Merge branch 'main' into metaclient6

This commit is contained in:
Liz Long
2022-10-25 16:24:54 -04:00
committed by GitHub
78 changed files with 210 additions and 210 deletions

View File

@ -96,4 +96,4 @@ landingContent:
- text: Advanced troubleshooting for Windows start-up and performance - text: Advanced troubleshooting for Windows start-up and performance
url: /troubleshoot/windows-client/performance/performance-overview url: /troubleshoot/windows-client/performance/performance-overview
- text: Advanced troubleshooting for user profiles and logon - text: Advanced troubleshooting for user profiles and logon
url: /troubleshoot-windows-startup.md/troubleshoot/windows-client/user-profiles-and-logon/userprofiles-and-logon-overview url: /troubleshoot/windows-client/user-profiles-and-logon/userprofiles-and-logon-overview

View File

@ -43,6 +43,9 @@ You can use Windows Configuration Designer to create a provisioning package (`.p
Wizards are also available for creating provisioning packages for Microsoft Surface Hub and Microsoft HoloLens devices. For a summary of the settings available in the desktop and kiosk devices, see [What you can configure using Configuration Designer wizards](provisioning-packages.md#configuration-designer-wizards). Wizards are also available for creating provisioning packages for Microsoft Surface Hub and Microsoft HoloLens devices. For a summary of the settings available in the desktop and kiosk devices, see [What you can configure using Configuration Designer wizards](provisioning-packages.md#configuration-designer-wizards).
>[!NOTE]
>To target devices running versions earlier than Windows 10, version 2004, ComputerName customization must be defined from the setting path: `Accounts/ComputerAccount/ComputerName` from the advanced editor. The default path from the simple editor uses a new CSP that isn't available on older systems.
- The **Advanced provisioning** option opens a new project with all the runtime settings available. (The rest of this procedure uses advanced provisioning.) - The **Advanced provisioning** option opens a new project with all the runtime settings available. (The rest of this procedure uses advanced provisioning.)
>[!TIP] >[!TIP]

View File

@ -1,7 +1,7 @@
--- ---
title: Device registration overview title: Device registration overview
description: This article provides an overview on how to register devices in Autopatch description: This article provides an overview on how to register devices in Autopatch
ms.date: 09/07/2022 ms.date: 10/5/2022
ms.prod: w11 ms.prod: w11
ms.technology: windows ms.technology: windows
ms.topic: conceptual ms.topic: conceptual
@ -22,7 +22,8 @@ The overall device registration process is:
:::image type="content" source="../media/windows-autopatch-device-registration-overview.png" alt-text="Overview of the device registration process" lightbox="../media/windows-autopatch-device-registration-overview.png"::: :::image type="content" source="../media/windows-autopatch-device-registration-overview.png" alt-text="Overview of the device registration process" lightbox="../media/windows-autopatch-device-registration-overview.png":::
1. IT admin identifies devices to be managed by Windows Autopatch and adds them into the **Windows Autopatch Device Registration** Azure Active Directory (AD) group. 1. IT admin reviews [Windows Autopatch device registration pre-requisites](windows-autopatch-register-devices.md#prerequisites-for-device-registration) prior to register devices with Windows Autopatch.
2. IT admin identifies devices to be managed by Windows Autopatch and adds them into the **Windows Autopatch Device Registration** Azure Active Directory (AD) group.
1. Windows Autopatch then: 1. Windows Autopatch then:
1. Performs device readiness prior registration (prerequisite checks). 1. Performs device readiness prior registration (prerequisite checks).
1. Calculates the deployment ring distribution. 1. Calculates the deployment ring distribution.

View File

@ -72,8 +72,8 @@ To be eligible for Windows Autopatch management, devices must meet a minimum set
- Windows 10 (1809+)/11 Enterprise or Professional editions (only x64 architecture). - Windows 10 (1809+)/11 Enterprise or Professional editions (only x64 architecture).
- Either [Hybrid Azure AD-Joined](/azure/active-directory/devices/concept-azure-ad-join-hybrid) or [Azure AD-joined only](/azure/active-directory/devices/concept-azure-ad-join-hybrid) (personal devices aren't supported). - Either [Hybrid Azure AD-Joined](/azure/active-directory/devices/concept-azure-ad-join-hybrid) or [Azure AD-joined only](/azure/active-directory/devices/concept-azure-ad-join-hybrid) (personal devices aren't supported).
- Managed by Microsoft Endpoint Manager. - Managed by Microsoft Endpoint Manager.
- [Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune) and/or [Configuration Manager Co-management](/windows/deployment/windows-autopatch/prepare/windows-autopatch-prerequisites#configuration-manager-co-management-requirements). - [Already enrollled into Microsoft Intune](/mem/intune/user-help/enroll-windows-10-device) and/or [Configuration Manager co-management](/windows/deployment/windows-autopatch/prepare/windows-autopatch-prerequisites#configuration-manager-co-management-requirements).
- Must switch the following Microsoft Endpoint Manager-Configuration Manager [Co-management workloads](/mem/configmgr/comanage/how-to-switch-workloads) to Microsoft Endpoint Manager-Intune (either set to Pilot Intune or Intune): - Must switch the following Microsoft Endpoint Manager-Configuration Manager [co-management workloads](/mem/configmgr/comanage/how-to-switch-workloads) to Microsoft Endpoint Manager-Intune (either set to Pilot Intune or Intune):
- Windows updates policies - Windows updates policies
- Device configuration - Device configuration
- Office Click-to-run - Office Click-to-run
@ -202,7 +202,7 @@ For ease of deployment, we recommend nesting a dynamic device group in your Auto
Support is available either through Windows 365, or the Windows Autopatch Service Engineering team for device registration-related incidents. Support is available either through Windows 365, or the Windows Autopatch Service Engineering team for device registration-related incidents.
- For Windows 365 support, see [Get support](/mem/get-support). - For Windows 365 support, see [Get support](/mem/get-support).
- For Azure Virtual Desktop support, see [Get support](/support/create-ticket/). - For Azure Virtual Desktop support, see [Get support](https://azure.microsoft.com/support/create-ticket/).
- For Windows Autopatch support, see [Submit a support request](/windows/deployment/windows-autopatch/operate/windows-autopatch-support-request). - For Windows Autopatch support, see [Submit a support request](/windows/deployment/windows-autopatch/operate/windows-autopatch-support-request).
## Device management lifecycle scenarios ## Device management lifecycle scenarios

View File

@ -24,7 +24,7 @@ Getting started with Windows Autopatch has been designed to be easy. This articl
| Licensing | Windows Autopatch requires Windows 10/11 Enterprise E3 (or higher) to be assigned to your users. Additionally, Azure Active Directory Premium and Microsoft Intune are required. For details about the specific service plans, see [more about licenses](#more-about-licenses).<p><p>For more information on available licenses, see [Microsoft 365 licensing](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans).<p><p>For more information about licensing terms and conditions for products and services purchased through Microsoft Commercial Volume Licensing Programs, see the [Product Terms site](https://www.microsoft.com/licensing/terms/). | | Licensing | Windows Autopatch requires Windows 10/11 Enterprise E3 (or higher) to be assigned to your users. Additionally, Azure Active Directory Premium and Microsoft Intune are required. For details about the specific service plans, see [more about licenses](#more-about-licenses).<p><p>For more information on available licenses, see [Microsoft 365 licensing](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans).<p><p>For more information about licensing terms and conditions for products and services purchased through Microsoft Commercial Volume Licensing Programs, see the [Product Terms site](https://www.microsoft.com/licensing/terms/). |
| Connectivity | All Windows Autopatch devices require connectivity to multiple Microsoft service endpoints from the corporate network.<p><p>For the full list of required IPs and URLs, see [Configure your network](../prepare/windows-autopatch-configure-network.md). | | Connectivity | All Windows Autopatch devices require connectivity to multiple Microsoft service endpoints from the corporate network.<p><p>For the full list of required IPs and URLs, see [Configure your network](../prepare/windows-autopatch-configure-network.md). |
| Azure Active Directory | Azure Active Directory must either be the source of authority for all user accounts, or user accounts must be synchronized from on-premises Active Directory using the latest supported version of Azure Active Directory Connect to enable Hybrid Azure Active Directory join.<br><ul><li>For more information, see [Azure Active Directory Connect](/azure/active-directory/hybrid/whatis-azure-ad-connect) and [Hybrid Azure Active Directory join](/azure/active-directory/devices/howto-hybrid-azure-ad-join)</li><li>For more information on supported Azure Active Directory Connect versions, see [Azure AD Connect:Version release history](/azure/active-directory/hybrid/reference-connect-version-history).</li></ul> | | Azure Active Directory | Azure Active Directory must either be the source of authority for all user accounts, or user accounts must be synchronized from on-premises Active Directory using the latest supported version of Azure Active Directory Connect to enable Hybrid Azure Active Directory join.<br><ul><li>For more information, see [Azure Active Directory Connect](/azure/active-directory/hybrid/whatis-azure-ad-connect) and [Hybrid Azure Active Directory join](/azure/active-directory/devices/howto-hybrid-azure-ad-join)</li><li>For more information on supported Azure Active Directory Connect versions, see [Azure AD Connect:Version release history](/azure/active-directory/hybrid/reference-connect-version-history).</li></ul> |
| Device management | Windows Autopatch devices must be managed by Microsoft Intune. Intune must be set as the Mobile Device Management (MDM) authority or co-management must be turned on and enabled on the target devices.<p><p>At a minimum, the Windows Update, Device configuration and Office Click-to-Run apps workloads must be set to Pilot Intune or Intune. You must also ensure that the devices you intend on bringing to Windows Autopatch are in the targeted device collection. For more information, see [co-management requirements for Windows Autopatch](#configuration-manager-co-management-requirements).<p>Other device management prerequisites include:<ul><li>Devices must be corporate-owned. Windows bring-your-own-devices (BYOD) are blocked during device registration prerequisite checks.</li><li>Devices must be managed by either Intune or Configuration Manager co-management. Devices only managed by Configuration Manager aren't supported.</li><li>Devices must be in communication with Microsoft Intune in the **last 28 days**. Otherwise, the devices won't be registered with Autopatch.</li><li>Devices must be connected to the internet.</li><li>Devices must have a **Serial number**, **Model** and **Manufacturer**. Device emulators that don't generate this information fail to meet **Intune or Cloud-attached** prerequisite check.</li></ul><p>See [Register your devices](/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices) for more details on device prerequisites and on how the device registration process works.<p>For more information on co-management, see [co-management for Windows devices](/mem/configmgr/comanage/overview).</p> | | Device management | [Devices must be already enrolled with Microsoft Intune](/mem/intune/user-help/enroll-windows-10-device) prior to registering with Windows Autopatch. Intune must be set as the Mobile Device Management (MDM) authority or co-management must be turned on and enabled on the target devices.<p><p>At a minimum, the Windows Update, Device configuration and Office Click-to-Run apps workloads must be set to Pilot Intune or Intune. You must also ensure that the devices you intend on bringing to Windows Autopatch are in the targeted device collection. For more information, see [co-management requirements for Windows Autopatch](#configuration-manager-co-management-requirements).<p>Other device management prerequisites include:<ul><li>Devices must be corporate-owned. Windows bring-your-own-devices (BYOD) are blocked during device registration prerequisite checks.</li><li>Devices must be managed by either Intune or Configuration Manager co-management. Devices only managed by Configuration Manager aren't supported.</li><li>Devices must be in communication with Microsoft Intune in the **last 28 days**. Otherwise, the devices won't be registered with Autopatch.</li><li>Devices must be connected to the internet.</li><li>Devices must have a **Serial number**, **Model** and **Manufacturer**. Device emulators that don't generate this information fail to meet **Intune or Cloud-attached** prerequisite check.</li></ul><p>See [Register your devices](/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices) for more details on device prerequisites and on how the device registration process works with Windows Autopatch.<p>For more information on co-management, see [co-management for Windows devices](/mem/configmgr/comanage/overview).</p> |
| Data and privacy | For more information on Windows Autopatch privacy practices, see [Windows Autopatch Privacy](../references/windows-autopatch-privacy.md). | | Data and privacy | For more information on Windows Autopatch privacy practices, see [Windows Autopatch Privacy](../references/windows-autopatch-privacy.md). |
## More about licenses ## More about licenses

View File

@ -118,7 +118,7 @@ It's recommended Insiders on these devices pause flighting if these changes aren
For Windows devices in the Dev Channel that aren't joined to an Azure AD tenant, Microsoft will act as the controller for Windows diagnostic data in accordance with the [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement) and the [Data Protection Addendum](https://www.microsoft.com/licensing/docs/view/Microsoft-Products-and-Services-Data-Protection-Addendum-DPA) terms won't apply. For Windows devices in the Dev Channel that aren't joined to an Azure AD tenant, Microsoft will act as the controller for Windows diagnostic data in accordance with the [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement) and the [Data Protection Addendum](https://www.microsoft.com/licensing/docs/view/Microsoft-Products-and-Services-Data-Protection-Addendum-DPA) terms won't apply.
For other Windows devices (not in the Dev Channel), additional details on supported versions of Windows 11 and Windows 10 will be announced at a later date. These changes will roll out no earlier than the last quarter of calendar year 2022. For other Windows devices (not in the Dev Channel), the change will rollout with the January 2023 release preview cumulative update for Windows 10 versions 20H2, 21H2 and 22H2, and Windows 11 versions 21H2 and 22H2.
To prepare for this change, ensure that you meet the [prerequisites](configure-windows-diagnostic-data-in-your-organization.md#prerequisites) for Windows diagnostic data processor configuration, join your devices to Azure AD (can be a hybrid Azure AD join), and keep your devices secure and up to date with quality updates. If you're outside of the EU or EFTA, sign up for any of the enterprise services. To prepare for this change, ensure that you meet the [prerequisites](configure-windows-diagnostic-data-in-your-organization.md#prerequisites) for Windows diagnostic data processor configuration, join your devices to Azure AD (can be a hybrid Azure AD join), and keep your devices secure and up to date with quality updates. If you're outside of the EU or EFTA, sign up for any of the enterprise services.

View File

@ -66,7 +66,7 @@ The system BIOS or UEFI firmware (for TPM and non-TPM computers) must support th
> [!NOTE] > [!NOTE]
> TPM 2.0 is not supported in Legacy and Compatibility Support Module (CSM) modes of the BIOS. Devices with TPM 2.0 must have their BIOS mode configured as native UEFI only. The Legacy and CSM options must be disabled. For added security, enable the secure boot feature. > TPM 2.0 is not supported in Legacy and Compatibility Support Module (CSM) modes of the BIOS. Devices with TPM 2.0 must have their BIOS mode configured as native UEFI only. The Legacy and CSM options must be disabled. For added security, enable the secure boot feature.
> Installed Operating System on hardware in Legacy mode stops the OS from booting when the BIOS mode is changed to UEFI. Use the tool [MBR2GPT](/windows/deployment/mbr-to-gpt.md) before changing the BIOS mode, which prepares the OS and the disk to support UEFI. > Installed Operating System on hardware in Legacy mode stops the OS from booting when the BIOS mode is changed to UEFI. Use the tool [MBR2GPT](/windows/deployment/mbr-to-gpt) before changing the BIOS mode, which prepares the OS and the disk to support UEFI.
The hard disk must be partitioned with at least two drives: The hard disk must be partitioned with at least two drives:

View File

@ -14,10 +14,7 @@ ms.author: vinpa
ms.technology: windows-sec ms.technology: windows-sec
--- ---
# 4774(S, F): An account was mapped for logon. # 4774(S, F): An account was mapped for logon
Success events do not appear to occur. Failure event [has been reported](http://forum.ultimatewindowssecurity.com/Topic7313-282-1.aspx).
***Subcategory:***&nbsp;[Audit Credential Validation](audit-credential-validation.md) ***Subcategory:***&nbsp;[Audit Credential Validation](audit-credential-validation.md)
@ -25,11 +22,11 @@ Success events do not appear to occur. Failure event [has been reported](http://
*An account was mapped for logon.* *An account was mapped for logon.*
*Authentication Package:Schannel* *Authentication Package:* `<Authentication package>`
*Account UPN:*<*Acccount*>@<*Domain*> *Account UPN:* `<Acccount>@<Domain>`
*Mapped Name:*<*Account*> *Mapped Name:* `<Account>`
***Required Server Roles:*** no information. ***Required Server Roles:*** no information.
@ -39,5 +36,4 @@ Success events do not appear to occur. Failure event [has been reported](http://
## Security Monitoring Recommendations ## Security Monitoring Recommendations
- There is no recommendation for this event in this document. - There is no recommendation for this event in this document.

View File

@ -127,7 +127,7 @@ You can see interfaces GUID using the following commands:
- **Error Code** \[Type = HexInt32\]**:** there's no information about this field in this document. - **Error Code** \[Type = HexInt32\]**:** there's no information about this field in this document.
- **EAP Reason Code** \[Type = HexInt32\]**:** there's no information about this field in this document. See additional information here: <https://technet.microsoft.com/library/dd197570(v=ws.10).aspx>. - **EAP Reason Code** \[Type = HexInt32\]**:** there's no information about this field in this document. See [EAP Related Error and Information Constants](/windows/win32/eaphost/eap-related-error-and-information-constants) for additional information.
- **EAP Root Cause String** \[Type = UnicodeString\]**:** there's no information about this field in this document. - **EAP Root Cause String** \[Type = UnicodeString\]**:** there's no information about this field in this document.

View File

@ -186,7 +186,7 @@ Windows 10 supports features to help prevent sophisticated low-level malware lik
HVCI uses virtualization-based security to isolate Code Integrity, the only way kernel memory can become executable is through a Code Integrity verification. This dependency on verification means that kernel memory pages can never be Writable and Executable (W+X) and executable code can't be directly modified. HVCI uses virtualization-based security to isolate Code Integrity, the only way kernel memory can become executable is through a Code Integrity verification. This dependency on verification means that kernel memory pages can never be Writable and Executable (W+X) and executable code can't be directly modified.
> [!NOTE] > [!NOTE]
> Device Guard devices that run Kernel Mode Code Integrity with virtualization-based security must have compatible drivers. For additional information, please read the [Driver compatibility with Device Guard in Windows 10](https://go.microsoft.com/fwlink/p/?LinkId=691612) blog post. > Device Guard devices that run Kernel Mode Code Integrity with virtualization-based security must have compatible drivers. For additional information, please read the [Driver compatibility with Device Guard in Windows 10](https://techcommunity.microsoft.com/t5/windows-hardware-certification/driver-compatibility-with-device-guard-in-windows-10/ba-p/364865) blog post.
The Device Guard Code Integrity feature lets organizations control what code is trusted to run into the Windows kernel and what applications are approved to run in user mode. Its configurable by using a policy. The Device Guard Code Integrity feature lets organizations control what code is trusted to run into the Windows kernel and what applications are approved to run in user mode. Its configurable by using a policy.
Device Guard Code Integrity policy is a binary file that Microsoft recommends you sign. The signing of the Code Integrity policy aids in the protection against a malicious user with Administrator privileges trying to modify or remove the current Code Integrity policy. Device Guard Code Integrity policy is a binary file that Microsoft recommends you sign. The signing of the Code Integrity policy aids in the protection against a malicious user with Administrator privileges trying to modify or remove the current Code Integrity policy.
@ -248,7 +248,7 @@ The trust decision to execute code is performed by using Hyper-V Code Integrity,
Hyper-V Code Integrity is a feature that validates the integrity of a driver or system file each time it's loaded into memory. Code integrity detects whether an unsigned driver or system file is being loaded into the kernel, or whether a system file has been modified by malicious software that is being run by a user account with Administrator privileges. On x64-based versions of Windows 10, kernel-mode drivers must be digitally signed. Hyper-V Code Integrity is a feature that validates the integrity of a driver or system file each time it's loaded into memory. Code integrity detects whether an unsigned driver or system file is being loaded into the kernel, or whether a system file has been modified by malicious software that is being run by a user account with Administrator privileges. On x64-based versions of Windows 10, kernel-mode drivers must be digitally signed.
> [!NOTE] > [!NOTE]
> Independently of activation of Device Guard Policy, [Windows 10 by default raises the bar for what runs in the kernel](https://go.microsoft.com/fwlink/p/?LinkId=691613). Windows 10 drivers must be signed by Microsoft, and more specifically, by the WHQL (Windows Hardware Quality Labs) portal. Additionally, starting in October 2015, the WHQL portal will only accept driver submissions, including both kernel and user mode driver submissions, that have a valid Extended Validation (“EV”) Code Signing Certificate. > Independently of activation of Device Guard Policy, Windows 10 drivers must be signed by Microsoft, and more specifically, by the WHQL (Windows Hardware Quality Labs) portal. Additionally, starting in October 2015, the WHQL portal will only accept driver submissions, including both kernel and user mode driver submissions, that have a valid Extended Validation (“EV”) Code Signing Certificate.
With Device Guard in Windows 10, organizations are now able to define their own Code Integrity policy for use on x64 systems running Windows 10 Enterprise. Organizations have the ability to configure the policy that determines what is trusted to run. These include drivers and system files, and traditional desktop applications and scripts. The system is then locked down to only run applications that the organization trusts. With Device Guard in Windows 10, organizations are now able to define their own Code Integrity policy for use on x64 systems running Windows 10 Enterprise. Organizations have the ability to configure the policy that determines what is trusted to run. These include drivers and system files, and traditional desktop applications and scripts. The system is then locked down to only run applications that the organization trusts.
@ -599,7 +599,7 @@ Todays access control technology, in most cases, focuses on ensuring that the
The remote device health attestation process uses measured boot data to verify the health status of the device. The health of the device is then available for an MDM solution like Intune. The remote device health attestation process uses measured boot data to verify the health status of the device. The health of the device is then available for an MDM solution like Intune.
> [!NOTE] > [!NOTE]
> For the latest information on Intune and Windows 10 features support, see the [Microsoft Intune blog](https://go.microsoft.com/fwlink/p/?LinkId=691614) and [What's new in Microsoft Intune](/mem/intune/fundamentals/whats-new). > For the latest information on Intune and Windows 10 features support, see [What's new in Microsoft Intune](/mem/intune/fundamentals/whats-new).
The figure below shows how the Health Attestation Service is expected to work with Microsofts cloud-based Intune MDM service. The figure below shows how the Health Attestation Service is expected to work with Microsofts cloud-based Intune MDM service.

View File

@ -85,7 +85,7 @@ Collecting these events in a central location can help you maintain your AppLock
As new apps are deployed or existing apps are updated by the software publisher, you'll need to make revisions to your rule collections to ensure that the policy is current. As new apps are deployed or existing apps are updated by the software publisher, you'll need to make revisions to your rule collections to ensure that the policy is current.
You can edit an AppLocker policy by adding, changing, or removing rules. However, you can't specify a version for the policy by importing more rules. To ensure version control when modifying an AppLocker policy, use Group Policy management software that allows you to create versions of Group Policy Objects (GPOs). An example of this type of software is the Advanced Group Policy Management feature from the Microsoft Desktop Optimization Pack. For more info about Advanced Group Policy Management, see [Advanced Group Policy Management Overview](https://go.microsoft.com/fwlink/p/?LinkId=145013) (https://go.microsoft.com/fwlink/p/?LinkId=145013). You can edit an AppLocker policy by adding, changing, or removing rules. However, you can't specify a version for the policy by importing more rules. To ensure version control when modifying an AppLocker policy, use Group Policy management software that allows you to create versions of Group Policy Objects (GPOs). An example of this type of software is the Advanced Group Policy Management feature from the Microsoft Desktop Optimization Pack. For more info about Advanced Group Policy Management, see [Advanced Group Policy Management Overview](https://go.microsoft.com/fwlink/p/?LinkId=145013).
> [!IMPORTANT] > [!IMPORTANT]
> You should not edit an AppLocker rule collection while it is being enforced in Group Policy. Because AppLocker controls what files are allowed to run, making changes to a live policy can create unexpected behavior. > You should not edit an AppLocker rule collection while it is being enforced in Group Policy. Because AppLocker controls what files are allowed to run, making changes to a live policy can create unexpected behavior.
@ -116,7 +116,7 @@ A file could be blocked for three reasons:
- There may be an existing rule that was created for the file that is too restrictive. - There may be an existing rule that was created for the file that is too restrictive.
- A deny rule, which can't be overridden, is explicitly blocking the file. - A deny rule, which can't be overridden, is explicitly blocking the file.
Before editing the rule collection, first determine what rule is preventing the file from running. You can troubleshoot the problem by using the **Test-AppLockerPolicy** Windows PowerShell cmdlet. For more info about troubleshooting an AppLocker policy, see [Testing and Updating an AppLocker Policy](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee791793(v=ws.10)) (https://go.microsoft.com/fwlink/p/?LinkId=160269). Before editing the rule collection, first determine what rule is preventing the file from running. You can troubleshoot the problem by using the **Test-AppLockerPolicy** Windows PowerShell cmdlet. For more info about troubleshooting an AppLocker policy, see [Testing and Updating an AppLocker Policy](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee791793(v=ws.10)).
## Record your findings ## Record your findings

View File

@ -3,14 +3,14 @@ title: Encryption Zone GPOs (Windows)
description: Learn how to add a device to an encryption zone by adding the device account to the encryption zone group in Windows Defender Firewall with Advanced Security. description: Learn how to add a device to an encryption zone by adding the device account to the encryption zone group in Windows Defender Firewall with Advanced Security.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Encryption Zone (Windows)
description: Learn how to create an encryption zone to contain devices that host sensitive data and require that the sensitive network traffic be encrypted. description: Learn how to create an encryption zone to contain devices that host sensitive data and require that the sensitive network traffic be encrypted.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Evaluating Windows Defender Firewall with Advanced Security Design Exampl
description: Evaluating Windows Defender Firewall with Advanced Security Design Examples description: Evaluating Windows Defender Firewall with Advanced Security Design Examples
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Exempt ICMP from Authentication (Windows)
description: Learn how to add exemptions for any network traffic that uses the ICMP protocol in Windows Defender Firewall with Advanced Security. description: Learn how to add exemptions for any network traffic that uses the ICMP protocol in Windows Defender Firewall with Advanced Security.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Exemption List (Windows)
description: Learn about reasons to add devices to an exemption list in Windows Defender Firewall with Advanced Security and the trade-offs of having too many exemptions. description: Learn about reasons to add devices to an exemption list in Windows Defender Firewall with Advanced Security and the trade-offs of having too many exemptions.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,7 +3,7 @@ title: Filter origin audit log improvements
description: Filter origin documentation audit log improvements description: Filter origin documentation audit log improvements
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: normal ms.localizationpriority: normal
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
@ -11,7 +11,7 @@ ms.collection:
- m365-security-compliance - m365-security-compliance
- m365-initiative-windows-security - m365-initiative-windows-security
ms.topic: troubleshooting ms.topic: troubleshooting
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Firewall GPOs (Windows)
description: In this example, a Group Policy Object is linked to the domain container because the domain controllers aren't part of the isolated domain. description: In this example, a Group Policy Object is linked to the domain container because the domain controllers aren't part of the isolated domain.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Basic Firewall Policy Design Example (Windows)
description: This example features a fictitious company and illustrates firewall policy design for Windows Defender Firewall with Advanced Security. description: This example features a fictitious company and illustrates firewall policy design for Windows Defender Firewall with Advanced Security.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,7 +3,7 @@ title: Troubleshooting Windows Firewall settings after a Windows upgrade
description: Firewall settings lost on upgrade description: Firewall settings lost on upgrade
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
@ -11,7 +11,7 @@ ms.collection:
- m365-security-compliance - m365-security-compliance
- m365-initiative-windows-security - m365-initiative-windows-security
ms.topic: troubleshooting ms.topic: troubleshooting
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Gathering Information about Your Active Directory Deployment (Windows)
description: Learn about gathering Active Directory information, including domain layout, organizational unit architecture, and site topology, for your firewall deployment. description: Learn about gathering Active Directory information, including domain layout, organizational unit architecture, and site topology, for your firewall deployment.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Gathering Info about Your Network Infrastructure (Windows)
description: Learn how to gather info about your network infrastructure so that you can effectively plan for Windows Defender Firewall with Advanced Security deployment. description: Learn how to gather info about your network infrastructure so that you can effectively plan for Windows Defender Firewall with Advanced Security deployment.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Gathering Information about Your Devices (Windows)
description: Learn what information to gather about the devices in your enterprise to plan your Windows Defender Firewall with Advanced Security deployment. description: Learn what information to gather about the devices in your enterprise to plan your Windows Defender Firewall with Advanced Security deployment.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Gathering Other Relevant Information (Windows)
description: Learn about additional information you may need to gather to deploy Windows Defender Firewall with Advanced Security policies in your organization. description: Learn about additional information you may need to gather to deploy Windows Defender Firewall with Advanced Security policies in your organization.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Gathering the Information You Need (Windows)
description: Collect and analyze information about your network, directory services, and devices to prepare for Windows Defender Firewall with Advanced Security deployment. description: Collect and analyze information about your network, directory services, and devices to prepare for Windows Defender Firewall with Advanced Security deployment.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: GPO\_DOMISO\_Boundary (Windows)
description: This example GPO supports devices that aren't part of the isolated domain to access specific servers that must be available to those untrusted devices. description: This example GPO supports devices that aren't part of the isolated domain to access specific servers that must be available to those untrusted devices.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -7,10 +7,10 @@ author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: GPO\_DOMISO\_Firewall (Windows)
description: Learn about the settings and rules in this example GPO, which is authored by using the Group Policy editing tools. description: Learn about the settings and rules in this example GPO, which is authored by using the Group Policy editing tools.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: GPO\_DOMISO\_IsolatedDomain\_Clients (Windows)
description: Author this GPO by using Windows Defender Firewall with Advanced Security interface in the Group Policy editing tools. description: Author this GPO by using Windows Defender Firewall with Advanced Security interface in the Group Policy editing tools.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: GPO\_DOMISO\_IsolatedDomain\_Servers (Windows)
description: Author this GPO by using the Windows Defender Firewall with Advanced Security interface in the Group Policy editing tools. description: Author this GPO by using the Windows Defender Firewall with Advanced Security interface in the Group Policy editing tools.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Identify implementation goals for Windows Defender Firewall with Advanced
description: Identifying Your Windows Defender Firewall with Advanced Security (WFAS) implementation goals description: Identifying Your Windows Defender Firewall with Advanced Security (WFAS) implementation goals
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Implementing Your Windows Defender Firewall with Advanced Security Design
description: Implementing Your Windows Defender Firewall with Advanced Security Design Plan description: Implementing Your Windows Defender Firewall with Advanced Security Design Plan
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Isolated Domain GPOs (Windows)
description: Learn about GPOs for isolated domains in this example configuration of Windows Defender Firewall with Advanced Security. description: Learn about GPOs for isolated domains in this example configuration of Windows Defender Firewall with Advanced Security.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Isolated Domain (Windows)
description: Learn about the isolated domain, which is the primary zone for trusted devices, which use connection security and firewall rules to control communication. description: Learn about the isolated domain, which is the primary zone for trusted devices, which use connection security and firewall rules to control communication.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -1,7 +1,7 @@
--- ---
title: Isolating Microsoft Store Apps on Your Network (Windows) title: Isolating Microsoft Store Apps on Your Network (Windows)
description: Learn how to customize your firewall configuration to isolate the network access of the new Microsoft Store apps that run on devices added to your network. description: Learn how to customize your firewall configuration to isolate the network access of the new Microsoft Store apps that run on devices added to your network.
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
@ -10,7 +10,7 @@ ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Link the GPO to the Domain (Windows)
description: Learn how to link a GPO to the Active Directory container for the target devices, after you configure it in Windows Defender Firewall with Advanced Security. description: Learn how to link a GPO to the Active Directory container for the target devices, after you configure it in Windows Defender Firewall with Advanced Security.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Mapping your implementation goals to a Windows Firewall with Advanced Sec
description: Mapping your implementation goals to a Windows Firewall with Advanced Security design description: Mapping your implementation goals to a Windows Firewall with Advanced Security design
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Modify GPO Filters (Windows)
description: Learn how to modify GPO filters to apply to a different zone or version of windows in Windows Defender Firewall with Advanced Security. description: Learn how to modify GPO filters to apply to a different zone or version of windows in Windows Defender Firewall with Advanced Security.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Open the Group Policy Management Console to IP Security Policies (Windows
description: Learn how to open the Group Policy Management Console to IP Security Policies to configure GPOs for earlier versions of the Windows operating system. description: Learn how to open the Group Policy Management Console to IP Security Policies to configure GPOs for earlier versions of the Windows operating system.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Group Policy Management of Windows Firewall with Advanced Security (Windo
description: Group Policy Management of Windows Firewall with Advanced Security description: Group Policy Management of Windows Firewall with Advanced Security
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Group Policy Management of Windows Defender Firewall (Windows)
description: Group Policy Management of Windows Defender Firewall with Advanced Security description: Group Policy Management of Windows Defender Firewall with Advanced Security
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Open Windows Defender Firewall with Advanced Security (Windows)
description: Learn how to open the Windows Defender Firewall with Advanced Security console. You must be a member of the Administrators group. description: Learn how to open the Windows Defender Firewall with Advanced Security console. You must be a member of the Administrators group.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Planning Certificate-based Authentication (Windows)
description: Learn how a device unable to join an Active Directory domain can still participate in an isolated domain by using certificate-based authentication. description: Learn how a device unable to join an Active Directory domain can still participate in an isolated domain by using certificate-based authentication.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Planning Domain Isolation Zones (Windows)
description: Learn how to use information you've gathered to make decisions about isolation zones for your environment in Windows Defender Firewall with Advanced Security. description: Learn how to use information you've gathered to make decisions about isolation zones for your environment in Windows Defender Firewall with Advanced Security.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Planning GPO Deployment (Windows)
description: Learn how to use security group filtering and WMI filtering to provide the most flexible options for applying GPOs to devices in Active Directory. description: Learn how to use security group filtering and WMI filtering to provide the most flexible options for applying GPOs to devices in Active Directory.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Planning Group Policy Deployment for Your Isolation Zones (Windows)
description: Learn how to plan a group policy deployment for your isolation zones after you determine the best logical design for your isolation environment. description: Learn how to plan a group policy deployment for your isolation zones after you determine the best logical design for your isolation environment.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Planning Isolation Groups for the Zones (Windows)
description: Learn about planning isolation groups for the zones in Microsoft Firewall, including information on universal groups and GPOs. description: Learn about planning isolation groups for the zones in Microsoft Firewall, including information on universal groups and GPOs.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Planning Network Access Groups (Windows)
description: Learn how to implement a network access group for users and devices that can access an isolated server in Windows Defender Firewall with Advanced Security. description: Learn how to implement a network access group for users and devices that can access an isolated server in Windows Defender Firewall with Advanced Security.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Planning Server Isolation Zones (Windows)
description: Learn how to restrict access to a server to approved users by using a server isolation zone in Windows Defender Firewall with Advanced Security. description: Learn how to restrict access to a server to approved users by using a server isolation zone in Windows Defender Firewall with Advanced Security.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Planning Settings for a Basic Firewall Policy (Windows)
description: Learn how to design a basic policy for Windows Defender Firewall with Advanced Security, the settings and rules that enforce your requirements on devices. description: Learn how to design a basic policy for Windows Defender Firewall with Advanced Security, the settings and rules that enforce your requirements on devices.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Planning the GPOs (Windows)
description: Learn about planning Group Policy Objects for your isolation zones in Windows Defender Firewall with Advanced Security, after you design the zone layout. description: Learn about planning Group Policy Objects for your isolation zones in Windows Defender Firewall with Advanced Security, after you design the zone layout.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Plan to Deploy Windows Defender Firewall with Advanced Security (Windows)
description: Use the design information in this article to plan for the deployment of Windows Defender Firewall with Advanced Security in your organization. description: Use the design information in this article to plan for the deployment of Windows Defender Firewall with Advanced Security in your organization.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Planning Your Windows Defender Firewall with Advanced Security Design (Wi
description: After you gather the relevant information, select the design or combination of designs for Windows Defender Firewall with Advanced Security in your environment. description: After you gather the relevant information, select the design or combination of designs for Windows Defender Firewall with Advanced Security in your environment.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Procedures Used in This Guide (Windows)
description: Refer to this summary of procedures for Windows Defender Firewall with Advanced Security from checklists in this guide. description: Refer to this summary of procedures for Windows Defender Firewall with Advanced Security from checklists in this guide.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Protect devices from unwanted network traffic (Windows)
description: Learn how running a host-based firewall on every device in your organization can help protect against attacks as part of a defense-in-depth security strategy. description: Learn how running a host-based firewall on every device in your organization can help protect against attacks as part of a defense-in-depth security strategy.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 01/18/2022 ms.date: 01/18/2022
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -5,12 +5,12 @@ ms.author: paoloma
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: normal ms.localizationpriority: normal
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Require Encryption When Accessing Sensitive Network Resources (Windows)
description: Windows Defender Firewall with Advanced Security allows you to require that all network traffic in an isolated domain be encrypted. description: Windows Defender Firewall with Advanced Security allows you to require that all network traffic in an isolated domain be encrypted.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Restrict Access to Only Specified Users or Devices (Windows)
description: Restrict access to devices and users that are members of domain groups authorized to access that device using Windows Defender Firewall with Advanced Security. description: Restrict access to devices and users that are members of domain groups authorized to access that device using Windows Defender Firewall with Advanced Security.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Restrict access to only trusted devices (Windows)
description: Windows Defender Firewall with Advanced Security enables you to isolate devices you trust and restrict access of untrusted devices to trusted devices. description: Windows Defender Firewall with Advanced Security enables you to isolate devices you trust and restrict access of untrusted devices to trusted devices.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Restrict Server Access to Members of a Group Only (Windows)
description: Create a firewall rule to access isolated servers running Windows Server 2008 or later and restrict server access to members of a group. description: Create a firewall rule to access isolated servers running Windows Server 2008 or later and restrict server access to members of a group.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -1,7 +1,7 @@
--- ---
title: Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012 (Windows) title: Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012 (Windows)
description: Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012 description: Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
@ -10,7 +10,7 @@ ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Server Isolation GPOs (Windows)
description: Learn about required GPOs for isolation zones and how many server isolation zones you need in Windows Defender Firewall with Advanced Security. description: Learn about required GPOs for isolation zones and how many server isolation zones you need in Windows Defender Firewall with Advanced Security.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Server Isolation Policy Design Example (Windows)
description: Learn about server isolation policy design in Windows Defender Firewall with Advanced Security by referring to this example of a fictitious company. description: Learn about server isolation policy design in Windows Defender Firewall with Advanced Security by referring to this example of a fictitious company.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Server Isolation Policy Design (Windows)
description: Learn about server isolation policy design, where you assign servers to a zone that allows access only to members of an approved network access group. description: Learn about server isolation policy design, where you assign servers to a zone that allows access only to members of an approved network access group.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,7 +3,7 @@ title: Troubleshooting UWP App Connectivity Issues in Windows Firewall
description: Troubleshooting UWP App Connectivity Issues in Windows Firewall description: Troubleshooting UWP App Connectivity Issues in Windows Firewall
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
@ -11,7 +11,7 @@ ms.collection:
- m365-security-compliance - m365-security-compliance
- m365-initiative-windows-security - m365-initiative-windows-security
ms.topic: troubleshooting ms.topic: troubleshooting
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Turn on Windows Defender Firewall with Advanced Security and Configure De
description: Turn on Windows Defender Firewall with Advanced Security and Configure Default Behavior description: Turn on Windows Defender Firewall with Advanced Security and Configure Default Behavior
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -1,7 +1,7 @@
--- ---
title: Understand WFAS Deployment (Windows) title: Understand WFAS Deployment (Windows)
description: Resources for helping you understand the Windows Defender Firewall with Advanced Security (WFAS) Design Process description: Resources for helping you understand the Windows Defender Firewall with Advanced Security (WFAS) Design Process
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
@ -10,7 +10,7 @@ ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Verify That Network Traffic Is Authenticated (Windows)
description: Learn how to confirm that network traffic is being protected by IPsec authentication after you configure your domain isolation rule to require authentication. description: Learn how to confirm that network traffic is being protected by IPsec authentication after you configure your domain isolation rule to require authentication.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -1,7 +1,7 @@
--- ---
title: Windows Defender Firewall with Advanced Security Administration with Windows PowerShell (Windows) title: Windows Defender Firewall with Advanced Security Administration with Windows PowerShell (Windows)
description: Windows Defender Firewall with Advanced Security Administration with Windows PowerShell description: Windows Defender Firewall with Advanced Security Administration with Windows PowerShell
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
@ -10,7 +10,7 @@ ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Windows Defender Firewall with Advanced Security deployment overview (Win
description: Use this guide to deploy Windows Defender Firewall with Advanced Security for your enterprise to help protect devices and data that they share across a network. description: Use this guide to deploy Windows Defender Firewall with Advanced Security for your enterprise to help protect devices and data that they share across a network.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -3,14 +3,14 @@ title: Windows Defender Firewall with Advanced Security design guide (Windows)
description: Learn about common goals for using Windows Defender Firewall with Advanced Security to choose or create a design for deploying the firewall in your enterprise. description: Learn about common goals for using Windows Defender Firewall with Advanced Security to choose or create a design for deploying the firewall in your enterprise.
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.author: paoloma ms.author: paoloma
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
manager: aaroncz manager: aaroncz
ms.collection: M365-security-compliance ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -1,7 +1,7 @@
--- ---
title: Windows Defender Firewall with Advanced Security (Windows) title: Windows Defender Firewall with Advanced Security (Windows)
description: Learn overview information about the Windows Defender Firewall with Advanced Security (WFAS) and Internet Protocol security (IPsec) features. description: Learn overview information about the Windows Defender Firewall with Advanced Security (WFAS) and Internet Protocol security (IPsec) features.
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
author: paolomatarazzo author: paolomatarazzo
ms.author: paoloma ms.author: paoloma
@ -11,7 +11,7 @@ ms.topic: conceptual
ms.date: 09/08/2021 ms.date: 09/08/2021
ms.reviewer: jekrynit ms.reviewer: jekrynit
ms.custom: asr ms.custom: asr
ms.technology: windows-sec ms.technology: itpro-security
appliesto: appliesto:
-<b>Windows 10</b> -<b>Windows 10</b>
-<b>Windows 11</b> -<b>Windows 11</b>

View File

@ -1,7 +1,7 @@
--- ---
title: Windows Sandbox architecture title: Windows Sandbox architecture
description: Windows Sandbox architecture description: Windows Sandbox architecture
ms.prod: m365-security ms.prod: windows-client
author: vinaypamnani-msft author: vinaypamnani-msft
ms.author: vinpa ms.author: vinpa
manager: aaroncz manager: aaroncz
@ -10,7 +10,7 @@ ms.topic: article
ms.localizationpriority: ms.localizationpriority:
ms.date: ms.date:
ms.reviewer: ms.reviewer:
ms.technology: windows-sec ms.technology: itpro-security
--- ---
# Windows Sandbox architecture # Windows Sandbox architecture

View File

@ -1,7 +1,7 @@
--- ---
title: Windows Sandbox configuration title: Windows Sandbox configuration
description: Windows Sandbox configuration description: Windows Sandbox configuration
ms.prod: m365-security ms.prod: windows-client
author: vinaypamnani-msft author: vinaypamnani-msft
ms.author: vinpa ms.author: vinpa
manager: aaroncz manager: aaroncz
@ -10,7 +10,7 @@ ms.topic: article
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: ms.date:
ms.reviewer: ms.reviewer:
ms.technology: windows-sec ms.technology: itpro-security
--- ---
# Windows Sandbox configuration # Windows Sandbox configuration

View File

@ -1,7 +1,7 @@
--- ---
title: Windows Sandbox title: Windows Sandbox
description: Windows Sandbox overview description: Windows Sandbox overview
ms.prod: m365-security ms.prod: windows-client
author: vinaypamnani-msft author: vinaypamnani-msft
ms.author: vinpa ms.author: vinpa
manager: aaroncz manager: aaroncz
@ -10,7 +10,7 @@ ms.topic: article
ms.localizationpriority: ms.localizationpriority:
ms.date: ms.date:
ms.reviewer: ms.reviewer:
ms.technology: windows-sec ms.technology: itpro-security
--- ---
# Windows Sandbox # Windows Sandbox

View File

@ -1,7 +1,7 @@
--- ---
title: Get support for security baselines title: Get support for security baselines
description: Find answers to frequently asked question on how to get support for baselines, the Security Compliance Toolkit (SCT), and related topics. description: Find answers to frequently asked question on how to get support for baselines, the Security Compliance Toolkit (SCT), and related topics.
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
ms.author: vinpa ms.author: vinpa
author: vinaypamnani-msft author: vinaypamnani-msft
@ -10,7 +10,7 @@ ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 10/19/2022 ms.date: 10/19/2022
ms.reviewer: jmunck ms.reviewer: jmunck
ms.technology: windows-sec ms.technology: itpro-security
--- ---
# Get Support # Get Support

View File

@ -1,7 +1,7 @@
--- ---
title: Microsoft Security Compliance Toolkit 1.0 Guide title: Microsoft Security Compliance Toolkit 1.0 Guide
description: This article describes how to use Security Compliance Toolkit 1.0 in your organization description: This article describes how to use Security Compliance Toolkit 1.0 in your organization
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
ms.author: vinpa ms.author: vinpa
author: vinaypamnani-msft author: vinaypamnani-msft
@ -10,7 +10,7 @@ ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 02/14/2022 ms.date: 02/14/2022
ms.reviewer: rmunck ms.reviewer: rmunck
ms.technology: windows-sec ms.technology: itpro-security
--- ---
# Microsoft Security Compliance Toolkit 1.0 - How to use # Microsoft Security Compliance Toolkit 1.0 - How to use

View File

@ -1,7 +1,7 @@
--- ---
title: Security baselines guide title: Security baselines guide
description: Learn how to use security baselines in your organization. description: Learn how to use security baselines in your organization.
ms.prod: m365-security ms.prod: windows-client
ms.localizationpriority: medium ms.localizationpriority: medium
ms.author: vinpa ms.author: vinpa
author: vinaypamnani-msft author: vinaypamnani-msft
@ -10,7 +10,7 @@ ms.collection: M365-security-compliance
ms.topic: conceptual ms.topic: conceptual
ms.date: 01/26/2022 ms.date: 01/26/2022
ms.reviewer: jmunck ms.reviewer: jmunck
ms.technology: windows-sec ms.technology: itpro-security
--- ---
# Security baselines # Security baselines