mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
test GPO settings
This commit is contained in:
parent
359308efd8
commit
2e0f2da643
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure the Windows Defender Firewall Log
|
title: Configure Windows Firewall logging
|
||||||
description: Learn how to configure Windows Firewall to log dropped packets or successful connections with Microsoft Intune and group policy.
|
description: Learn how to configure Windows Firewall to log dropped packets or successful connections with CSP and group policy.
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
ms.date: 11/14/2023
|
ms.date: 11/14/2023
|
||||||
---
|
---
|
||||||
@ -9,14 +9,12 @@ ms.date: 11/14/2023
|
|||||||
|
|
||||||
To configure Windows Firewall to log dropped packets or successful connections, you can use:
|
To configure Windows Firewall to log dropped packets or successful connections, you can use:
|
||||||
|
|
||||||
- Microsoft Intune/MDM
|
- Configuration Service Provider (CSP), using an MDM solution like Microsoft Intune
|
||||||
- Group policy with the Windows Defender Firewall with Advanced Security node in the Group Policy Management MMC snap-in
|
- Group policy (GPO)
|
||||||
|
|
||||||
[!INCLUDE [tab-intro](../../../../../includes/configure/tab-intro.md)]
|
[!INCLUDE [tab-intro](../../../../../includes/configure/tab-intro.md)]
|
||||||
|
|
||||||
#### [:::image type="icon" source="../../../images/icons/intune.svg" border="false"::: **Intune/MDM**](#tab/intune)
|
# [:::image type="icon" source="../../../images/icons/intune.svg" border="false"::: **Intune/CSP**](#tab/intune)
|
||||||
|
|
||||||
### Configure Windows Firewall with Intune
|
|
||||||
|
|
||||||
[!INCLUDE [intune-settings-catalog-1](../../../../../includes/configure/intune-settings-catalog-1.md)]
|
[!INCLUDE [intune-settings-catalog-1](../../../../../includes/configure/intune-settings-catalog-1.md)]
|
||||||
|
|
||||||
@ -36,22 +34,10 @@ Alternatively, you can configure devices using a [custom policy][INT-1] with the
|
|||||||
| **Setting name**: Turn On Virtualization Based Security<br>**OMA-URI**: `./Device/Vendor/MSFT/Policy/Config/DeviceGuard/EnableVirtualizationBasedSecurity`<br>**Data type**: int<br>**Value**: `1`|
|
| **Setting name**: Turn On Virtualization Based Security<br>**OMA-URI**: `./Device/Vendor/MSFT/Policy/Config/DeviceGuard/EnableVirtualizationBasedSecurity`<br>**Data type**: int<br>**Value**: `1`|
|
||||||
| **Setting name**: Credential Guard Configuration<br>**OMA-URI**: `./Device/Vendor/MSFT/Policy/Config/DeviceGuard/LsaCfgFlags`<br>**Data type**: int<br>**Value**:<br> **Enabled with UEFI lock**: `1`<br> **Enabled without lock**: `2`|
|
| **Setting name**: Credential Guard Configuration<br>**OMA-URI**: `./Device/Vendor/MSFT/Policy/Config/DeviceGuard/LsaCfgFlags`<br>**Data type**: int<br>**Value**:<br> **Enabled with UEFI lock**: `1`<br> **Enabled without lock**: `2`|
|
||||||
|
|
||||||
Once the policy is applied, restart the device.
|
# [:::image type="icon" source="../../../images/icons/group-policy.svg" border="false"::: **Group policy**](#tab/gpo)
|
||||||
|
|
||||||
#### [:::image type="icon" source="../../../images/icons/group-policy.svg" border="false"::: **Group policy**](#tab/gpo)
|
|
||||||
|
|
||||||
### Configure Windows Firewall with group policy
|
|
||||||
|
|
||||||
[!INCLUDE [gpo-settings-1](../../../../../includes/configure/gpo-settings-1.md)]
|
[!INCLUDE [gpo-settings-1](../../../../../includes/configure/gpo-settings-1.md)]
|
||||||
|
|
||||||
| Group policy path | Group policy setting | Value |
|
|
||||||
| - | - | - |
|
|
||||||
| **Computer Configuration\Administrative Templates\System\Device Guard** |Turn On Virtualization Based Security | **Enabled** and select one of the options listed under the **Credential Guard Configuration** dropdown:<br> - **Enabled with UEFI lock**<br> - **Enabled without lock**|
|
|
||||||
|
|
||||||
[!INCLUDE [gpo-settings-2](../../../../../includes/configure/gpo-settings-2.md)]
|
|
||||||
|
|
||||||
Once the policy is applied, restart the device.
|
|
||||||
|
|
||||||
1. Open the Group Policy Management Console to [Windows Defender Firewall with Advanced Security](open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md).
|
1. Open the Group Policy Management Console to [Windows Defender Firewall with Advanced Security](open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md).
|
||||||
1. In the details pane, in the **Overview** section, click **Windows Defender Firewall Properties**.
|
1. In the details pane, in the **Overview** section, click **Windows Defender Firewall Properties**.
|
||||||
1. For each network location type (Domain, Private, Public), perform the following steps.
|
1. For each network location type (Domain, Private, Public), perform the following steps.
|
||||||
@ -66,6 +52,13 @@ Once the policy is applied, restart the device.
|
|||||||
- To create a log entry when Windows Defender Firewall allows an inbound connection, change **Log successful connections** to **Yes**
|
- To create a log entry when Windows Defender Firewall allows an inbound connection, change **Log successful connections** to **Yes**
|
||||||
1. Click **OK** twice
|
1. Click **OK** twice
|
||||||
|
|
||||||
|
|
||||||
|
| Group policy path | Group policy setting | Value |
|
||||||
|
| - | - | - |
|
||||||
|
| **Computer Configuration** > **Windows Settings** > **Security Settings** > **Windows Defender Firewall with Advanced Security** |Turn On Virtualization Based Security | **Enabled** and select one of the options listed under the **Credential Guard Configuration** dropdown:<br> - **Enabled with UEFI lock**<br> - **Enabled without lock**|
|
||||||
|
|
||||||
|
[!INCLUDE [gpo-settings-2](../../../../../includes/configure/gpo-settings-2.md)]
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
### Troubleshoot Slow Log Ingestion
|
### Troubleshoot Slow Log Ingestion
|
||||||
|
Loading…
x
Reference in New Issue
Block a user