You can use Group Policy to configure and provide the required settings to the computers that are governed by Group Policy and have the Desktop Login Software installed.
To configure Group Policy settings
- Run the DefenderDesktopLoginGroupPolicy.exe file supplied in the Defender distribution package.
- Complete the wizard that starts to install the Defender Desktop Login Group Policy.
- Open the Group Policy Management tool (gpmc.msc).
- In the left pane of the tool, expand the appropriate domain node to locate the Default Domain Policy.
- Right-click the Default Domain Policy, and then on the shortcut menu click Edit.
- In the left pane of the window that opens, expand Computer Configuration | Policies, and then select Defender Desktop Login.
- In the right-pane, double-click Desktop Login Settings and use the dialog box that opens to configure the Defender Desktop Login settings.
For more information about these settings, see Defender Desktop Login Configuration tool reference.
- When finished, OK to apply your changes and close the dialog box.
You may want to run the gpupdate command to refresh Group Policy settings in the Active Directory domain. It is also advisable to check that your Group Policy settings have been applied as described in the next steps.
To check if your Group Policy settings have been applied
- Open the Active Directory Users and Computers tool.
- In the left pane, right-click the domain for which you have configured Group Policy settings, point to All Tasks, and then click Resultant Set Of Policy (Planning).
- In the wizard that starts, select the Skip to the final page of this wizard without collecting additional data check box, and then click Next.
- In the Summary of Selections step, click Next.
- In the completion step, click Finish.
- In the left pane of the window that opens, expand Computer Configuration to select the Defender Desktop Loginnode.
- In the right pane, double-click the Desktop Login Settings object to view the current Group Policy settings.
Alternatively, you can also run these steps against a specific computer object or organizational unit to ensure they use the correct settings.