mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 20:03:40 +00:00
cleannnnnnn up
This commit is contained in:
@ -48,23 +48,23 @@
|
||||
#### [Planning certificate-based authentication](planning-certificate-based-authentication.md)
|
||||
##### [Documenting the Zones](documenting-the-zones.md)
|
||||
|
||||
##### [Planning Group Policy Deployment for Your Isolation Zones](planning-group-policy-deployment-for-your-isolation-zones.md)
|
||||
###### [Planning Isolation Groups for the Zones](planning-isolation-groups-for-the-zones.md)
|
||||
###### [Planning Network Access Groups](planning-network-access-groups.md)
|
||||
##### [Planning group policy deployment for your isolation zones](planning-group-policy-deployment-for-your-isolation-zones.md)
|
||||
###### [Planning isolation groups for the zones](planning-isolation-groups-for-the-zones.md)
|
||||
###### [Planning network access groups](planning-network-access-groups.md)
|
||||
|
||||
###### [Planning the GPOs](planning-the-gpos.md)
|
||||
####### [Firewall GPOs](firewall-gpos.md)
|
||||
######## [GPO_DOMISO_Firewall](gpo-domiso-firewall.md)
|
||||
####### [Isolated Domain GPOs](isolated-domain-gpos.md)
|
||||
####### [Isolated domain GPOs](isolated-domain-gpos.md)
|
||||
######## [GPO_DOMISO_IsolatedDomain_Clients](gpo-domiso-isolateddomain-clients.md)
|
||||
######## [GPO_DOMISO_IsolatedDomain_Servers](gpo-domiso-isolateddomain-servers.md)
|
||||
####### [Boundary Zone GPOs](boundary-zone-gpos.md)
|
||||
####### [Boundary zone GPOs](boundary-zone-gpos.md)
|
||||
######## [GPO_DOMISO_Boundary](gpo-domiso-boundary.md)
|
||||
####### [Encryption Zone GPOs](encryption-zone-gpos.md)
|
||||
####### [Encryption zone GPOs](encryption-zone-gpos.md)
|
||||
######## [GPO_DOMISO_Encryption](gpo-domiso-encryption.md)
|
||||
####### [Server Isolation GPOs](server-isolation-gpos.md)
|
||||
####### [Server isolation GPOs](server-isolation-gpos.md)
|
||||
|
||||
###### [Planning GPO Deployment](planning-gpo-deployment.md)
|
||||
###### [Planning GPO deployment](planning-gpo-deployment.md)
|
||||
|
||||
|
||||
### [Planning to deploy](planning-to-deploy-windows-firewall-with-advanced-security.md)
|
||||
@ -102,68 +102,68 @@
|
||||
|
||||
|
||||
## [How-to]()
|
||||
### [Add Production Devices to the Membership Group for a Zone](add-production-devices-to-the-membership-group-for-a-zone.md)
|
||||
### [Add Test Devices to the Membership Group for a Zone](add-test-devices-to-the-membership-group-for-a-zone.md)
|
||||
### [Assign Security Group Filters to the GPO](assign-security-group-filters-to-the-gpo.md)
|
||||
### [Change Rules from Request to Require Mode](change-rules-from-request-to-require-mode.md)
|
||||
### [Configure Authentication Methods](configure-authentication-methods.md)
|
||||
### [Configure Data Protection (Quick Mode) Settings](configure-data-protection-quick-mode-settings.md)
|
||||
### [Configure Group Policy to Autoenroll and Deploy Certificates](configure-group-policy-to-autoenroll-and-deploy-certificates.md)
|
||||
### [Configure Key Exchange (Main Mode) Settings](configure-key-exchange-main-mode-settings.md)
|
||||
### [Configure the Rules to Require Encryption](configure-the-rules-to-require-encryption.md)
|
||||
### [Configure the Windows Firewall Log](configure-the-windows-firewall-log.md)
|
||||
### [Configure the Workstation Authentication Certificate Template](configure-the-workstation-authentication-certificate-template.md)
|
||||
### [Configure Windows Firewall to Suppress Notifications When a Program Is Blocked](configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md)
|
||||
### [Confirm That Certificates Are Deployed Correctly](confirm-that-certificates-are-deployed-correctly.md)
|
||||
### [Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md)
|
||||
### [Add Production devices to the membership group for a zone](add-production-devices-to-the-membership-group-for-a-zone.md)
|
||||
### [Add test devices to the membership group for a zone](add-test-devices-to-the-membership-group-for-a-zone.md)
|
||||
### [Assign security group filters to the GPO](assign-security-group-filters-to-the-gpo.md)
|
||||
### [Change rules from request to require mode](Change-Rules-From-Request-To-Require-Mode.Md)
|
||||
### [Configure authentication methods](Configure-authentication-methods.md)
|
||||
### [Configure data protection (Quick Mode) settings](configure-data-protection-quick-mode-settings.md)
|
||||
### [Configure Group Policy to autoenroll and deploy certificates](configure-group-policy-to-autoenroll-and-deploy-certificates.md)
|
||||
### [Configure key exchange (main mode) settings](configure-key-exchange-main-mode-settings.md)
|
||||
### [Configure the rules to require encryption](configure-the-rules-to-require-encryption.md)
|
||||
### [Configure the Windows Firewall log](configure-the-windows-firewall-log.md)
|
||||
### [Configure the workstation authentication certificate template](configure-the-workstation-authentication-certificate-template.md)
|
||||
### [Configure Windows Firewall to suppress notifications when a program is blocked](configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md)
|
||||
### [Confirm that certificates are deployed correctly](confirm-that-certificates-are-deployed-correctly.md)
|
||||
### [Copy a GPO to create a new GPO](copy-a-gpo-to-create-a-new-gpo.md)
|
||||
### [Create a Group Account in Active Directory](create-a-group-account-in-active-directory.md)
|
||||
### [Create a Group Policy Object](create-a-group-policy-object.md)
|
||||
### [Create an Authentication Exemption List Rule](create-an-authentication-exemption-list-rule.md)
|
||||
### [Create an Authentication Request Rule](create-an-authentication-request-rule.md)
|
||||
### [Create an Inbound ICMP Rule](create-an-inbound-icmp-rule.md)
|
||||
### [Create an Inbound Port Rule](create-an-inbound-port-rule.md)
|
||||
### [Create an Inbound Program or Service Rule](create-an-inbound-program-or-service-rule.md)
|
||||
### [Create an Outbound Port Rule](create-an-outbound-port-rule.md)
|
||||
### [Create an Outbound Program or Service Rule](create-an-outbound-program-or-service-rule.md)
|
||||
### [Create Inbound Rules to Support RPC](create-inbound-rules-to-support-rpc.md)
|
||||
### [Create WMI Filters for the GPO](create-wmi-filters-for-the-gpo.md)
|
||||
### [Create an authentication exemption list rule](create-an-authentication-exemption-list-rule.md)
|
||||
### [Create an authentication request rule](create-an-authentication-request-rule.md)
|
||||
### [Create an inbound ICMP rule](create-an-inbound-icmp-rule.md)
|
||||
### [Create an inbound port rule](create-an-inbound-port-rule.md)
|
||||
### [Create an inbound program or service rule](create-an-inbound-program-or-service-rule.md)
|
||||
### [Create an outbound port rule](create-an-outbound-port-rule.md)
|
||||
### [Create an outbound program or service rule](create-an-outbound-program-or-service-rule.md)
|
||||
### [Create inbound rules to support RPC](create-inbound-rules-to-support-rpc.md)
|
||||
### [Create WMI filters for the GPO](create-wmi-filters-for-the-gpo.md)
|
||||
### [Create Windows Firewall rules in Intune](create-windows-firewall-rules-in-intune.md)
|
||||
### [Enable Predefined Inbound Rules](enable-predefined-inbound-rules.md)
|
||||
### [Enable Predefined Outbound Rules](enable-predefined-outbound-rules.md)
|
||||
### [Exempt ICMP from Authentication](exempt-icmp-from-authentication.md)
|
||||
### [Link the GPO to the Domain](link-the-gpo-to-the-domain.md)
|
||||
### [Modify GPO Filters](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md)
|
||||
### [Open IP Security Policies](open-the-group-policy-management-console-to-ip-security-policies.md)
|
||||
### [Enable predefined inbound rules](enable-predefined-inbound-rules.md)
|
||||
### [Enable predefined outbound rules](enable-predefined-outbound-rules.md)
|
||||
### [Exempt ICMP from authentication](exempt-icmp-from-authentication.md)
|
||||
### [Link the GPO to the domain](link-the-gpo-to-the-domain.md)
|
||||
### [Modify GPO filters](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md)
|
||||
### [Open IP security policies](open-the-group-policy-management-console-to-ip-security-policies.md)
|
||||
### [Open Group Policy](open-the-group-policy-management-console-to-windows-firewall.md)
|
||||
### [Open Group Policy](open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md)
|
||||
### [Open Windows Firewall](open-windows-firewall-with-advanced-security.md)
|
||||
### [Restrict Server Access](restrict-server-access-to-members-of-a-group-only.md)
|
||||
### [Restrict server access](restrict-server-access-to-members-of-a-group-only.md)
|
||||
### [Enable Windows Firewall](turn-on-windows-firewall-and-configure-default-behavior.md)
|
||||
### [Verify Network Traffic](verify-that-network-traffic-is-authenticated.md)
|
||||
### [Verify Network Traffic](verify-that-network-traffic-is-authenticated.md)
|
||||
|
||||
|
||||
## [References]()
|
||||
### [Checklist: Creating Group Policy Objects](checklist-creating-group-policy-objects.md)
|
||||
### [Checklist: Creating Inbound Firewall Rules](checklist-creating-inbound-firewall-rules.md)
|
||||
### [Checklist: Creating Group Policy objects](checklist-creating-group-policy-objects.md)
|
||||
### [Checklist: Creating inbound firewall rules](checklist-creating-inbound-firewall-rules.md)
|
||||
### [Checklist: Creating Outbound Firewall Rules](checklist-creating-outbound-firewall-rules.md)
|
||||
### [Checklist: Configuring Basic Firewall Settings](checklist-configuring-basic-firewall-settings.md)
|
||||
|
||||
|
||||
### [Checklist: Configuring Rules for the Isolated Domain](checklist-configuring-rules-for-the-isolated-domain.md)
|
||||
### [Checklist: Configuring Rules for the Boundary Zone](checklist-configuring-rules-for-the-boundary-zone.md)
|
||||
### [Checklist: Configuring Rules for the Encryption Zone](checklist-configuring-rules-for-the-encryption-zone.md)
|
||||
### [Checklist: Configuring Rules for an Isolated Server Zone](checklist-configuring-rules-for-an-isolated-server-zone.md)
|
||||
### [Checklist: Configuring rules for the isolated domain](checklist-configuring-rules-for-the-isolated-domain.md)
|
||||
### [Checklist: Configuring rules for the boundary zone](checklist-configuring-rules-for-the-boundary-zone.md)
|
||||
### [Checklist: Configuring rules for the encryption zone](checklist-configuring-rules-for-the-encryption-zone.md)
|
||||
### [Checklist: Configuring rules for an isolated server zone](checklist-configuring-rules-for-an-isolated-server-zone.md)
|
||||
|
||||
### [Checklist: Configuring Rules for Servers in a Standalone Isolated Server Zone](checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md)
|
||||
### [Checklist: Creating Rules for Clients of a Standalone Isolated Server Zone](checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md)
|
||||
### [Checklist: Configuring rules for servers in a standalone isolated server zone](checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md)
|
||||
### [Checklist: Creating rules for clients of a standalone isolated server zone](checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md)
|
||||
|
||||
|
||||
### [Appendix A: Sample GPO Template Files for Settings Used in this Guide](appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md)
|
||||
### [Appendix A: Sample GPO template files for settings used in this guide](appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md)
|
||||
|
||||
|
||||
|
||||
## [Troubleshooting]()
|
||||
### [Troubleshooting UWP App Connectivity Issues in Windows Firewall](troubleshooting-uwp-firewall.md)
|
||||
### [Troubleshooting UWP app connectivity issues in Windows Firewall](troubleshooting-uwp-firewall.md)
|
||||
|
||||
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Identify Goals for your WFAS Deployment (Windows 10)
|
||||
description: Identifying Your Windows Defender Firewall with Advanced Security (WFAS) Deployment Goals
|
||||
title: Identify implementation goals for Windows Defender Firewall with Advanced Security Deployment (Windows 10)
|
||||
description: Identifying Your Windows Defender Firewall with Advanced Security (WFAS) implementation goals
|
||||
ms.assetid: 598cf45e-2e1c-4947-970f-361dfa264bba
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
@ -17,22 +17,21 @@ ms.topic: conceptual
|
||||
ms.date: 08/17/2017
|
||||
---
|
||||
|
||||
# Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals
|
||||
|
||||
# Identifying Windows Defender Firewall with Advanced Security implementation goals
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server 2016
|
||||
|
||||
Correctly identifying your Windows Defender Firewall with Advanced Security deployment goals is essential for the success of your Windows Defender Firewall design project. Form a project team that can clearly articulate deployment issues in a vision statement. When you write your vision statement, identify, clarify, and refine your deployment goals. Prioritize and, if possible, combine your deployment goals so that you can design and deploy Windows Defender Firewall by using an iterative approach. You can take advantage of the predefined Windows Defender Firewall deployment goals presented in this guide that are relevant to your scenarios.
|
||||
Correctly identifying your Windows Defender Firewall with Advanced Security implementation goals is essential for the success of your Windows Defender Firewall design project. Form a project team that can clearly articulate deployment issues in a vision statement. When you write your vision statement, identify, clarify, and refine your implementation goals. Prioritize and, if possible, combine your implementation goals so that you can design and deploy Windows Defender Firewall by using an iterative approach. You can take advantage of the predefined Windows Defender Firewall implementation goals presented in this guide that are relevant to your scenarios.
|
||||
|
||||
The following table lists the three main tasks for articulating, refining, and subsequently documenting your Windows Defender Firewall deployment goals:
|
||||
The following table lists the three main tasks for articulating, refining, and subsequently documenting your Windows Defender Firewall implementation goals:
|
||||
|
||||
|
||||
| Deployment goal tasks | Reference links |
|
||||
|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Evaluate predefined Windows Defender Firewall with Advanced Security deployment goals that are provided in this section of the guide, and combine one or more goals to reach your organizational objectives. | Predefined deployment goals: <p><ul><li>[Protect Devices from Unwanted Network Traffic](protect-devices-from-unwanted-network-traffic.md)</li><p><li>[Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md)</li> <p><li>[Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md)</li> <p><li>[Restrict Access to Sensitive Resources to Only Specified Users or Devices](restrict-access-to-only-specified-users-or-devices.md)</li></ul> |
|
||||
| Map one goal or a combination of the predefined deployment goals to an existing Windows Defender Firewall with Advanced Security design. | <ul><li>[Mapping Your Deployment Goals to a Windows Defender Firewall with Advanced Security Design](mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md)</li></ul> |
|
||||
| Based on the status of your current infrastructure, document your deployment goals for your Windows Defender Firewall with Advanced Security design into a deployment plan. | <ul><li>[Designing A Windows Defender Firewall Strategy](designing-a-windows-firewall-with-advanced-security-strategy.md)</li> <p><li>[Planning Your Windows Defender Firewall Design with Advanced Security](planning-your-windows-firewall-with-advanced-security-design.md)</li></ul> |
|
||||
| Evaluate predefined Windows Defender Firewall with Advanced Security implementation goals that are provided in this section of the guide, and combine one or more goals to reach your organizational objectives. | Predefined implementation goals: <p><ul><li>[Protect Devices from Unwanted Network Traffic](protect-devices-from-unwanted-network-traffic.md)</li><p><li>[Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md)</li> <p><li>[Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md)</li> <p><li>[Restrict Access to Sensitive Resources to Only Specified Users or Devices](restrict-access-to-only-specified-users-or-devices.md)</li></ul> |
|
||||
| Map one goal or a combination of the predefined implementation goals to an existing Windows Defender Firewall with Advanced Security design. | <ul><li>[Mapping Your implementation goals to a Windows Defender Firewall with Advanced Security Design](mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md)</li></ul> |
|
||||
| Based on the status of your current infrastructure, document your implementation goals for your Windows Defender Firewall with Advanced Security design into a deployment plan. | <ul><li>[Designing A Windows Defender Firewall Strategy](designing-a-windows-firewall-with-advanced-security-strategy.md)</li> <p><li>[Planning Your Windows Defender Firewall Design with Advanced Security](planning-your-windows-firewall-with-advanced-security-design.md)</li></ul> |
|
||||
|
||||
<br />
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Protect Devices from Unwanted Network Traffic (Windows 10)
|
||||
title: Protect devices from unwanted network traffic (Windows 10)
|
||||
description: Protect Devices from Unwanted Network Traffic
|
||||
ms.assetid: 307d2b38-e8c4-4358-ae16-f2143af965dc
|
||||
ms.reviewer:
|
||||
@ -17,7 +17,7 @@ ms.topic: conceptual
|
||||
ms.date: 04/19/2017
|
||||
---
|
||||
|
||||
# Protect Devices from Unwanted Network Traffic
|
||||
# Protect devices from unwanted network traffic
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Restrict Access to Only Trusted Devices (Windows 10)
|
||||
description: Restrict Access to Only Trusted Devices
|
||||
title: Restrict access to only trusted devices (Windows 10)
|
||||
description: estrict access to only trusted devices
|
||||
ms.assetid: bc1f49a4-7d54-4857-8af9-b7c79f47273b
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
@ -17,7 +17,7 @@ ms.topic: conceptual
|
||||
ms.date: 08/17/2017
|
||||
---
|
||||
|
||||
# Restrict Access to Only Trusted Devices
|
||||
# Restrict access to only trusted devices
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Windows Defender Firewall with Advanced Security Design Guide (Windows 10)
|
||||
description: Windows Defender Firewall with Advanced Security Design Guide
|
||||
title: Windows Defender Firewall with Advanced Security design guide (Windows 10)
|
||||
description: Windows Defender Firewall with Advanced Security design guide
|
||||
ms.assetid: 5c631389-f232-4b95-9e48-ec02b8677d51
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
@ -17,8 +17,7 @@ ms.topic: conceptual
|
||||
ms.date: 10/05/2017
|
||||
---
|
||||
|
||||
# Windows Defender Firewall with Advanced Security
|
||||
Design Guide
|
||||
# Windows Defender Firewall with Advanced Security design guide
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
|
Reference in New Issue
Block a user