{52384B72-F463-4CF8-8432-C2E23FFC87C6}
    windomain.local
  
  Powershell Logging
  true
  2017-04-20T00:31:46
  2017-04-20T00:39:56
  2017-04-20T00:41:04.7240971Z
  
    O:S-1-5-21-4167842404-2528019904-656423439-1000G:DUD:PAI(OA;CI;CR;edacfd8f-ffb3-11d1-b41d-00a0c968f939;;AU)(A;;CCDCLCSWRPWPDTLOSDRCWDWO;;;S-1-5-21-4167842404-2528019904-656423439-1000)(A;CI;CCDCLCSWRPWPDTLOSDRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOSDRCWDWO;;;S-1-5-21-4167842404-2528019904-656423439-519)(A;CI;LCRPLORC;;;ED)(A;CI;LCRPLORC;;;AU)(A;CI;CCDCLCSWRPWPDTLOSDRCWDWO;;;SY)(A;CIIO;CCDCLCSWRPWPDTLOSDRCWDWO;;;CO)S:AI(OU;CIIDSA;WPWD;;f30e3bc2-9ff0-11d1-b603-0000f80367c1;WD)(OU;CIIOIDSA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CIIOIDSA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)
    
      S-1-5-21-4167842404-2528019904-656423439-1000
      WINDOMAIN\vagrant
    
    
      S-1-5-21-4167842404-2528019904-656423439-513
      WINDOMAIN\Domain Users
    
    true
    
      false
      
        
          S-1-5-21-4167842404-2528019904-656423439-519
          WINDOMAIN\Enterprise Admins
        
        
          Allow
        
        false
        
          true
          false
          true
          false
        
        
          Edit, delete, modify security
        
        0
      
      
        
          S-1-5-21-4167842404-2528019904-656423439-1000
          WINDOMAIN\vagrant
        
        
          Allow
        
        false
        
          true
          false
          false
          false
        
        
          Edit, delete, modify security
        
        0
      
      
        
          S-1-5-9
          NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS
        
        
          Allow
        
        false
        
          true
          false
          true
          false
        
        
          Read
        
        0
      
      
        
          S-1-5-18
          NT AUTHORITY\SYSTEM
        
        
          Allow
        
        false
        
          true
          false
          true
          false
        
        
          Edit, delete, modify security
        
        0
      
      
        
          S-1-5-11
          NT AUTHORITY\Authenticated Users
        
        
          Allow
        
        false
        
          true
          false
          true
          false
        
        
          Apply Group Policy
        
        0
      
      
        
          S-1-5-21-4167842404-2528019904-656423439-512
          WINDOMAIN\Domain Admins
        
        
          Allow
        
        false
        
          true
          false
          true
          false
        
        
          Edit, delete, modify security
        
        0
      
    
    false
  
  true
  
    2
    2
    true
    
      
        
          Turn on Module Logging
          Enabled
          
        This policy setting allows you to turn on logging for Windows PowerShell modules.
        If you enable this policy setting, pipeline execution events for members of the specified modules are recorded in the Windows PowerShell log in Event Viewer. Enabling this policy setting for a module is equivalent to setting the LogPipelineExecutionDetails property of the module to True.
        If you disable this policy setting, logging of execution events is disabled for all Windows PowerShell modules. Disabling this policy setting for a module is equivalent to setting the LogPipelineExecutionDetails property of the module to False.
        If this policy setting is not configured, the LogPipelineExecutionDetails property of a module or snap-in determines whether the execution events of a module or snap-in are logged. By default, the LogPipelineExecutionDetails property of all modules and snap-ins is set to False.
        To add modules and snap-ins to the policy setting list, click Show, and then type the module names in the list. The modules and snap-ins in the list must be installed on the computer.
        Note: This policy setting exists under both Computer Configuration and User Configuration in the Group Policy Editor. The Computer Configuration policy setting takes precedence over the User Configuration policy setting.
      
          At least Microsoft Windows 7 or Windows Server 2008 family
          Windows Components/Windows PowerShell
          
            To turn on logging for one or more modules, click Show, and then type the module names in the list. Wildcards are supported.
          
          
            Module Names
            Enabled
            false
            false
            
              
                *
              
            
          
          
            To turn on logging for the Windows PowerShell core modules, type the following module names in the list:
          
          
            Microsoft.PowerShell.*
          
          
            Microsoft.WSMan.Management
          
        
        
          Turn on PowerShell Transcription
          Enabled
          
        This policy setting lets you capture the input and output of Windows PowerShell commands into text-based transcripts.
        If you enable this policy setting, Windows PowerShell will enable transcripting for Windows PowerShell, the Windows PowerShell ISE, and any other
        applications that leverage the Windows PowerShell engine. By default, Windows PowerShell will record transcript output to each users' My Documents
        directory, with a file name that includes 'PowerShell_transcript', along with the computer name and time started. Enabling this policy is equivalent
        to calling the Start-Transcript cmdlet on each Windows PowerShell session.
        If you disable this policy setting, transcripting of PowerShell-based applications is disabled by default, although transcripting can still be enabled
        through the Start-Transcript cmdlet.
        
        If you use the OutputDirectory setting to enable transcript logging to a shared location, be sure to limit access to that directory to prevent users
        from viewing the transcripts of other users or computers.
        Note: This policy setting exists under both Computer Configuration and User Configuration in the Group Policy Editor. The Computer Configuration policy setting takes precedence over the User Configuration policy setting.
      
          At least Microsoft Windows 7 or Windows Server 2008 family
          Windows Components/Windows PowerShell
          
            Transcript output directory
            Enabled
            \\wef.windomain.local\pslogs
          
          
            Include invocation headers:
            Enabled
          
        
      
      Registry
    
  
  
    0
    0
    true
  
  
    windomain
    windomain.local
    true
    false