From 1e07e3ab8ebeeab71ec727801eee809fff8c1100 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 29 Apr 2016 09:27:12 -0700 Subject: [PATCH] fixing more links --- ...-windows-firewall-with-advanced-security-deployment-goals.md | 2 +- .../protect-computers-from-unwanted-network-traffic.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md b/windows/keep-secure/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md index 1dbe198a85..8f50949a9a 100644 --- a/windows/keep-secure/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md +++ b/windows/keep-secure/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md @@ -52,7 +52,7 @@ The following table lists the three main tasks for articulating, refining, and s   -**Next:**[Protect Computers from Unwanted Network Traffic](fe94e9b8-c456-4343-af5f-5511b8047d29) +**Next:**[Protect Computers from Unwanted Network Traffic](protect-computers-from-unwanted-network-traffic.md)   diff --git a/windows/keep-secure/protect-computers-from-unwanted-network-traffic.md b/windows/keep-secure/protect-computers-from-unwanted-network-traffic.md index 4ce8c89c1d..5230ec4e6d 100644 --- a/windows/keep-secure/protect-computers-from-unwanted-network-traffic.md +++ b/windows/keep-secure/protect-computers-from-unwanted-network-traffic.md @@ -28,7 +28,7 @@ A host-based firewall helps secure a computer by dropping all network traffic th The following component is recommended for this deployment goal: -- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more Group Policy objects (GPOs) that can be automatically applied to all relevant computers in the domain. For more information about Active Directory, see [Additional Resources \[lhs\]](508b3d05-e9c9-4df9-bae4-750d4ad03302). +- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more Group Policy objects (GPOs) that can be automatically applied to all relevant computers in the domain. For more information about Active Directory, see [Additional Resources](additional-resources-wfasdesign.md). Other means of deploying a firewall policy are available, such as creating scripts that use the **netsh** command-line tool, and then running those scripts on each computer in the organization. This guide uses Active Directory as a recommended means of deployment because of its ability to scale to very large organizations.