Group Policy Not Applying in Windows 10 and 11? 8 Proven Fixes (2026)

By Hari Prasad

Updated on:

Group Policy not applying Windows 11 fix guide

Group Policy not applying Windows 11 fix guide

Is your Group Policy not applying in Windows 10 or Windows 11? You’ve configured a GPO, run gpupdate /force, but the setting still isn’t taking effect. This guide covers 8 proven fixes for when Group Policy simply refuses to apply in 2026.

Why Is Group Policy Not Applying?

Common causes include:

  • GPO linked to the wrong OU
  • Security filtering blocking the user or computer
  • WMI filter not matching
  • Loopback processing conflicting with user policies
  • Higher-priority GPO overriding your settings
  • Corrupted local Group Policy cache
  • Computer not connected to domain controller
  • Policy requires logoff or reboot to take effect

Fix 1: Run GPUpdate /Force and Check with GPResult

Start with the basics. Force a fresh policy refresh and immediately check what applied:

gpupdate /force

Then verify:

gpresult /r

Check the output for your GPO name. If it appears under "The following GPOs were not applied," the reason will be listed next to it. This is your first diagnostic step.

Fix 2: Verify the GPO Is Linked to the Correct OU

A GPO only applies to objects (users or computers) inside the OU it is linked to.

  1. Open Group Policy Management Console — press Win + R, type gpmc.msc
  2. Expand your domain → find your GPO
  3. Check the Scope tab → confirm the GPO is linked to the correct OU
  4. Confirm the target user or computer object is inside that OU

A common mistake is linking the GPO to the domain root but the computer sits in a sub-OU with "Block Inheritance" enabled.

Fix 3: Check Security Filtering

By default, GPOs apply to "Authenticated Users." If someone changed the security filtering, your user or computer may be excluded.

  1. In GPMC, select your GPO → go to Scope tab
  2. Under Security Filtering, check who is listed
  3. If “Authenticated Users” is removed, add your specific user, computer, or group
  4. Also check the Delegation tab → verify the target has Read and Apply Group Policy permissions

Fix 4: Check and Fix WMI Filters

WMI filters can silently block a GPO if the filter condition isn’t met on the target machine.

  1. In GPMC, select your GPO → check the WMI Filter field at the bottom
  2. If a WMI filter is set, click it to view the query
  3. Test the WMI query on your target machine in PowerShell:
Get-WmiObject -Query "SELECT * FROM Win32_OperatingSystem WHERE Version LIKE '10.%'"

If the query returns no results, the WMI filter is blocking the GPO. Either fix the query or remove the filter.

Fix 5: Reset the Local Group Policy Cache

A corrupted local Group Policy cache prevents new policies from applying. Clearing it forces a fresh download from the DC.

  1. Open Command Prompt as Administrator
  2. Run:
rd /S /Q "%WinDir%System32GroupPolicy"
rd /S /Q "%WinDir%System32GroupPolicyUsers"
gpupdate /force

This deletes all locally cached policy files and forces a complete rebuild from the domain controller.

Fix 6: Check GPO Precedence (Which GPO Wins)

When multiple GPOs apply conflicting settings, the one with highest precedence wins. The order is:

  1. Local Group Policy (lowest priority)
  2. Site-level GPOs
  3. Domain-level GPOs
  4. OU-level GPOs (highest priority — child OU overrides parent)

In GPMC → select your OU → go to Group Policy Inheritance tab to see the full precedence order. The GPO at the top has the highest priority.

Use gpresult /h C:report.html /f and open the HTML report — it shows the Winning GPO for each setting.

Fix 7: Check Event Viewer for Group Policy Errors

  1. Press Win + R → type eventvwr.msc
  2. Navigate to: Applications and Services Logs → Microsoft → Windows → GroupPolicy → Operational
  3. Look for Error (red) or Warning (yellow) events

Key Event IDs to watch for:

Event ID Meaning
1129 Network connectivity failure to domain controller
1030 Cannot fetch GPO list from DC
7016 Specific Client Side Extension (CSE) failed
1085 Windows failed to apply specific policy setting

Fix 8: Some Policies Require Logoff or Reboot

Certain policy types only apply during foreground processing — at user logon or machine startup:

  • Software Installation policies
  • Folder Redirection policies
  • Some registry-based preferences

For these, run:

gpupdate /force /logoff

or

gpupdate /force /boot

This triggers the required logoff or reboot after the policy refresh, allowing foreground-only policies to take effect.

Quick Diagnostic Checklist

Check Tool
Is GPO linked to correct OU? GPMC → Scope tab
Is target in security filter? GPMC → Security Filtering
Is WMI filter passing? PowerShell WMI query test
Which GPO is winning? gpresult /h report.html
Any GP errors in logs? Event Viewer → GroupPolicy → Operational
Does policy need reboot? gpupdate /force /boot

Key Takeaways

  • Always start with gpupdate /force then gpresult /r to diagnose
  • Check GPO link, security filtering, and WMI filters in GPMC
  • Clear the local GP cache if policies were working before but stopped
  • Use the HTML report from gpresult to find which GPO is winning
  • Some policies only apply at logon or reboot — use /logoff or /boot

For more Windows help, visit PGUpdate.in. See our related guides on gpupdate /force complete guide, fixing gpupdate not working, and how to use the gpresult command.

Frequently Asked Questions

Why is my Group Policy not applying even after gpupdate /force?

Check security filtering in GPMC — the user or computer may not be in the allowed group. Also check if a higher-priority GPO is overriding your setting using gpresult /h report.html.

How do I know which GPO is actually being applied?

Run gpresult /h C:report.html /f and open the HTML file. It shows the "Winning GPO" for every setting, making it clear which policy is taking effect.

Can a GPO apply to some computers but not others?

Yes — security filtering, WMI filters, and OU placement all control which computers receive a GPO. Use gpresult on the affected machine to see exactly what is and isn’t applying.

Does Group Policy work on non-domain computers?

Only Local Group Policy (via gpedit.msc) works on non-domain computers. Domain GPOs require the computer to be joined to an Active Directory domain.

How long does it take for Group Policy to apply automatically?

By default, every 90 minutes for computers and users, with a random offset of up to 30 minutes. Domain Controllers refresh every 5 minutes. Use gpupdate /force to apply immediately without waiting.

Hari Prasad

As a Lecturer I work professionally while holding the title of P. Hari Prasad. Beyond teaching at the university I truly cherish blog writing which I have practiced for twelve years. Through twelve years of content development experience I focus on delivering essential information across varied subject areas for my readers. . I create articles by carefully researching sources while maintaining continuous updates with credible online information to present reliable and recently relevant content to my readers . My ongoing dedication to producing reliable content demonstrates my commitment toward developing digital author authority that supports SEO achievement while building relationships with my audience. . Through my work I strive to give viewers beneficial content which remains trustworthy source material and puts the reader first while simultaneously motivating them to discover new viewpoints . My mission focuses on driving meaningful effects through educational practice alongside blogging platforms while utilizing my expertise and content creation skills for creating high-quality materials.

Leave a Comment