) and pipe the results to [&hellip;]<\/p>\n","protected":false},"author":596,"featured_media":87096,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[356,3,45],"class_list":["post-4681","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scripting","tag-powertip","tag-scripting-guy","tag-windows-powershell"],"acf":[],"blog_post_summary":"<p>Summary:&nbsp;Learn how to use a Windows PowerShell cmdlet to receive information about default domain policies. &nbsp;How can I use a Windows PowerShell cmdlet to find information about default group policies in our domain? &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp;Use the&nbsp;Get-GPO&nbsp;cmdlet (available from the RSAT tools) and pipe the results to [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/posts\/4681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/users\/596"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/comments?post=4681"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/posts\/4681\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/media\/87096"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/media?parent=4681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/categories?post=4681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/scripting\/wp-json\/wp\/v2\/tags?post=4681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}