mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
batch 2
This commit is contained in:
parent
12135b28d4
commit
54a3c8ed39
@ -7654,6 +7654,126 @@
|
|||||||
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design-example.md",
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design-example.md",
|
||||||
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc732413(v=ws.10)",
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc732413(v=ws.10)",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
}
|
}
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc770289(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-basic-firewall-settings",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947845(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947794(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947848(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-boundary-zone",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947836(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-encryption-zone",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947800(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-isolated-domain",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947783(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-group-policy-objects",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947791(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-inbound-firewall-rules",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947799(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-outbound-firewall-rules",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947827(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc947819(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-basic-firewall-policy-design",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717261(v=ws.11)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717238(v=ws.11)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-domain-isolation-policy-design",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717284(v=ws.11)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717277(v=ws.11)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc732023(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717256(v=ws.11)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/protect-devices-from-unwanted-network-traffic",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc772556(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/require-encryption-when-accessing-sensitive-network-resources",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc770865(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-specified-users-or-devices",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc753064(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-trusted-devices",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc725659(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc731951(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-deployment-guide",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj717241(v=ws.11)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-design-guide",
|
||||||
|
"redirect_url": "/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc732024(v=ws.10)",
|
||||||
|
"redirect_document_id": false
|
||||||
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,46 +1,6 @@
|
|||||||
items:
|
items:
|
||||||
- name: Overview
|
- name: Overview
|
||||||
href: windows-firewall-with-advanced-security.md
|
href: windows-firewall-with-advanced-security.md
|
||||||
- name: Plan deployment
|
|
||||||
items:
|
|
||||||
- name: Design guide
|
|
||||||
href: windows-firewall-with-advanced-security-design-guide.md
|
|
||||||
- name: Design process
|
|
||||||
href: understanding-the-windows-firewall-with-advanced-security-design-process.md
|
|
||||||
- name: Implementation goals
|
|
||||||
items:
|
|
||||||
- name: Identify implementation goals
|
|
||||||
href: identifying-your-windows-firewall-with-advanced-security-deployment-goals.md
|
|
||||||
- name: Protect devices from unwanted network traffic
|
|
||||||
href: protect-devices-from-unwanted-network-traffic.md
|
|
||||||
- name: Restrict access to only trusted devices
|
|
||||||
href: restrict-access-to-only-trusted-devices.md
|
|
||||||
- name: Require encryption
|
|
||||||
href: require-encryption-when-accessing-sensitive-network-resources.md
|
|
||||||
- name: Restrict access
|
|
||||||
href: restrict-access-to-only-specified-users-or-devices.md
|
|
||||||
- name: Deployment guide
|
|
||||||
items:
|
|
||||||
- name: Deployment overview
|
|
||||||
href: windows-firewall-with-advanced-security-deployment-guide.md
|
|
||||||
- name: Implement your plan
|
|
||||||
href: implementing-your-windows-firewall-with-advanced-security-design-plan.md
|
|
||||||
- name: Basic firewall deployment
|
|
||||||
items:
|
|
||||||
- name: "Checklist: Implement a basic firewall policy design"
|
|
||||||
href: checklist-implementing-a-basic-firewall-policy-design.md
|
|
||||||
- name: Domain isolation deployment
|
|
||||||
items:
|
|
||||||
- name: "Checklist: Implement a Domain Isolation Policy Design"
|
|
||||||
href: checklist-implementing-a-domain-isolation-policy-design.md
|
|
||||||
- name: Server isolation deployment
|
|
||||||
items:
|
|
||||||
- name: "Checklist: Implement a Standalone Server Isolation Policy Design"
|
|
||||||
href: checklist-implementing-a-standalone-server-isolation-policy-design.md
|
|
||||||
- name: Certificate-based authentication
|
|
||||||
items:
|
|
||||||
- name: "Checklist: Implement a Certificate-based Isolation Policy Design"
|
|
||||||
href: checklist-implementing-a-certificate-based-isolation-policy-design.md
|
|
||||||
- name: Best practices
|
- name: Best practices
|
||||||
items:
|
items:
|
||||||
- name: Configure the firewall
|
- name: Configure the firewall
|
||||||
@ -131,30 +91,6 @@ items:
|
|||||||
href: turn-on-windows-firewall-and-configure-default-behavior.md
|
href: turn-on-windows-firewall-and-configure-default-behavior.md
|
||||||
- name: Verify Network Traffic
|
- name: Verify Network Traffic
|
||||||
href: verify-that-network-traffic-is-authenticated.md
|
href: verify-that-network-traffic-is-authenticated.md
|
||||||
- name: References
|
|
||||||
items:
|
|
||||||
- name: "Checklist: Create Group Policy objects"
|
|
||||||
href: checklist-creating-group-policy-objects.md
|
|
||||||
- name: "Checklist: Create inbound firewall rules"
|
|
||||||
href: checklist-creating-inbound-firewall-rules.md
|
|
||||||
- name: "Checklist: Create outbound firewall rules"
|
|
||||||
href: checklist-creating-outbound-firewall-rules.md
|
|
||||||
- name: "Checklist: Configure basic firewall settings"
|
|
||||||
href: checklist-configuring-basic-firewall-settings.md
|
|
||||||
- name: "Checklist: Configure rules for the isolated domain"
|
|
||||||
href: checklist-configuring-rules-for-the-isolated-domain.md
|
|
||||||
- name: "Checklist: Configure rules for the boundary zone"
|
|
||||||
href: checklist-configuring-rules-for-the-boundary-zone.md
|
|
||||||
- name: "Checklist: Configure rules for the encryption zone"
|
|
||||||
href: checklist-configuring-rules-for-the-encryption-zone.md
|
|
||||||
- name: "Checklist: Configure rules for an isolated server zone"
|
|
||||||
href: checklist-configuring-rules-for-an-isolated-server-zone.md
|
|
||||||
- name: "Checklist: Configure rules for servers in a standalone isolated server zone"
|
|
||||||
href: checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md
|
|
||||||
- name: "Checklist: Create rules for clients of a standalone isolated server zone"
|
|
||||||
href: checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md
|
|
||||||
- name: "Appendix A: Sample GPO template files for settings used in this guide"
|
|
||||||
href: appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md
|
|
||||||
- name: Troubleshooting
|
- name: Troubleshooting
|
||||||
items:
|
items:
|
||||||
- name: Troubleshoot UWP app connectivity issues in Windows Firewall
|
- name: Troubleshoot UWP app connectivity issues in Windows Firewall
|
||||||
|
@ -1,87 +0,0 @@
|
|||||||
---
|
|
||||||
title: Appendix A Sample GPO Template Files for Settings Used in this Guide
|
|
||||||
description: Use sample template files import an XML file containing customized registry preferences into a Group Policy Object (GPO).
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Appendix A: sample GPO template files for settings used in this guide
|
|
||||||
|
|
||||||
You can import an XML file containing customized registry preferences into a Group Policy Object (GPO) by using the Preferences feature of the Group Policy Management Console (GPMC).
|
|
||||||
|
|
||||||
To manually create the file, build the settings under **Computer Configuration** > **Preferences** > **Windows Settings** > **Registry**. After you create the settings, drag the container to the desktop. An .xml file is created there.
|
|
||||||
|
|
||||||
To import an .xml file to GPMC, drag it and drop it on the **Computer Configuration** > **Preferences** > **Windows Settings** > **Registry** node. If you copy the following sample XML code to a file, and then drag and drop it on the **Registry** node, it creates a **Server and Domain Isolation** collection with the six registry keys discussed in this guide.
|
|
||||||
|
|
||||||
The following sample file uses item-level targeting to ensure that the registry keys are applied only on the versions of Windows to which they apply.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> The file shown here is for sample use only. It should be customized to meet the requirements of your organization's deployment. To customize this file, import it into a test GPO, modify the settings, and then drag the Server and Domain Isolation Settings node to your desktop. The new file will contain all of your customization.
|
|
||||||
|
|
||||||
```xml
|
|
||||||
<?xml version="1.0" encoding="utf-8"?>
|
|
||||||
|
|
||||||
<Collection clsid="{53B533F5-224C-47e3-B01B-CA3B3F3FF4BF}" name="Server and Domain Isolation Settings">
|
|
||||||
|
|
||||||
<Registry
|
|
||||||
clsid="{9CD4B2F4-923D-47f5-A062-E897DD1DAD50}"
|
|
||||||
name="Enable PMTU Discovery"
|
|
||||||
status="EnablePMTUDiscovery"
|
|
||||||
image="12"
|
|
||||||
changed="2008-05-30 20:37:37"
|
|
||||||
uid="{52C38FD7-A081-404C-A8EA-B24A9614D0B5}"
|
|
||||||
desc="<b>Enable PMTU Discovery</b><p>
|
|
||||||
This setting configures whether computers can use PMTU
|
|
||||||
discovery on the network.<p>
|
|
||||||
<b>1</b> -- Enable<br>
|
|
||||||
<b>0</b> -- Disable"
|
|
||||||
bypassErrors="1">
|
|
||||||
<Properties
|
|
||||||
action="U"
|
|
||||||
displayDecimal="1"
|
|
||||||
default="0"
|
|
||||||
hive="HKEY_LOCAL_MACHINE"
|
|
||||||
key="System\CurrentControlSet\Services\TCPIP\Parameters"
|
|
||||||
name="EnablePMTUDiscovery" type="REG_DWORD" value="00000001"/>
|
|
||||||
</Registry>
|
|
||||||
|
|
||||||
<Registry
|
|
||||||
clsid="{9CD4B2F4-923D-47f5-A062-E897DD1DAD50}"
|
|
||||||
name="IPsec Default Exemptions (Vista and W2K8)"
|
|
||||||
status="NoDefaultExempt"
|
|
||||||
image="12"
|
|
||||||
changed="2008-05-30 20:33:32"
|
|
||||||
uid="{AE5C505D-283E-4060-9A55-70659DFD56B6}"
|
|
||||||
desc="<b>IPsec Default Exemptions for Windows Server 2008
|
|
||||||
and later</b><p>
|
|
||||||
This setting determines which network traffic type is exempt
|
|
||||||
from any IPsec authentication requirements.<p>
|
|
||||||
<b>0</b>: Exempts multicast, broadcast, RSVP, Kerberos, ISAKMP<br>
|
|
||||||
<b>1</b>: Exempts multicast, broadcast, ISAKMP<br>
|
|
||||||
<b>2</b>: Exempts RSVP, Kerberos, ISAKMP<br>
|
|
||||||
<b>3</b>: Exempts ISAKMP only"
|
|
||||||
bypassErrors="1">
|
|
||||||
<Properties
|
|
||||||
action="U"
|
|
||||||
displayDecimal="1"
|
|
||||||
default="0"
|
|
||||||
hive="HKEY_LOCAL_MACHINE"
|
|
||||||
key="SYSTEM\CurrentControlSet\Services\PolicyAgent"
|
|
||||||
name="NoDefaultExempt"
|
|
||||||
type="REG_DWORD"
|
|
||||||
value="00000003"/>
|
|
||||||
<Filters>
|
|
||||||
<FilterOs
|
|
||||||
bool="AND" not="0"
|
|
||||||
class="NT" version="VISTA"
|
|
||||||
type="NE" edition="NE" sp="NE"/>
|
|
||||||
<FilterOs
|
|
||||||
bool="OR" not="0"
|
|
||||||
class="NT" version="2K8"
|
|
||||||
type="NE" edition="NE" sp="NE"/>
|
|
||||||
</Filters>
|
|
||||||
</Registry>
|
|
||||||
|
|
||||||
</Collection>
|
|
||||||
```
|
|
@ -1,17 +0,0 @@
|
|||||||
---
|
|
||||||
title: Checklist Configuring Basic Firewall Settings
|
|
||||||
description: Configure Windows Firewall to set inbound and outbound behavior, display notifications, record log files and more of the necessary function for Firewall.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Checklist: configure basic firewall settings
|
|
||||||
|
|
||||||
This checklist includes tasks for configuring a GPO with firewall defaults and settings that are separate from the rules:
|
|
||||||
|
|
||||||
| Task | Reference |
|
|
||||||
| - | - |
|
|
||||||
| Turn the firewall on and set the default inbound and outbound behavior.| [Turn on Windows Defender Firewall with Advanced Security and Configure Default Behavior](turn-on-windows-firewall-and-configure-default-behavior.md)|
|
|
||||||
| Configure the firewall to not display notifications to the user when a program is blocked, and to ignore locally defined firewall and connection security rules. | [Configure Windows Defender Firewall with Advanced Security to Suppress Notifications When a Program Is Blocked](configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md) |
|
|
||||||
| Configure the firewall to record a log file. | [Configure the Windows Defender Firewall with Advanced Security Log](configure-the-windows-firewall-log.md)|
|
|
@ -1,32 +0,0 @@
|
|||||||
---
|
|
||||||
title: Checklist Configuring Rules for an Isolated Server Zone
|
|
||||||
description: Use these tasks to configure connection security rules and IPsec settings in GPOs for servers in an isolated server zone that are part of an isolated domain.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Checklist: configure rules for an isolated server zone
|
|
||||||
|
|
||||||
The following checklists include tasks for configuring connection security rules and IPsec settings in your GPOs for servers in an isolated server zone that are part of an isolated domain. For information about creating a standalone isolated server zone that isn't part of an isolated domain, see [Checklist: Implementing a Standalone Server Isolation Policy Design](checklist-implementing-a-standalone-server-isolation-policy-design.md).
|
|
||||||
|
|
||||||
In addition to requiring authentication and optionally encryption, servers in an isolated server zone can be accessed only by users or devices who are authenticated members of a network access group (NAG). If you include user accounts in the NAG, then the restrictions can still apply; they're enforced at the application layer, rather than the IP layer.
|
|
||||||
|
|
||||||
The GPOs for an isolated server or group of servers are similar to those GPOs for the isolated domain itself or the encryption zone, if you require encryption to your isolated servers. This checklist refers you to procedures for creating rules and restrictions that allow only members of the NAG to connect to the server.
|
|
||||||
|
|
||||||
| Task | Reference |
|
|
||||||
| - | - |
|
|
||||||
| Create a GPO for the devices that need to have access restricted to the same set of client devices. If there are multiple servers and they run different versions of the Windows operating system, then start by creating the GPO for one version of Windows. After you've finished the tasks in this checklist and configured the GPO for that version of Windows, you can create a copy of it.<br/>Copy the GPO from the isolated domain or from the encryption zone to serve as a starting point. Where your copy already contains elements listed in the following checklist, review the relevant procedures and compare them to your copied GPO's element to make sure it's constructed in a way that meets the needs of the server isolation zone. |[Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md)|
|
|
||||||
| Configure the security group filters and WMI filters on the GPO so that only members of the isolated server zone's membership group that are running the specified version of Windows can read and apply it.| [Modify GPO Filters to Apply to a Different Zone or Version of Windows](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md) |
|
|
||||||
| Configure IPsec to exempt all ICMP network traffic from IPsec protection. | [Exempt ICMP from Authentication](exempt-icmp-from-authentication.md)|
|
|
||||||
| Configure the key exchange (main mode) security methods and algorithms to be used. | [Configure Key Exchange (Main Mode) Settings](configure-key-exchange-main-mode-settings.md)|
|
|
||||||
| Configure the data protection (quick mode) algorithm combinations to be used. If you require encryption for the isolated server zone, then make sure that you choose only algorithm combinations that include encryption. | [Configure Data Protection (Quick Mode) Settings](configure-data-protection-quick-mode-settings.md)|
|
|
||||||
| Configure the authentication methods to be used. | [Configure Authentication Methods](configure-authentication-methods.md)|
|
|
||||||
| Create a rule that exempts all network traffic to and from devices on the exemption list from IPsec. | [Create an Authentication Exemption List Rule](create-an-authentication-exemption-list-rule.md)|
|
|
||||||
| Create a rule that requests authentication for all network traffic.<br/>**Important:** As in an isolated domain, don't set the rules to require authentication for inbound traffic until you have completed testing. That way, if the rules don't work as expected, communications aren't affected by a failure to authenticate.| [Create an Authentication Request Rule](create-an-authentication-request-rule.md)|
|
|
||||||
| Create the NAG to contain the device or user accounts that are allowed to access the servers in the isolated server zone. | [Create a Group Account in Active Directory](create-a-group-account-in-active-directory.md)|
|
|
||||||
| Create a firewall rule that permits inbound network traffic only if authenticated as a member of the NAG. | [Restrict Server Access to Members of a Group Only](restrict-server-access-to-members-of-a-group-only.md)|
|
|
||||||
| Link the GPO to the domain level of the Active Directory organizational unit hierarchy. | [Link the GPO to the Domain](link-the-gpo-to-the-domain.md)|
|
|
||||||
| Add your test server to the membership group for the isolated server zone. Be sure to add at least one server for each operating system supported by a GPO in the group.| [Add Test Devices to the Membership Group for a Zone](add-test-devices-to-the-membership-group-for-a-zone.md) |
|
|
||||||
|
|
||||||
Don't change the rules for any of your zones to require authentication until all of the zones have been set up and are operating correctly.
|
|
@ -1,31 +0,0 @@
|
|||||||
---
|
|
||||||
title: Checklist Configuring Rules for Servers in a Standalone Isolated Server Zone
|
|
||||||
description: Checklist Configuring Rules for Servers in a Standalone Isolated Server Zone
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Checklist: configure rules for servers in a standalone isolated server zone
|
|
||||||
|
|
||||||
This checklist includes tasks for configuring connection security rules and IPsec settings in your GPOs for servers in a standalone isolated server zone that isn't part of an isolated domain. In addition to requiring authentication and optionally encryption, servers in a server isolation zone are accessible only by users or devices that are authenticated as members of a network access group (NAG). The GPOs described here apply only to the isolated servers, not to the client devices that connect to them. For the GPOs for the client devices, see [Checklist: Creating Rules for Clients of a Standalone Isolated Server Zone](checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md).
|
|
||||||
|
|
||||||
The GPOs for isolated servers are similar to those GPOs for an isolated domain. This checklist refers you to those procedures for the creation of some of the rules. The other procedures in this checklist are for creating the restrictions that allow only members of the server access group to connect to the server.
|
|
||||||
|
|
||||||
| Task | Reference |
|
|
||||||
| - | - |
|
|
||||||
| Create a GPO for the devices that need to have access restricted to the same set of client devices. If there are multiple servers running different versions of the Windows operating system, start by creating the GPO for one version of Windows. After you've finished the tasks in this checklist and configured the GPO for that version of Windows, you can create a copy of it. | [Checklist: Creating Group Policy Objects](checklist-creating-group-policy-objects.md) <br/>[Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md)|
|
|
||||||
| If you're working on a copy of a GPO, modify the group memberships and WMI filters so that they're correct for the devices for which this GPO is intended. | [Modify GPO Filters to Apply to a Different Zone or Version of Windows](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md) |
|
|
||||||
| Configure IPsec to exempt all ICMP network traffic from IPsec protection. | [Exempt ICMP from Authentication](exempt-icmp-from-authentication.md)|
|
|
||||||
| Create a rule that exempts all network traffic to and from devices on the exemption list from IPsec. | [Create an Authentication Exemption List Rule](create-an-authentication-exemption-list-rule.md) |
|
|
||||||
| Configure the key exchange (main mode) security methods and algorithms to be used. | [Configure Key Exchange (Main Mode) Settings](configure-key-exchange-main-mode-settings.md)|
|
|
||||||
| Configure the data protection (quick mode) algorithm combinations to be used. | [Configure Data Protection (Quick Mode) Settings](configure-data-protection-quick-mode-settings.md)|
|
|
||||||
| Configure the authentication methods to be used. This procedure sets the default settings for the device. If you want to set authentication on a per-rule basis, this procedure is optional.| [Configure Authentication Methods](configure-authentication-methods.md) |
|
|
||||||
| Create a rule that requests authentication for all inbound network traffic. <br/><br/>**Important:** As in an isolated domain, don't set the rules to require authentication until your testing is complete. That way, if the rules don't work as expected, communications aren't affected by a failure to authenticate.| [Create an Authentication Request Rule](create-an-authentication-request-rule.md)|
|
|
||||||
| If your design requires encryption in addition to authentication for access to the isolated servers, then modify the rule to require it. | [Configure the Rules to Require Encryption](configure-the-rules-to-require-encryption.md)|
|
|
||||||
| Create the NAG to contain the device or user accounts that are allowed to access the isolated servers. If you have multiple groups of isolated servers that are accessed by different client devices, then create a NAG for each set of servers.| [Create a Group Account in Active Directory](create-a-group-account-in-active-directory.md) |
|
|
||||||
| Create a firewall rule that allows inbound network traffic only if it's authenticated from a user or device that is a member of the zone's NAG.| [Restrict Server Access to Members of a Group Only](restrict-server-access-to-members-of-a-group-only.md)|
|
|
||||||
| Link the GPO to the domain level of the Active Directory organizational unit hierarchy. | [Link the GPO to the Domain](link-the-gpo-to-the-domain.md)|
|
|
||||||
| Add your test server to the membership group for the isolated server zone. Be sure to add at least one for each operating system supported by a different GPO in the group.| [Add Test Devices to the Membership Group for a Zone](add-test-devices-to-the-membership-group-for-a-zone.md)|
|
|
||||||
|
|
||||||
Don't change the rules for any of your zones to require authentication until all zones have been set up and thoroughly tested.
|
|
@ -1,23 +0,0 @@
|
|||||||
---
|
|
||||||
title: Checklist Configuring Rules for the Boundary Zone
|
|
||||||
description: Use these tasks to configure connection security rules and IPsec settings in your GPOs to implement the boundary zone in an isolated domain.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Checklist: configure rules for the boundary zone
|
|
||||||
|
|
||||||
The following checklists include tasks for configuring connection security rules and IPsec settings in your GPOs to implement the boundary zone in an isolated domain.
|
|
||||||
|
|
||||||
Rules for the boundary zone are typically the same as those rules for the isolated domain, with the exception that the final rule is left to only request, not require, authentication.
|
|
||||||
|
|
||||||
This checklist assumes that you've already created the GPO for the isolated domain as described in [Checklist: Implementing a Domain Isolation Policy Design](checklist-implementing-a-domain-isolation-policy-design.md). After you create a copy for the boundary zone, make sure that you don't change the rule from request authentication to require authentication when you create the other GPOs.
|
|
||||||
|
|
||||||
| Task | Reference |
|
|
||||||
| - | - |
|
|
||||||
| Make a copy of the domain isolation GPO for this version of Windows to serve as a starting point for the GPO for the boundary zone. Unlike the GPO for the main isolated domain zone, this copy isn't changed after deployment to require authentication.| [Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md) |
|
|
||||||
| If you're working on a copy of a GPO, modify the group memberships and WMI filters so that they're correct for the boundary zone and version of Windows for which this GPO is intended.| [Modify GPO Filters to Apply to a Different Zone or Version of Windows](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md) |
|
|
||||||
| Link the GPO to the domain level of the Active Directory organizational unit hierarchy.| [Link the GPO to the Domain](link-the-gpo-to-the-domain.md)|
|
|
||||||
| Add your test computers to the membership group for the boundary zone. Be sure to add at least one for each operating system supported by a different GPO in the group.| [Add Test Computers to the Membership Group for a Zone](add-test-devices-to-the-membership-group-for-a-zone.md)|
|
|
||||||
| Verify that the connection security configuration is protecting network traffic with authentication when it can, and that unauthenticated traffic is accepted. | [Verify That Network Traffic Is Authenticated](verify-that-network-traffic-is-authenticated.md)|
|
|
@ -1,24 +0,0 @@
|
|||||||
---
|
|
||||||
title: Checklist Configuring Rules for the Encryption Zone
|
|
||||||
description: Use these tasks to configure connection security rules and IPsec settings in your GPOs to implement the encryption zone in an isolated domain.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Checklist: configure rules for the encryption zone
|
|
||||||
|
|
||||||
This checklist includes tasks for configuring connection security rules and IPsec settings in your GPOs to implement the encryption zone in an isolated domain.
|
|
||||||
|
|
||||||
Rules for the encryption zone are typically the same as those rules for the isolated domain, with the exception that the main rule requires encryption in addition to authentication.
|
|
||||||
|
|
||||||
This checklist assumes that you've already created the GPO for the isolated domain as described in [Checklist: Implementing a Domain Isolation Policy Design](checklist-implementing-a-domain-isolation-policy-design.md). You can then copy those GPOs for use with the encryption zone. After you create the copies, modify the main rule to require encryption in addition to the authentication required by the rest of the isolated domain.
|
|
||||||
|
|
||||||
| Task | Reference |
|
|
||||||
| - | - |
|
|
||||||
| Make a copy of the domain isolation GPOs to serve as a starting point for the GPOs for the encryption zone.| [Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md)|
|
|
||||||
| Modify the group memberships and WMI filters so that they're correct for the encryption zone and the version of Windows for which this GPO is intended. | [Modify GPO Filters to Apply to a Different Zone or Version of Windows](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md) |
|
|
||||||
| Add the encryption requirements for the zone. | [Configure the Rules to Require Encryption](configure-the-rules-to-require-encryption.md)|
|
|
||||||
| Link the GPO to the domain level of the Active Directory organizational unit hierarchy. | [Link the GPO to the Domain](link-the-gpo-to-the-domain.md)|
|
|
||||||
| Add your test computers to the membership group for the encryption zone. Be sure to add at least one for each operating system supported by a different GPO in the group.| [Add Test Computers to the Membership Group for a Zone](add-test-devices-to-the-membership-group-for-a-zone.md)|
|
|
||||||
| Verify that the connection security rules are protecting network traffic.| [Verify That Network Traffic Is Authenticated](verify-that-network-traffic-is-authenticated.md)|
|
|
@ -1,27 +0,0 @@
|
|||||||
---
|
|
||||||
title: Checklist Configuring Rules for the Isolated Domain
|
|
||||||
description: Use these tasks to configure connection security rules and IPsec settings in your GPOs to implement the main zone in the isolated domain.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Checklist: configure rules for the isolated domain
|
|
||||||
|
|
||||||
The following checklists include tasks for configuring connection security rules and IPsec settings in your GPOs to implement the main zone in the isolated domain.
|
|
||||||
|
|
||||||
| Task | Reference |
|
|
||||||
| - | - |
|
|
||||||
| Create a GPO for the computers in the isolated domain running one of the operating systems. After you've finished the tasks in this checklist and configured the GPO for that version of Windows, you can create a copy of it.| [Checklist: Creating Group Policy Objects](checklist-creating-group-policy-objects.md)<br/>[Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md)|
|
|
||||||
| If you're working on a GPO that was copied from another GPO, modify the group memberships and WMI filters so that they're correct for the isolated domain zone and the version of Windows for which this GPO is intended. | [Modify GPO Filters to Apply to a Different Zone or Version of Windows](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md) |
|
|
||||||
| Configure IPsec to exempt all ICMP network traffic from IPsec protection. | [Exempt ICMP from Authentication](exempt-icmp-from-authentication.md)|
|
|
||||||
| Create a rule that exempts all network traffic to and from computers on the exemption list from IPsec. | [Create an Authentication Exemption List Rule](create-an-authentication-exemption-list-rule.md)|
|
|
||||||
| Configure the key exchange (main mode) security methods and algorithms to be used. | [Configure Key Exchange (Main Mode) Settings](configure-key-exchange-main-mode-settings.md)|
|
|
||||||
| Configure the data protection (quick mode) algorithm combinations to be used. | [Configure Data Protection (Quick Mode) Settings](configure-data-protection-quick-mode-settings.md)|
|
|
||||||
| Configure the authentication methods to be used. | [Configure Authentication Methods](configure-authentication-methods.md)|
|
|
||||||
| Create the rule that requests authentication for all inbound network traffic. | [Create an Authentication Request Rule](create-an-authentication-request-rule.md)|
|
|
||||||
| Link the GPO to the domain level of the AD DS organizational unit hierarchy. | [Link the GPO to the Domain](link-the-gpo-to-the-domain.md)|
|
|
||||||
| Add your test computers to the membership group for the isolated domain. Be sure to add at least one for each operating system supported by a different GPO in the group.| [Add Test Devices to the Membership Group for a Zone](add-test-devices-to-the-membership-group-for-a-zone.md)|
|
|
||||||
| Verify that the connection security rules are protecting network traffic to and from the test computers. | [Verify That Network Traffic Is Authenticated](verify-that-network-traffic-is-authenticated.md)|
|
|
||||||
|
|
||||||
Don't change the rules for any of your zones to require authentication until all of the zones have been set up and are operating correctly.
|
|
@ -1,34 +0,0 @@
|
|||||||
---
|
|
||||||
title: Checklist Creating Group Policy Objects
|
|
||||||
description: Learn to deploy firewall settings, IPsec settings, firewall rules, or connection security rules, by using Group Policy in AD DS.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Checklist: Create group policy objects (GPOs)
|
|
||||||
|
|
||||||
To deploy firewall or IPsec settings or firewall or connection security rules, we recommend that you use Group Policy in AD DS. This section describes a tested, efficient method that requires some up-front work, but serves an administrator well in the end by making GPO assignments as easy as dropping a device into a membership group.
|
|
||||||
|
|
||||||
The checklists for firewall, domain isolation, and server isolation include a link to this checklist.
|
|
||||||
|
|
||||||
## About membership groups
|
|
||||||
|
|
||||||
For most GPO deployment tasks, you must determine which devices must receive and apply which GPOs. Because different versions of Windows can support different settings and rules to achieve similar behavior, you might need multiple GPOs: one for each operating system that has settings different from the others to achieve the same result. Therefore, if your network included those older operating systems you would need to create a GPO for each set of operating systems that can share common settings. To deploy typical domain isolation settings and rules, you might have five different GPOs for the versions of Windows discussed in this guide. By following the procedures in this guide, you only need one membership group to manage all five GPOs. The membership group is identified in the security group filter for all five GPOs. To apply the settings to a device, you make that device's account a member of the membership group. WMI filters are used to ensure that the correct GPO is applied.
|
|
||||||
|
|
||||||
## About exclusion groups
|
|
||||||
|
|
||||||
A Windows Defender Firewall with Advanced Security design must often take into account domain-joined devices on the network that can't or must not apply the rules and settings in the GPOs. Because these devices are typically fewer in number than the devices that must apply the GPO, it's easier to use the Domain Members group in the GPO membership group, and then place these exception devices into an exclusion group that is denied Apply Group Policy permissions on the GPO. Because deny permissions take precedence over allow permissions, a device that is a member of both the membership group and the exception group is prevented from applying the GPO. Devices typically found in a GPO exclusion group for domain isolation include the domain controllers, DHCP servers, and DNS servers.
|
|
||||||
|
|
||||||
You can also use a membership group for one zone as an exclusion group for another zone. For example, devices in the boundary and encryption zones are technically in the main domain isolation zone, but must apply only the GPO for their assigned role. To use the group as an exclusion group, the GPOs for the main isolation zone deny Apply Group Policy permissions to members of the boundary and encryption zones.
|
|
||||||
|
|
||||||
| Task | Reference |
|
|
||||||
| - | - |
|
|
||||||
| Review important concepts and examples for deploying GPOs in a way that best meets the needs of your organization.| [Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals](identifying-your-windows-firewall-with-advanced-security-deployment-goals.md)<br/>[Planning Group Policy Deployment for Your Isolation Zones](planning-group-policy-deployment-for-your-isolation-zones.md)|
|
|
||||||
| Create the membership group in AD DS that will be used to contain device accounts that must receive the GPO.| [Create a Group Account in Active Directory](create-a-group-account-in-active-directory.md)|
|
|
||||||
| Create a GPO for each version of Windows that has different implementation requirements.| [Create a Group Policy Object](create-a-group-policy-object.md) |
|
|
||||||
| Create security group filters to limit the GPO to only devices that are members of the membership group and to exclude devices that are members of the exclusion group.|[Assign Security Group Filters to the GPO](assign-security-group-filters-to-the-gpo.md) |
|
|
||||||
| Create WMI filters to limit each GPO to only the devices that match the criteria in the filter.| [Create WMI Filters for the GPO](create-wmi-filters-for-the-gpo.md) |
|
|
||||||
| If you're working on a GPO that was copied from another, modify the group memberships and WMI filters so that they're correct for the new zone or version of Windows for which this GPO is intended.|[Modify GPO Filters to Apply to a Different Zone or Version of Windows](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md) |
|
|
||||||
| Link the GPO to the domain level of the Active Directory organizational unit hierarchy.| [Link the GPO to the Domain](link-the-gpo-to-the-domain.md) |
|
|
||||||
| Before adding any rules or configuring the GPO, add a few test devices to the membership group, and make sure that the correct GPO is received and applied to each member of the group.| [Add Test Devices to the Membership Group for a Zone](add-test-devices-to-the-membership-group-for-a-zone.md) |
|
|
@ -1,19 +0,0 @@
|
|||||||
---
|
|
||||||
title: Checklist Creating Inbound Firewall Rules
|
|
||||||
description: Use these tasks for creating inbound firewall rules in your GPOs for Windows Defender Firewall with Advanced Security.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Checklist: create inbound firewall rules
|
|
||||||
|
|
||||||
This checklist includes tasks for creating firewall rules in your GPOs.
|
|
||||||
|
|
||||||
| Task | Reference |
|
|
||||||
| - | - |
|
|
||||||
| Create a rule that allows a program to listen for and accept inbound network traffic on any ports it requires. | [Create an Inbound Program or Service Rule](create-an-inbound-program-or-service-rule.md)|
|
|
||||||
| Create a rule that allows inbound network traffic on a specified port number. | [Create an Inbound Port Rule](create-an-inbound-port-rule.md)|
|
|
||||||
| Create a rule that allows inbound ICMP network traffic. | [Create an Inbound ICMP Rule](create-an-inbound-icmp-rule.md)|
|
|
||||||
| Create rules that allow inbound RPC network traffic. | [Create Inbound Rules to Support RPC](create-inbound-rules-to-support-rpc.md)|
|
|
||||||
| Enable a predefined rule or a group of predefined rules. Some predefined rules for basic network services are included as part of the installation of Windows; others can be created when you install a new application or network service. | [Enable Predefined Inbound Rules](enable-predefined-inbound-rules.md)|
|
|
@ -1,20 +0,0 @@
|
|||||||
---
|
|
||||||
title: Checklist Creating Outbound Firewall Rules
|
|
||||||
description: Use these tasks for creating outbound firewall rules in your GPOs for Windows Defender Firewall with Advanced Security.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Checklist: create outbound firewall rules
|
|
||||||
|
|
||||||
This checklist includes tasks for creating outbound firewall rules in your GPOs.
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> By default, outbound filtering is disabled. Because all outbound network traffic is permitted, outbound rules are typically used to block traffic that is not wanted on the network. However, it is a best practice for an administrator to create outbound allow rules for those applications that are approved for use on the organization's network. If you do this, then you have the option to set the default outbound behavior to block, preventing any network traffic that is not specifically authorized by the rules you create.
|
|
||||||
|
|
||||||
| Task | Reference |
|
|
||||||
| - | - |
|
|
||||||
| Create a rule that allows a program to send any outbound network traffic on any port it requires. | [Create an Outbound Program or Service Rule](create-an-outbound-program-or-service-rule.md)|
|
|
||||||
| Create a rule that allows outbound network traffic on a specified port number. | [Create an Outbound Port Rule](create-an-outbound-port-rule.md)|
|
|
||||||
| Enable a predefined rule or a group of predefined rules. Some predefined rules for basic network services are included as part of the installation of Windows; others can be created when you install a new application or network service. | [Enable Predefined Outbound Rules](enable-predefined-outbound-rules.md)|
|
|
@ -1,24 +0,0 @@
|
|||||||
---
|
|
||||||
title: Create Rules for Standalone Isolated Server Zone Clients
|
|
||||||
description: Checklist for when creating rules for clients of a Standalone Isolated Server Zone
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Checklist: Create rules for clients of a standalone isolated server zone
|
|
||||||
|
|
||||||
This checklist includes tasks for configuring connection security rules and IPsec settings in the GPOs for client devices that must connect to servers in an isolated server zone.
|
|
||||||
|
|
||||||
| Task | Reference |
|
|
||||||
| - | - |
|
|
||||||
| Create a GPO for the client devices that must connect to servers in the isolated server zone, and that are running one of the versions of Windows. After you've finished the tasks in this checklist, you can make a copy of it.| [Checklist: Creating Group Policy Objects](checklist-creating-group-policy-objects.md) <br/>[Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md)|
|
|
||||||
| To determine which devices receive the GPO, assign the NAG for the isolated servers to the security group filter for the GPO. Make sure that each GPO has the WMI filter for the correct version of Windows.| [Modify GPO Filters to Apply to a Different Zone or Version of Windows](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md) |
|
|
||||||
| Configure IPsec to exempt all ICMP network traffic from IPsec protection. | [Exempt ICMP from Authentication](exempt-icmp-from-authentication.md)|
|
|
||||||
| Create a rule that exempts all network traffic to and from devices on the exemption list from IPsec. | [Create an Authentication Exemption List Rule](create-an-authentication-exemption-list-rule.md)|
|
|
||||||
| Configure the key exchange (main mode) security methods and algorithms to be used. | [Configure Key Exchange (Main Mode) Settings](configure-key-exchange-main-mode-settings.md)|
|
|
||||||
| Configure the data protection (quick mode) algorithm combinations to be used. | [Configure Data Protection (Quick Mode) Settings](configure-data-protection-quick-mode-settings.md)|
|
|
||||||
| Configure the authentication methods to be used. | [Configure Authentication Methods](configure-authentication-methods.md)|
|
|
||||||
| Create a rule that requests authentication for network traffic. Because fallback-to-clear behavior has no delay when communicating with devices that can't use IPsec, you can use the same any-to-any rule used in an isolated domain.| [Create an Authentication Request Rule](create-an-authentication-request-rule.md)|
|
|
||||||
| Link the GPO to the domain level of the Active Directory organizational unit hierarchy. | [Link the GPO to the Domain](link-the-gpo-to-the-domain.md)|
|
|
||||||
| Add your test devices to the NAG for the isolated server zone. Be sure to add at least one for each operating system supported by a different GPO in the group.| [Add Test Devices to the Membership Group for a Zone](add-test-devices-to-the-membership-group-for-a-zone.md)|
|
|
@ -1,28 +0,0 @@
|
|||||||
---
|
|
||||||
title: Checklist Implementing a Basic Firewall Policy Design
|
|
||||||
description: Follow this parent checklist for implementing a basic firewall policy design to ensure successful implementation.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Checklist: implement a basic firewall policy design
|
|
||||||
|
|
||||||
This parent checklist includes cross-reference links to important concepts about the basic firewall policy design. It also contains links to subordinate checklists that will help you complete the tasks that are required to implement this design.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Complete the tasks in this checklist in order. When a reference link takes you to a procedure, return to this topic after you complete the steps in that procedure so that you can proceed with the remaining tasks in this checklist.
|
|
||||||
|
|
||||||
The procedures in this section use the Group Policy MMC snap-in interfaces to configure the GPOs, but you can also use Windows PowerShell. For more info, see [Windows Defender Firewall with Advanced Security Administration with Windows PowerShell](windows-firewall-with-advanced-security-administration-with-windows-powershell.md).
|
|
||||||
|
|
||||||
| Task | Reference |
|
|
||||||
| - | - |
|
|
||||||
| Review important concepts and examples for the basic firewall policy design to determine if this design meets the needs of your organization. | [Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals](identifying-your-windows-firewall-with-advanced-security-deployment-goals.md)<br/>[Basic Firewall Policy Design](basic-firewall-policy-design.md)<br/>[Firewall Policy Design Example](firewall-policy-design-example.md)<br/>[Planning Settings for a Basic Firewall Policy](planning-settings-for-a-basic-firewall-policy.md)|
|
|
||||||
| Create the membership group and a GPO for each set of devices that require different firewall rules. Where GPOs will be similar, such as for Windows 11, Windows 10, and Windows Server 2016, create one GPO, configure it by using the tasks in this checklist, and then make a copy of the GPO for the other version of Windows. For example, create and configure the GPO for Windows 10 or Windows 11, make a copy of it for Windows Server 2016, and then follow the steps in this checklist to make the few required changes to the copy. | [Checklist: Creating Group Policy Objects](checklist-creating-group-policy-objects.md)<br/>[Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md)|
|
|
||||||
| If you are working on a GPO that was copied from another, modify the group membership and WMI filters so that they are correct for the devices for which this GPO is intended.| [Modify GPO Filters to Apply to a Different Zone or Version of Windows](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md)|
|
|
||||||
| Configure the GPO with firewall default settings appropriate for your design.| [Checklist: Configuring Basic Firewall Settings](checklist-configuring-basic-firewall-settings.md)|
|
|
||||||
| Create one or more inbound firewall rules to allow unsolicited inbound network traffic.| [Checklist: Creating Inbound Firewall Rules](checklist-creating-inbound-firewall-rules.md)|
|
|
||||||
| Create one or more outbound firewall rules to block unwanted outbound network traffic. | [Checklist: Creating Outbound Firewall Rules](checklist-creating-outbound-firewall-rules.md)|
|
|
||||||
| Link the GPO to the domain level of the Active Directory organizational unit hierarchy.| [Link the GPO to the Domain](link-the-gpo-to-the-domain.md)|
|
|
||||||
| Add test devices to the membership group, and then confirm that the devices receive the firewall rules from the GPOs as expected.| [Add Test Devices to the Membership Group for a Zone](add-test-devices-to-the-membership-group-for-a-zone.md)|
|
|
||||||
| According to the testing and roll-out schedule in your design plan, add device accounts to the membership group to deploy the completed firewall policy settings to your devices. | [Add Production Devices to the Membership Group for a Zone](add-production-devices-to-the-membership-group-for-a-zone.md)|
|
|
@ -1,22 +0,0 @@
|
|||||||
---
|
|
||||||
title: Checklist Implementing a Certificate-based Isolation Policy Design
|
|
||||||
description: Use these references to learn about using certificates as an authentication option and configure a certificate-based isolation policy design.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Checklist: implement a certificate-based isolation policy design
|
|
||||||
|
|
||||||
This parent checklist includes cross-reference links to important concepts about using certificates as an authentication option in either a domain isolation or server isolation design.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Complete the tasks in this checklist in order. When a reference link takes you to a procedure, return to this topic after you complete the steps in that procedure so that you can proceed with the remaining tasks in this checklist
|
|
||||||
|
|
||||||
| Task | Reference |
|
|
||||||
| - | - |
|
|
||||||
| Review important concepts and examples for certificate-based authentication to determine if this design meets your implementation goals and the needs of your organization.| [Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals](identifying-your-windows-firewall-with-advanced-security-deployment-goals.md)<br/>[Certificate-based Isolation Policy Design](certificate-based-isolation-policy-design.md)<br/>[Certificate-based Isolation Policy Design Example](certificate-based-isolation-policy-design-example.md)<br/>[Planning Certificate-based Authentication](planning-certificate-based-authentication.md) |
|
|
||||||
| Install the Active Directory Certificate Services (AD CS) role as an enterprise root issuing certification authority (CA). This step is required only if you haven't already deployed a CA on your network.| |
|
|
||||||
| Configure the certificate template for workstation authentication certificates.| [Configure the Workstation Authentication Certificate Template](configure-the-workstation-authentication-certificate-template.md)|
|
|
||||||
| Configure Group Policy to automatically deploy certificates based on your template to workstation devices. | [Configure Group Policy to Autoenroll and Deploy Certificates](configure-group-policy-to-autoenroll-and-deploy-certificates.md)|
|
|
||||||
| On a test device, refresh Group Policy and confirm that the certificate is installed. | [Confirm That Certificates Are Deployed Correctly](confirm-that-certificates-are-deployed-correctly.md)|
|
|
@ -1,26 +0,0 @@
|
|||||||
---
|
|
||||||
title: Checklist Implementing a Domain Isolation Policy Design
|
|
||||||
description: Use these references to learn about the domain isolation policy design and links to other checklists to complete tasks require to implement this design.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Checklist: implementing a domain isolation policy design
|
|
||||||
|
|
||||||
This parent checklist includes cross-reference links to important concepts about the domain isolation policy design. It also contains links to subordinate checklists that will help you complete the tasks that are required to implement this design.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Complete the tasks in this checklist in order. When a reference link takes you to a procedure, return to this topic after you complete the steps in that procedure so that you can proceed with the remaining tasks in this checklist.
|
|
||||||
|
|
||||||
The procedures in this section use the Group Policy MMC snap-ins to configure the GPOs, but you can also use Windows PowerShell to configure GPOs. For more info, see [Windows Defender Firewall with Advanced Security Administration with Windows PowerShell](windows-firewall-with-advanced-security-administration-with-windows-powershell.md).
|
|
||||||
|
|
||||||
| Task | Reference |
|
|
||||||
| - | - |
|
|
||||||
| Review important concepts and examples for the domain isolation policy design, determine your Windows Firewall with Advanced Security implementation goals, and customize this design to meet the needs of your organization.| [Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals](identifying-your-windows-firewall-with-advanced-security-deployment-goals.md)<br/>[Domain Isolation Policy Design](domain-isolation-policy-design.md)<br/>[Domain Isolation Policy Design Example](domain-isolation-policy-design-example.md)<br/>[Planning Domain Isolation Zones](planning-domain-isolation-zones.md) |
|
|
||||||
| Create the GPOs and connection security rules for the isolated domain.| [Checklist: Configuring Rules for the Isolated Domain](checklist-configuring-rules-for-the-isolated-domain.md)|
|
|
||||||
| Create the GPOs and connection security rules for the boundary zone.| [Checklist: Configuring Rules for the Boundary Zone](checklist-configuring-rules-for-the-boundary-zone.md)|
|
|
||||||
| Create the GPOs and connection security rules for the encryption zone.| [Checklist: Configuring Rules for the Encryption Zone](checklist-configuring-rules-for-the-encryption-zone.md)|
|
|
||||||
| Create the GPOs and connection security rules for the isolated server zone.| [Checklist: Configuring Rules for an Isolated Server Zone](checklist-configuring-rules-for-an-isolated-server-zone.md)|
|
|
||||||
| According to the testing and roll-out schedule in your design plan, add computer accounts to the membership group to deploy rules and settings to your computers.| [Add Production Devices to the Membership Group for a Zone](add-production-devices-to-the-membership-group-for-a-zone.md)|
|
|
||||||
| After you confirm that network traffic is authenticated by IPsec, you can change authentication rules for the isolated domain and encryption zone from request to require mode.| [Change Rules from Request to Require Mode](change-rules-from-request-to-require-mode.md)|
|
|
@ -1,25 +0,0 @@
|
|||||||
---
|
|
||||||
title: Checklist Implementing a Standalone Server Isolation Policy Design
|
|
||||||
description: Use these tasks to create a server isolation policy design that isn't part of an isolated domain. See references to concepts and links to other checklists.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 11/10/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Checklist: implementing a standalone server isolation policy design
|
|
||||||
|
|
||||||
This checklist contains procedures for creating a server isolation policy design that isn't part of an isolated domain. For information on the steps required to create an isolated server zone within an isolated domain, see [Checklist: Configuring Rules for an Isolated Server Zone](checklist-configuring-rules-for-an-isolated-server-zone.md).
|
|
||||||
|
|
||||||
This parent checklist includes cross-reference links to important concepts about the domain isolation policy design. It also contains links to subordinate checklists that will help you complete the tasks that are required to implement this design.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Complete the tasks in this checklist in order. When a reference link takes you to a procedure, return to this topic after you complete the steps in that procedure so that you can proceed with the remaining tasks in this checklist.
|
|
||||||
|
|
||||||
| Task | Reference |
|
|
||||||
| - | - |
|
|
||||||
| Review important concepts and examples for the server isolation policy design to determine if this design meets your implementation goals and the needs of your organization.| [Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals](identifying-your-windows-firewall-with-advanced-security-deployment-goals.md)<br/>[Server Isolation Policy Design](server-isolation-policy-design.md)<br/>[Server Isolation Policy Design Example](server-isolation-policy-design-example.md)<br/>[Planning Server Isolation Zones](planning-server-isolation-zones.md) |
|
|
||||||
| Create the GPOs and connection security rules for isolated servers.| [Checklist: Configuring Rules for Servers in a Standalone Isolated Server Zone](checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md)|
|
|
||||||
| Create the GPOs and connection security rules for the client devices that must connect to the isolated servers. | [Checklist: Creating Rules for Clients of a Standalone Isolated Server Zone](checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md)|
|
|
||||||
| Verify that the connection security rules are protecting network traffic on your test devices. | [Verify That Network Traffic Is Authenticated](verify-that-network-traffic-is-authenticated.md)|
|
|
||||||
| After you confirm that network traffic is authenticated by IPsec as expected, you can change authentication rules for the isolated server zone to require authentication instead of requesting it. | [Change Rules from Request to Require Mode](change-rules-from-request-to-require-mode.md)|
|
|
||||||
| According to the testing and roll-out schedule in your design plan, add device accounts for the client devices to the membership group so that you can deploy the settings. | [Add Production Devices to the Membership Group for a Zone](add-production-devices-to-the-membership-group-for-a-zone.md) |
|
|
@ -1,24 +0,0 @@
|
|||||||
---
|
|
||||||
title: Identify implementation goals for Windows Defender Firewall with Advanced Security Deployment
|
|
||||||
description: Identifying Your Windows Defender Firewall with Advanced Security (WFAS) implementation goals
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 09/08/2021
|
|
||||||
---
|
|
||||||
|
|
||||||
# Identifying Windows Defender Firewall with Advanced Security implementation goals
|
|
||||||
|
|
||||||
Correctly identifying your Windows Defender Firewall with Advanced Security implementation goals is essential for the success of your Windows Defender Firewall design project. Form a project team that can clearly articulate deployment issues in a vision statement. When you write your vision statement, identify, clarify, and refine your implementation goals. Prioritize and, if possible, combine your implementation goals so that you can design and deploy Windows Defender Firewall by using an iterative approach. You can take advantage of the predefined Windows Defender Firewall implementation goals presented in this guide that are relevant to your scenarios.
|
|
||||||
|
|
||||||
The following table lists the three main tasks for articulating, refining, and later documenting your Windows Defender Firewall implementation goals:
|
|
||||||
|
|
||||||
|
|
||||||
| Deployment goal tasks | Reference links |
|
|
||||||
|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
|
||||||
| Evaluate predefined Windows Defender Firewall with Advanced Security implementation goals that are provided in this section of the guide, and combine one or more goals to reach your organizational objectives. | Predefined implementation goals: <p><ul><li>[Protect Devices from Unwanted Network Traffic](protect-devices-from-unwanted-network-traffic.md)</li><p><li>[Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md)</li> <p><li>[Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md)</li> <p><li>[Restrict Access to Sensitive Resources to Only Specified Users or Devices](restrict-access-to-only-specified-users-or-devices.md)</li></ul> |
|
|
||||||
| Map one goal or a combination of the predefined implementation goals to an existing Windows Defender Firewall with Advanced Security design. | <ul><li>[Mapping Your implementation goals to a Windows Defender Firewall with Advanced Security Design](mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md)</li></ul> |
|
|
||||||
| Based on the status of your current infrastructure, document your implementation goals for your Windows Defender Firewall with Advanced Security design into a deployment plan. | <ul><li>[Designing A Windows Defender Firewall Strategy](designing-a-windows-firewall-with-advanced-security-strategy.md)</li> <p><li>[Planning Your Windows Defender Firewall Design with Advanced Security](planning-your-windows-firewall-with-advanced-security-design.md)</li></ul> |
|
|
||||||
|
|
||||||
<br />
|
|
||||||
|
|
||||||
**Next:** [Protect Devices from Unwanted Network Traffic](protect-devices-from-unwanted-network-traffic.md)
|
|
@ -1,41 +0,0 @@
|
|||||||
---
|
|
||||||
title: Implementing Your Windows Defender Firewall with Advanced Security Design Plan
|
|
||||||
description: Implementing Your Windows Defender Firewall with Advanced Security Design Plan
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 09/08/2021
|
|
||||||
---
|
|
||||||
|
|
||||||
# Implementing Your Windows Defender Firewall with Advanced Security Design Plan
|
|
||||||
|
|
||||||
|
|
||||||
The following are important factors in the implementation of your Windows Defender Firewall design plan:
|
|
||||||
|
|
||||||
- **Group Policy**. The Windows Defender Firewall with Advanced Security designs make extensive use of Group Policy deployed by Active Directory Domain Services (AD DS). A sound Group Policy infrastructure is required to successfully deploy the firewall and IPsec settings and rules to the devices on your network.
|
|
||||||
|
|
||||||
- **Perimeter firewall**. Most organizations use a perimeter firewall to help protect the devices on the network from potentially malicious network traffic from outside of the organization's network boundaries. If you plan a deployment that includes a boundary zone to enable external devices to connect to devices in that zone, then you must allow that traffic through the perimeter firewall to the devices in the boundary zone.
|
|
||||||
|
|
||||||
- **Devices running operating systems other than Windows**. If your network includes devices that aren't running the Windows operating system, then you must make sure that required communication with those devices isn't blocked by the restrictions put in place by your design. You must implement one of the following steps:
|
|
||||||
|
|
||||||
- Include those devices in the isolated domain or zone by adding certificate-based authentication to your design. Many other operating systems can participate in an isolated domain or isolated server scenario, as long as certificate-based authentication is used.
|
|
||||||
|
|
||||||
- Include the device in the authentication exemption list included in your design. You can choose this option if for any reason the device can't participate in the isolated domain design.
|
|
||||||
|
|
||||||
## How to implement your Windows Defender Firewall with Advanced Security design using this guide
|
|
||||||
|
|
||||||
|
|
||||||
The next step in implementing your design is to determine in what order each of the deployment steps must be performed. This guide uses checklists to help you accomplish the various deployment tasks that are required to implement your design plan. As the following diagram shows, checklists and subchecklists are used as necessary to provide the end-to-end procedure for deploying a design.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Use the following parent checklists in this section of the guide to become familiar with the deployment tasks for implementing your organization's Windows Defender Firewall with Advanced Security design.
|
|
||||||
|
|
||||||
- [Checklist: Implementing a Basic Firewall Policy Design](checklist-implementing-a-basic-firewall-policy-design.md)
|
|
||||||
|
|
||||||
- [Checklist: Implementing a Domain Isolation Policy Design](checklist-implementing-a-domain-isolation-policy-design.md)
|
|
||||||
|
|
||||||
- [Checklist: Implementing a Standalone Server Isolation Policy Design](checklist-implementing-a-standalone-server-isolation-policy-design.md)
|
|
||||||
|
|
||||||
- [Checklist: Implementing a Certificate-based Isolation Policy Design](checklist-implementing-a-certificate-based-isolation-policy-design.md)
|
|
||||||
|
|
||||||
The procedures in these checklists use the Group Policy MMC snap-in interfaces to configure firewall and connection security rules in GPOs, but you can also use Windows PowerShell. For more information, see [Windows Defender Firewall with Advanced Security Administration with Windows PowerShell](windows-firewall-with-advanced-security-administration-with-windows-powershell.md). This guide recommends using GPOs in a specific way to deploy the rules and settings for your design. For information about deploying your GPOs, see [Planning Group Policy Deployment for Your Isolation Zones](planning-group-policy-deployment-for-your-isolation-zones.md) and the checklist [Checklist: Creating Group Policy Objects](checklist-creating-group-policy-objects.md).
|
|
@ -1,36 +0,0 @@
|
|||||||
---
|
|
||||||
title: Protect devices from unwanted network traffic
|
|
||||||
description: Learn how running a host-based firewall on every device in your organization can help protect against attacks as part of a defense-in-depth security strategy.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 01/18/2022
|
|
||||||
---
|
|
||||||
|
|
||||||
# Protect devices from unwanted network traffic
|
|
||||||
|
|
||||||
|
|
||||||
Although network perimeter firewalls provide important protection to network resources from external threats, there are network threats that a perimeter firewall can't protect against. Some attacks might successfully penetrate the perimeter firewall, and at that point what can stop it? Other attacks might originate from inside the network, such as malware that is brought in on portable media and run on a trusted device. Portable devices are often taken outside the network and connected directly to the Internet, without adequate protection between the device and security threats.
|
|
||||||
|
|
||||||
Reports of targeted attacks against organizations, governments, and individuals have become more widespread in recent years. For a general overview of these threats, also known as advanced persistent threats (APT), see the [Microsoft Security Intelligence Report](https://www.microsoft.com/security/business/security-intelligence-report).
|
|
||||||
|
|
||||||
Running a host-based firewall on every device that your organization manages is an important layer in a "defense-in-depth" security strategy. A host-based firewall can help protect against attacks that originate from inside the network and also provide extra protection against attacks from outside the network that manage to penetrate the perimeter firewall. It also travels with a portable device to provide protection when it's away from the organization's network.
|
|
||||||
|
|
||||||
A host-based firewall helps secure a device by dropping all network traffic that doesn't match the administrator-designed rule set for permitted network traffic. This design, which corresponds to [Basic Firewall Policy Design](basic-firewall-policy-design.md), provides the following benefits:
|
|
||||||
|
|
||||||
- Network traffic that is a reply to a request from the local device is permitted into the device from the network.
|
|
||||||
|
|
||||||
- Network traffic that is unsolicited, but that matches a rule for allowed network traffic, is permitted into the device from the network.
|
|
||||||
|
|
||||||
For example, Woodgrove Bank wants a device that is running SQL Server to be able to receive the SQL queries sent to it by client devices. The firewall policy deployed to the device that is running SQL Server includes firewall rules that specifically allow inbound network traffic for the SQL Server program.
|
|
||||||
|
|
||||||
- Outbound network traffic that isn't blocked is allowed on the network.
|
|
||||||
|
|
||||||
For example, Woodgrove Bank has a corporate policy that prohibits the use of certain peer-to-peer file sharing programs. The firewall policy deployed to the computers on the network includes firewall rules that block both inbound and outbound network traffic for the prohibited programs. All other outbound traffic is permitted.
|
|
||||||
|
|
||||||
The following component is recommended for this deployment goal:
|
|
||||||
|
|
||||||
- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more Group Policy objects (GPOs) that can be automatically applied to all relevant computers in the domain.
|
|
||||||
|
|
||||||
Other means of deploying a firewall policy are available, such as creating scripts that use the netsh command-line tool, and then running those scripts on each computer in the organization. This guide uses Active Directory as a recommended means of deployment because of its ability to scale to large organizations.
|
|
||||||
|
|
||||||
**Next:** [Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md)
|
|
@ -1,34 +0,0 @@
|
|||||||
---
|
|
||||||
title: Require Encryption When Accessing Sensitive Network Resources
|
|
||||||
description: Windows Defender Firewall with Advanced Security allows you to require that all network traffic in an isolated domain be encrypted.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 09/08/2021
|
|
||||||
---
|
|
||||||
|
|
||||||
# Require Encryption When Accessing Sensitive Network Resources
|
|
||||||
|
|
||||||
|
|
||||||
The use of authentication in the previously described goal ([Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md)) enables a device in the isolated domain to block traffic from untrusted devices. However, it doesn't prevent an untrusted device from eavesdropping on the network traffic shared between two trusted devices, because by default network packets aren't encrypted.
|
|
||||||
|
|
||||||
For devices that share sensitive information over the network, Windows Defender Firewall with Advanced Security allows you to require that all such network traffic be encrypted. Using encryption can help you comply with regulatory and legislative requirements such as those found in the Federal Information Security Management Act of 2002 (FISMA), the Sarbanes-Oxley Act of 2002, the Health Insurance Portability and Accountability Act of 1996 (HIPAA), and other government and industry regulations. By creating connection security rules that apply to devices that host and exchange sensitive data, you can help protect the confidentiality of that data by encrypting it.
|
|
||||||
|
|
||||||
The following illustration shows an encryption zone in an isolated domain. The rules that implement both the isolated domain and the different zones are deployed by using Group Policy and Active Directory.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
This goal provides the following benefits:
|
|
||||||
|
|
||||||
- Devices in the encryption zone require authentication to communicate with other devices. This rule works no differently from the domain isolation goal and design. For more information, see [Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md).
|
|
||||||
|
|
||||||
- Devices in the encryption zone require that all inbound and outbound network traffic be encrypted.
|
|
||||||
|
|
||||||
For example, Woodgrove Bank processes sensitive customer data on a device that must be protected from eavesdropping by devices on the network. Connection security rules specify that all traffic must be encrypted by a sufficiently complex encryption algorithm to help protect the data.
|
|
||||||
|
|
||||||
- Devices in the encryption zone are often good candidates for server isolation, where access is limited to only computer accounts and user accounts that are members of an authorized access group. In many organizations, the encryption zone and the server isolation zone are one and the same. For more info, see [Restrict Access to Only Specified Users or Devices](restrict-access-to-only-specified-users-or-devices.md).
|
|
||||||
|
|
||||||
The following components are required for this deployment goal:
|
|
||||||
|
|
||||||
- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain.
|
|
||||||
|
|
||||||
**Next:** [Restrict Access to Only Specified Users or Devices](restrict-access-to-only-specified-users-or-devices.md)
|
|
@ -1,38 +0,0 @@
|
|||||||
---
|
|
||||||
title: Restrict Access to Only Specified Users or Devices
|
|
||||||
description: Restrict access to devices and users that are members of domain groups authorized to access that device using Windows Defender Firewall with Advanced Security.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 09/08/2021
|
|
||||||
---
|
|
||||||
|
|
||||||
# Restrict Access to Only Specified Users or Computers
|
|
||||||
|
|
||||||
|
|
||||||
Domain isolation (as described in the previous goal [Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md)) prevents devices that are members of the isolated domain from accepting network traffic from untrusted devices. However, some devices on the network might host sensitive data that must be additionally restricted to only those users and computers that have a business requirement to access the data.
|
|
||||||
|
|
||||||
Windows Defender Firewall with Advanced Security enables you to restrict access to devices and users that are members of domain groups authorized to access that device. These groups are called *network access groups (NAGs)*. When a device authenticates to a server, the server checks the group membership of the computer account and the user account, and grants access only if membership in the NAG is confirmed. Adding this check creates a virtual "secure zone" within the domain isolation zone. You can have multiple devices in a single secure zone, and it's likely that you'll create a separate zone for each set of servers that have specific security access needs. Devices that are part of this server isolation zone are often also part of the encryption zone (see [Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md)).
|
|
||||||
|
|
||||||
Restricting access to only users and devices that have a business requirement can help you comply with regulatory and legislative requirements, such as those found in the Federal Information Security Management Act of 2002 (FISMA), the Sarbanes-Oxley Act of 2002, the Health Insurance Portability and Accountability Act of 1996 (HIPAA), and other government and industry regulations.
|
|
||||||
|
|
||||||
You can restrict access by specifying either computer or user credentials.
|
|
||||||
|
|
||||||
The following illustration shows an isolated server, and examples of devices that can and can't communicate with it. Devices that are outside the Woodgrove corporate network, or computers that are in the isolated domain but aren't members of the required NAG, can't communicate with the isolated server.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
This goal, which corresponds to [Server Isolation Policy Design](server-isolation-policy-design.md), provides the following features:
|
|
||||||
|
|
||||||
- Isolated servers accept unsolicited inbound network traffic only from devices or users that are members of the NAG.
|
|
||||||
|
|
||||||
- Isolated servers can be implemented as part of an isolated domain, and treated as another zone. Members of the zone group receive a GPO with rules that require authentication, and that specify that only network traffic authenticated as coming from a member of the NAG is allowed.
|
|
||||||
|
|
||||||
- Server isolation can also be configured independently of an isolated domain. To do so, configure only the devices that must communicate with the isolated server with connection security rules to implement authentication and check NAG membership.
|
|
||||||
|
|
||||||
- A server isolation zone can be simultaneously configured as an encryption zone. To do so, configure the GPO with rules that force encryption in addition to requiring authentication and restricting access to NAG members. For more information, see [Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md).
|
|
||||||
|
|
||||||
The following components are required for this deployment goal:
|
|
||||||
|
|
||||||
- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain.
|
|
||||||
|
|
||||||
**Next:** [Mapping Your Deployment Goals to a Windows Defender Firewall with Advanced Security Design](mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md)
|
|
@ -1,49 +0,0 @@
|
|||||||
---
|
|
||||||
title: Restrict access to only trusted devices
|
|
||||||
description: Windows Defender Firewall with Advanced Security enables you to isolate devices you trust and restrict access of untrusted devices to trusted devices.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 09/08/2021
|
|
||||||
---
|
|
||||||
|
|
||||||
# Restrict access to only trusted devices
|
|
||||||
|
|
||||||
|
|
||||||
Your organizational network likely has a connection to the Internet. You also likely have partners, vendors, or contractors who attach devices that aren't owned by your organization to your network. Because you don't manage those devices, you can't trust them to be free of malicious software, maintained with the latest security updates, or in any way in compliance with your organization's security policies. These untrustworthy devices both on and outside of your physical network must not be permitted to access your organization's devices except where it's truly required.
|
|
||||||
|
|
||||||
To mitigate this risk, you must be able to isolate the devices you trust, and restrict their ability to receive unsolicited network traffic from untrusted devices. By using connection security and firewall rules available in Windows Defender Firewall with Advanced Security, you can logically isolate the devices that you trust by requiring that all unsolicited inbound network traffic be authenticated. Authentication ensures that each device or user can positively identify itself by using credentials that are trusted by the other device. Connection security rules can be configured to use IPsec with the Kerberos V5 protocol available in Active Directory, or certificates issued by a trusted certification authority as the authentication method.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Because the primary authentication method recommended for devices that are running Windows is to use the Kerberos V5 protocol with membership in an Active Directory domain, this guide refers to this logical separation of computers as *domain isolation*, even when certificates are used to extend the protection to devices that are not part of an Active Directory domain.
|
|
||||||
|
|
||||||
The protection provided by domain isolation can help you comply with regulatory and legislative requirements, such as those found in the Federal Information Security Management Act of 2002 (FISMA), the Sarbanes-Oxley Act of 2002, the Health Insurance Portability and Accountability Act of 1996 (HIPAA), and other government and industry regulations.
|
|
||||||
|
|
||||||
The following illustration shows an isolated domain, with one of the zones that are optionally part of the design. The rules that implement both the isolated domain and the different zones are deployed by using Group Policy and Active Directory.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
These goals, which correspond to [Domain Isolation Policy Design](domain-isolation-policy-design.md) and [Certificate-based Isolation Policy Design](certificate-based-isolation-policy-design.md), provide the following benefits:
|
|
||||||
|
|
||||||
- Devices in the isolated domain accept unsolicited inbound network traffic only when it can be authenticated as coming from another device in the isolated domain. Exemption rules can be defined to allow inbound traffic from trusted computers that for some reason can't perform IPsec authentication.
|
|
||||||
|
|
||||||
For example, Woodgrove Bank wants all of its devices to block all unsolicited inbound network traffic from any device that it doesn't manage. The connection security rules deployed to domain member devices require authentication as a domain member or by using a certificate before an unsolicited inbound network packet is accepted.
|
|
||||||
|
|
||||||
- Devices in the isolated domain can still send outbound network traffic to untrusted devices and receive the responses to the outbound requests.
|
|
||||||
|
|
||||||
For example, Woodgrove Bank wants its users at client devices to be able to access Web sites on the Internet. The default Windows Defender Firewall settings for outbound network traffic allow this access. No other rules are required.
|
|
||||||
|
|
||||||
These goals also support optional zones that can be created to add customized protection to meet the needs of subsets of an organization's devices:
|
|
||||||
|
|
||||||
- Devices in the "boundary zone" are configured to use connection security rules that request but don't require authentication. This configuration enables them to receive unsolicited inbound network traffic from untrusted devices, and also to receive traffic from the other members of the isolated domain.
|
|
||||||
|
|
||||||
For example, Woodgrove Bank has a server that must be accessed by its partners' devices through the Internet. The rules applied to devices in the boundary zone use authentication when the client device can support it, but don't block the connection if the client device can't authenticate.
|
|
||||||
|
|
||||||
- Devices in the "encryption zone" require that all network traffic in and out must be encrypted to secure potentially sensitive material when it's sent over the network.
|
|
||||||
|
|
||||||
For example, Woodgrove Bank wants the devices running SQL Server to only transmit data that is encrypted to help protect the sensitive data stored on those devices.
|
|
||||||
|
|
||||||
The following components are required for this deployment goal:
|
|
||||||
|
|
||||||
- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain.
|
|
||||||
|
|
||||||
**Next:** [Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md)
|
|
@ -1,24 +0,0 @@
|
|||||||
---
|
|
||||||
title: Understand WFAS Deployment
|
|
||||||
description: Resources for helping you understand the Windows Defender Firewall with Advanced Security (WFAS) Design Process
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 09/08/2021
|
|
||||||
---
|
|
||||||
|
|
||||||
# Understanding the Windows Defender Firewall with Advanced Security Design Process
|
|
||||||
|
|
||||||
Designing any deployment starts by performing several important tasks:
|
|
||||||
|
|
||||||
- [Identifying your windows defender firewall with advanced security design goals](identifying-your-windows-firewall-with-advanced-security-deployment-goals.md)
|
|
||||||
|
|
||||||
- [Mapping your implementation goals to a Windows Defender Firewall with Advanced Security design](mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md)
|
|
||||||
|
|
||||||
|
|
||||||
After you identify your implementation goals and map them to a Windows Defender Firewall with Advanced Security design, you can begin documenting the design based on the processes that are described in the following topics:
|
|
||||||
|
|
||||||
- [Designing A Windows Defender Firewall with Advanced Security Strategy](designing-a-windows-firewall-with-advanced-security-strategy.md)
|
|
||||||
|
|
||||||
- [Planning Your Windows Defender Firewall with Advanced Security Design](planning-your-windows-firewall-with-advanced-security-design.md)
|
|
||||||
|
|
||||||
**Next:** [Identifying Your Windows Defender Firewall with Advanced Security Design Goals](identifying-your-windows-firewall-with-advanced-security-deployment-goals.md)
|
|
@ -1,50 +0,0 @@
|
|||||||
---
|
|
||||||
title: Windows Defender Firewall with Advanced Security deployment overview
|
|
||||||
description: Use this guide to deploy Windows Defender Firewall with Advanced Security for your enterprise to help protect devices and data that they share across a network.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 09/08/2021
|
|
||||||
---
|
|
||||||
|
|
||||||
# Windows Defender Firewall with Advanced Security deployment overview
|
|
||||||
|
|
||||||
|
|
||||||
You can use the Windows Defender Firewall with Advanced Security MMC snap-in with devices running at least Windows Vista or Windows Server 2008 to help protect the devices and the data that they share across a network.
|
|
||||||
|
|
||||||
You can use Windows Defender Firewall to control access to the device from the network. You can create rules that allow or block network traffic in either direction based on your business requirements. You can also create IPsec connection security rules to help protect your data as it travels across the network from device to device.
|
|
||||||
|
|
||||||
## About this guide
|
|
||||||
|
|
||||||
This guide is intended for use by system administrators and system engineers. It provides detailed guidance for deploying a Windows Defender Firewall with Advanced Security design that you or an infrastructure specialist or system architect in your organization has selected.
|
|
||||||
|
|
||||||
Begin by reviewing the information in [Planning to Deploy Windows Defender Firewall with Advanced Security](planning-to-deploy-windows-firewall-with-advanced-security.md).
|
|
||||||
|
|
||||||
If you haven't yet selected a design, we recommend that you wait to follow the instructions in this guide until after you've reviewed the design options in the [Windows Defender Firewall with Advanced Security Design Guide](windows-firewall-with-advanced-security-design-guide.md) and selected the one most appropriate for your organization.
|
|
||||||
|
|
||||||
After you select your design and gather the required information about the zones (isolation, boundary, and encryption), operating systems to support, and other details, you can then use this guide to deploy your Windows Defender Firewall with Advanced Security design in your production environment. This guide provides steps for deploying any of the following primary designs that are described in the Design Guide:
|
|
||||||
|
|
||||||
- [Basic Firewall Policy Design](basic-firewall-policy-design.md)
|
|
||||||
|
|
||||||
- [Domain Isolation Policy Design](domain-isolation-policy-design.md)
|
|
||||||
|
|
||||||
- [Server Isolation Policy Design](server-isolation-policy-design.md)
|
|
||||||
|
|
||||||
- [Certificate-based Isolation Policy Design](certificate-based-isolation-policy-design.md)
|
|
||||||
|
|
||||||
Use the checklists in [Implementing Your Windows Defender Firewall with Advanced Security Design Plan](implementing-your-windows-firewall-with-advanced-security-design-plan.md) to determine how best to use the instructions in this guide to deploy your particular design.
|
|
||||||
> [!CAUTION]
|
|
||||||
> We recommend that you use the techniques documented in this guide only for GPOs that must be deployed to the majority of the devices in your organization, and only when the OU hierarchy in your Active Directory domain does not match the deployment needs of these GPOs. These characteristics are typical of GPOs for server and domain isolation scenarios, but are not typical of most other GPOs. When the OU hierarchy supports it, deploy a GPO by linking it to the lowest level OU that contains all of the accounts to which the GPO applies.
|
|
||||||
|
|
||||||
In a large enterprise environment with hundreds or thousands of GPOs, using this technique with too many GPOs can result in user or device accounts that are members of an excessive number of groups; this creation of accounts can result in network connectivity problems if network protocol limits are exceeded.
|
|
||||||
|
|
||||||
## What this guide doesn't provide
|
|
||||||
|
|
||||||
This guide doesn't provide:
|
|
||||||
|
|
||||||
- Guidance for creating firewall rules for specific network applications. For this information, see [Planning Settings for a Basic Firewall Policy](planning-settings-for-a-basic-firewall-policy.md) in the Windows Defender Firewall with Advanced Security Design Guide.
|
|
||||||
|
|
||||||
- Guidance for setting up Active Directory Domain Services (AD DS) to support Group Policy.
|
|
||||||
|
|
||||||
- Guidance for setting up certification authorities (CAs) to create certificates for certificate-based authentication.
|
|
||||||
|
|
||||||
For more information about Windows Defender Firewall with Advanced Security, see [Windows Defender Firewall with Advanced Security Overview](windows-firewall-with-advanced-security.md).
|
|
@ -1,93 +0,0 @@
|
|||||||
---
|
|
||||||
title: Windows Defender Firewall with Advanced Security design guide
|
|
||||||
description: Learn about common goals for using Windows Defender Firewall with Advanced Security to choose or create a design for deploying the firewall in your enterprise.
|
|
||||||
ms.prod: windows-client
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 09/08/2021
|
|
||||||
---
|
|
||||||
|
|
||||||
# Windows Defender Firewall with Advanced Security design guide
|
|
||||||
|
|
||||||
|
|
||||||
Windows Defender Firewall with Advanced Security is a host firewall that helps secure the device in two ways. First, it can filter the network traffic permitted to enter the device from the network, and also control what network traffic the device is allowed to send to the network. Second, Windows Defender Firewall supports IPsec, which enables you to require authentication from any device that is attempting to communicate with your device. When authentication is required, devices that can't authenticate can't communicate with your device. By using IPsec, you can also require that specific network traffic be encrypted to prevent it from being read or intercepted while in transit between devices.
|
|
||||||
|
|
||||||
The interface for Windows Defender Firewall is much more capable and flexible than the consumer-friendly interface found in the Windows Defender Firewall Control Panel. They both interact with the same underlying services, but provide different levels of control over those services. While the Windows Defender Firewall Control Panel meets the needs for protecting a single device in a home environment, it doesn't provide enough centralized management or security features to help secure more complex network traffic found in a typical business enterprise environment.
|
|
||||||
|
|
||||||
For more overview information, see [Windows Defender Firewall with Advanced Security](windows-firewall-with-advanced-security.md).
|
|
||||||
|
|
||||||
## About this guide
|
|
||||||
|
|
||||||
This guide provides recommendations to help you to choose or create a design for deploying Windows Defender Firewall in your enterprise environment. The guide describes some of the common goals for using Windows Defender Firewall, and then helps you map the goals that apply to your scenario to the designs that are presented in this guide.
|
|
||||||
|
|
||||||
This guide is intended for the IT professional who has been assigned the task of deploying firewall and IPsec technologies on an organization's network to help meet the organization's security goals.
|
|
||||||
|
|
||||||
Windows Defender Firewall should be part of a comprehensive security solution that implements various security technologies, such as perimeter firewalls, intrusion detection systems, virtual private networking (VPN), IEEE 802.1X authentication for wireless and wired connections, and IPsec connection security rules.
|
|
||||||
|
|
||||||
To successfully use this guide, you need a good understanding of both the capabilities provided by Windows Defender Firewall, and how to deliver configuration settings to your managed devices by using Group Policy in Active Directory.
|
|
||||||
|
|
||||||
You can use the implementation goals to form one of these Windows Defender Firewall with Advanced Security designs, or a custom design that combines elements from those goals presented here:
|
|
||||||
|
|
||||||
- **Basic firewall policy design**. Restricts network traffic in and out of your devices to only that which is needed and authorized.
|
|
||||||
|
|
||||||
- **Domain isolation policy design**. Prevents devices that are domain members from receiving unsolicited network traffic from devices that aren't domain members. More "zones" can be established to support the special requirements of some devices, such as:
|
|
||||||
|
|
||||||
- A "boundary zone" for devices that must be able to receive requests from non-isolated devices.
|
|
||||||
|
|
||||||
- An "encryption zone" for devices that store sensitive data that must be protected during network transmission.
|
|
||||||
|
|
||||||
- **Server isolation policy design**. Restricts access to a server to only a limited group of authorized users and devices. This server can be commonly configured as a zone in a domain isolation design, but can also be configured as a stand-alone design, providing many of the benefits of domain isolation to a small set of devices.
|
|
||||||
|
|
||||||
- **Certificate-based isolation policy design**. This design is a complement to either of the previous two designs, and supports any of their capabilities. It uses cryptographic certificates that are deployed to clients and servers for authentication, instead of the Kerberos V5 authentication used by default in Active Directory. This design enables devices that aren't part of an Active Directory domain, such as devices running operating systems other than Windows, to participate in your isolation solution.
|
|
||||||
|
|
||||||
In addition to descriptions and example for each design, you'll find guidelines for gathering required data about your environment. You can then use these guidelines to plan and design your Windows Defender Firewall with Advanced Security deployment. After you read this guide, and finish gathering, documenting, and mapping your organization's requirements, you have the information that you need to begin deploying Windows Defender Firewall using the guidance in the Windows Defender Firewall with Advanced Security Deployment Guide.
|
|
||||||
|
|
||||||
You can find the Windows Defender Firewall with Advanced Security
|
|
||||||
Deployment Guide at these locations:
|
|
||||||
|
|
||||||
- [Windows Defender Firewall with Advanced Security Deployment Guide](windows-firewall-with-advanced-security-deployment-guide.md)
|
|
||||||
|
|
||||||
- (Downloadable Word document)
|
|
||||||
|
|
||||||
## In this section
|
|
||||||
|
|
||||||
| Topic | Description
|
|
||||||
| - | - |
|
|
||||||
| [Understanding the Windows Defender Firewall with Advanced Security Design Process](understanding-the-windows-firewall-with-advanced-security-design-process.md) | Learn how to get started with the Windows Defender Firewall with Advanced Security design process. |
|
|
||||||
| [Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals](identifying-your-windows-firewall-with-advanced-security-deployment-goals.md) | Learn how to identify your Windows Defender Firewall with Advanced Security implementation goals. |
|
|
||||||
| [Mapping Your Deployment Goals to a Windows Defender Firewall with Advanced Security Design](mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md) | After you finish reviewing the existing Windows Defender Firewall with Advanced Security implementation goals and you determine which goals are important to your specific deployment, you can map those goals to a specific Windows Defender Firewall with Advanced Security design. |
|
|
||||||
| [Designing a Windows Defender Firewall with Advanced Security Strategy](designing-a-windows-firewall-with-advanced-security-strategy.md) | To select the most effective design for helping to protect the network, you must spend time collecting key information about your current computer environment. |
|
|
||||||
| [Planning Your Windows Defender Firewall with Advanced Security Design](planning-your-windows-firewall-with-advanced-security-design.md) | After you've gathered the relevant information in the previous sections, and understand the basics of the designs as described earlier in this guide, you can select the design (or combination of designs) that meet your needs. |
|
|
||||||
| [Appendix A: Sample GPO Template Files for Settings Used in this Guide](appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md) | You can import an XML file containing customized registry preferences into a Group Policy Object (GPO) by using the Preferences feature of the Group Policy Management Console (GPMC). |
|
|
||||||
|
|
||||||
## Terminology used in this guide
|
|
||||||
|
|
||||||
The following table identifies and defines terms used throughout this guide.
|
|
||||||
|
|
||||||
| Term | Definition |
|
|
||||||
| - | - |
|
|
||||||
| Active Directory domain | A group of devices and users managed by an administrator by using Active Directory Domain Services (AD DS). Devices in a domain share a common directory database and security policies. Multiple domains can co-exist in a "forest," with trust relationships that establish the forest as the security boundary. |
|
|
||||||
| Authentication | A process that enables the sender of a message to prove its identity to the receiver. For connection security in Windows, authentication is implemented by the IPsec protocol suite.|
|
|
||||||
| Boundary zone | A subset of the devices in an isolated domain that must be able to receive unsolicited and non-authenticated network traffic from devices that aren't members of the isolated domain. Devices in the boundary zone request but don't require authentication. They use IPsec to communicate with other devices in the isolated domain.|
|
|
||||||
| Connection security rule | A rule in Windows Defender Firewall that contains a set of conditions and an action to be applied to network packets that match the conditions. The action can allow the packet, block the packet, or require the packet to be protected by IPsec. In previous versions of Windows, this rule was called an *IPsec rule*.|
|
|
||||||
| Certificate-based isolation | A way to add devices that can't use Kerberos V5 authentication to an isolated domain, by using an alternate authentication technique. Every device in the isolated domain and the devices that can't use Kerberos V5 are provided with a device certificate that can be used to authenticate with each other. Certificate-based isolation requires a way to create and distribute an appropriate certificate (if you choose not to purchase one from a commercial certificate provider).|
|
|
||||||
| Domain isolation | A technique for helping protect the devices in an organization by requiring that the devices authenticate each other's identity before exchanging information, and refusing connection requests from devices that can't authenticate. Domain isolation takes advantage of Active Directory domain membership and the Kerberos V5 authentication protocol available to all members of the domain. Also see "Isolated domain" in this table.|
|
|
||||||
| Encryption zone | A subset of the devices in an isolated domain that process sensitive data. Devices that are part of the encryption zone have all network traffic encrypted to prevent viewing by non-authorized users. Devices that are part of the encryption zone also typically are subject to the access control restrictions of server isolation.|
|
|
||||||
| Firewall rule | A rule in Windows Defender Firewall that contains a set of conditions used to determine whether a network packet is allowed to pass through the firewall.<br/>By default, the firewall rules in Windows Server 2016. Windows Server 2012, Windows Server 2008 R2, Windows Server 2008, Windows 11, Windows 10, Windows 8, Windows 7, and Windows Vista block unsolicited inbound network traffic. Likewise, by default, all outbound network traffic is allowed. The firewall included in previous versions of Windows only filtered inbound network traffic. |
|
|
||||||
| Internet Protocol security (IPsec) | A set of industry-standard, cryptography-based protection services and protocols. IPsec protects all protocols in the TCP/IP protocol suite except Address Resolution Protocol (ARP).|
|
|
||||||
| IPsec policy | A collection of connection security rules that provide the required protection to network traffic entering and leaving the device. The protection includes authentication of both the sending and receiving device, integrity protection of the network traffic exchanged between them, and can include encryption.|
|
|
||||||
| Isolated domain | An Active Directory domain (or an Active Directory forest, or set of domains with two-way trust relationships) that has Group Policy settings applied to help protect its member devices by using IPsec connection security rules. Members of the isolated domain require authentication on all unsolicited inbound connections (with exceptions handled by the other zones).<br/>In this guide, the term *isolated domain* refers to the IPsec concept of a group of devices that can share authentication. The term *Active Directory domain* refers to the group of devices that share a security database by using Active Directory.|
|
|
||||||
| Server isolation | A technique for using group membership to restrict access to a server that is typically already a member of an isolated domain. The extra protection comes from using the authentication credentials of the requesting device to determine its group membership, and then only allowing access if the computer account (and optionally the user account) is a member of an authorized group.|
|
|
||||||
| Solicited network traffic | Network traffic that is sent in response to a request. By default, Windows Defender Firewall allows all solicited network traffic through.|
|
|
||||||
| Unsolicited network traffic | Network traffic that isn't a response to an earlier request, and that the receiving device can't necessarily anticipate. By default, Windows Defender Firewall blocks all unsolicited network traffic. |
|
|
||||||
| Zone | A zone is a logical grouping of devices that share common IPsec policies because of their communications requirements. For example, the boundary zone permits inbound connections from non-trusted devices. The encryption zone requires that all connections be encrypted.<br/>This term zone isn't related to the one used by Domain Name System (DNS). |
|
|
||||||
|
|
||||||
**Next:** [Understanding the Windows Defender Firewall with Advanced Security Design Process](understanding-the-windows-firewall-with-advanced-security-design-process.md)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
Loading…
x
Reference in New Issue
Block a user