cleannnnnnn up

This commit is contained in:
Joey Caparas
2020-08-14 13:28:18 -07:00
parent 110213ea26
commit 774963624d
5 changed files with 65 additions and 67 deletions

View File

@ -48,23 +48,23 @@
#### [Planning certificate-based authentication](planning-certificate-based-authentication.md) #### [Planning certificate-based authentication](planning-certificate-based-authentication.md)
##### [Documenting the Zones](documenting-the-zones.md) ##### [Documenting the Zones](documenting-the-zones.md)
##### [Planning Group Policy Deployment for Your Isolation Zones](planning-group-policy-deployment-for-your-isolation-zones.md) ##### [Planning group policy deployment for your isolation zones](planning-group-policy-deployment-for-your-isolation-zones.md)
###### [Planning Isolation Groups for the Zones](planning-isolation-groups-for-the-zones.md) ###### [Planning isolation groups for the zones](planning-isolation-groups-for-the-zones.md)
###### [Planning Network Access Groups](planning-network-access-groups.md) ###### [Planning network access groups](planning-network-access-groups.md)
###### [Planning the GPOs](planning-the-gpos.md) ###### [Planning the GPOs](planning-the-gpos.md)
####### [Firewall GPOs](firewall-gpos.md) ####### [Firewall GPOs](firewall-gpos.md)
######## [GPO_DOMISO_Firewall](gpo-domiso-firewall.md) ######## [GPO_DOMISO_Firewall](gpo-domiso-firewall.md)
####### [Isolated Domain GPOs](isolated-domain-gpos.md) ####### [Isolated domain GPOs](isolated-domain-gpos.md)
######## [GPO_DOMISO_IsolatedDomain_Clients](gpo-domiso-isolateddomain-clients.md) ######## [GPO_DOMISO_IsolatedDomain_Clients](gpo-domiso-isolateddomain-clients.md)
######## [GPO_DOMISO_IsolatedDomain_Servers](gpo-domiso-isolateddomain-servers.md) ######## [GPO_DOMISO_IsolatedDomain_Servers](gpo-domiso-isolateddomain-servers.md)
####### [Boundary Zone GPOs](boundary-zone-gpos.md) ####### [Boundary zone GPOs](boundary-zone-gpos.md)
######## [GPO_DOMISO_Boundary](gpo-domiso-boundary.md) ######## [GPO_DOMISO_Boundary](gpo-domiso-boundary.md)
####### [Encryption Zone GPOs](encryption-zone-gpos.md) ####### [Encryption zone GPOs](encryption-zone-gpos.md)
######## [GPO_DOMISO_Encryption](gpo-domiso-encryption.md) ######## [GPO_DOMISO_Encryption](gpo-domiso-encryption.md)
####### [Server Isolation GPOs](server-isolation-gpos.md) ####### [Server isolation GPOs](server-isolation-gpos.md)
###### [Planning GPO Deployment](planning-gpo-deployment.md) ###### [Planning GPO deployment](planning-gpo-deployment.md)
### [Planning to deploy](planning-to-deploy-windows-firewall-with-advanced-security.md) ### [Planning to deploy](planning-to-deploy-windows-firewall-with-advanced-security.md)
@ -102,68 +102,68 @@
## [How-to]() ## [How-to]()
### [Add Production Devices to the Membership Group for a Zone](add-production-devices-to-the-membership-group-for-a-zone.md) ### [Add Production devices to the membership group for a zone](add-production-devices-to-the-membership-group-for-a-zone.md)
### [Add Test Devices to the Membership Group for a Zone](add-test-devices-to-the-membership-group-for-a-zone.md) ### [Add test devices to the membership group for a zone](add-test-devices-to-the-membership-group-for-a-zone.md)
### [Assign Security Group Filters to the GPO](assign-security-group-filters-to-the-gpo.md) ### [Assign security group filters to the GPO](assign-security-group-filters-to-the-gpo.md)
### [Change Rules from Request to Require Mode](change-rules-from-request-to-require-mode.md) ### [Change rules from request to require mode](Change-Rules-From-Request-To-Require-Mode.Md)
### [Configure Authentication Methods](configure-authentication-methods.md) ### [Configure authentication methods](Configure-authentication-methods.md)
### [Configure Data Protection (Quick Mode) Settings](configure-data-protection-quick-mode-settings.md) ### [Configure data protection (Quick Mode) settings](configure-data-protection-quick-mode-settings.md)
### [Configure Group Policy to Autoenroll and Deploy Certificates](configure-group-policy-to-autoenroll-and-deploy-certificates.md) ### [Configure Group Policy to autoenroll and deploy certificates](configure-group-policy-to-autoenroll-and-deploy-certificates.md)
### [Configure Key Exchange (Main Mode) Settings](configure-key-exchange-main-mode-settings.md) ### [Configure key exchange (main mode) settings](configure-key-exchange-main-mode-settings.md)
### [Configure the Rules to Require Encryption](configure-the-rules-to-require-encryption.md) ### [Configure the rules to require encryption](configure-the-rules-to-require-encryption.md)
### [Configure the Windows Firewall Log](configure-the-windows-firewall-log.md) ### [Configure the Windows Firewall log](configure-the-windows-firewall-log.md)
### [Configure the Workstation Authentication Certificate Template](configure-the-workstation-authentication-certificate-template.md) ### [Configure the workstation authentication certificate template](configure-the-workstation-authentication-certificate-template.md)
### [Configure Windows Firewall to Suppress Notifications When a Program Is Blocked](configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md) ### [Configure Windows Firewall to suppress notifications when a program is blocked](configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md)
### [Confirm That Certificates Are Deployed Correctly](confirm-that-certificates-are-deployed-correctly.md) ### [Confirm that certificates are deployed correctly](confirm-that-certificates-are-deployed-correctly.md)
### [Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md) ### [Copy a GPO to create a new GPO](copy-a-gpo-to-create-a-new-gpo.md)
### [Create a Group Account in Active Directory](create-a-group-account-in-active-directory.md) ### [Create a Group Account in Active Directory](create-a-group-account-in-active-directory.md)
### [Create a Group Policy Object](create-a-group-policy-object.md) ### [Create a Group Policy Object](create-a-group-policy-object.md)
### [Create an Authentication Exemption List Rule](create-an-authentication-exemption-list-rule.md) ### [Create an authentication exemption list rule](create-an-authentication-exemption-list-rule.md)
### [Create an Authentication Request Rule](create-an-authentication-request-rule.md) ### [Create an authentication request rule](create-an-authentication-request-rule.md)
### [Create an Inbound ICMP Rule](create-an-inbound-icmp-rule.md) ### [Create an inbound ICMP rule](create-an-inbound-icmp-rule.md)
### [Create an Inbound Port Rule](create-an-inbound-port-rule.md) ### [Create an inbound port rule](create-an-inbound-port-rule.md)
### [Create an Inbound Program or Service Rule](create-an-inbound-program-or-service-rule.md) ### [Create an inbound program or service rule](create-an-inbound-program-or-service-rule.md)
### [Create an Outbound Port Rule](create-an-outbound-port-rule.md) ### [Create an outbound port rule](create-an-outbound-port-rule.md)
### [Create an Outbound Program or Service Rule](create-an-outbound-program-or-service-rule.md) ### [Create an outbound program or service rule](create-an-outbound-program-or-service-rule.md)
### [Create Inbound Rules to Support RPC](create-inbound-rules-to-support-rpc.md) ### [Create inbound rules to support RPC](create-inbound-rules-to-support-rpc.md)
### [Create WMI Filters for the GPO](create-wmi-filters-for-the-gpo.md) ### [Create WMI filters for the GPO](create-wmi-filters-for-the-gpo.md)
### [Create Windows Firewall rules in Intune](create-windows-firewall-rules-in-intune.md) ### [Create Windows Firewall rules in Intune](create-windows-firewall-rules-in-intune.md)
### [Enable Predefined Inbound Rules](enable-predefined-inbound-rules.md) ### [Enable predefined inbound rules](enable-predefined-inbound-rules.md)
### [Enable Predefined Outbound Rules](enable-predefined-outbound-rules.md) ### [Enable predefined outbound rules](enable-predefined-outbound-rules.md)
### [Exempt ICMP from Authentication](exempt-icmp-from-authentication.md) ### [Exempt ICMP from authentication](exempt-icmp-from-authentication.md)
### [Link the GPO to the Domain](link-the-gpo-to-the-domain.md) ### [Link the GPO to the domain](link-the-gpo-to-the-domain.md)
### [Modify GPO Filters](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md) ### [Modify GPO filters](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md)
### [Open IP Security Policies](open-the-group-policy-management-console-to-ip-security-policies.md) ### [Open IP security policies](open-the-group-policy-management-console-to-ip-security-policies.md)
### [Open Group Policy](open-the-group-policy-management-console-to-windows-firewall.md) ### [Open Group Policy](open-the-group-policy-management-console-to-windows-firewall.md)
### [Open Group Policy](open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md) ### [Open Group Policy](open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md)
### [Open Windows Firewall](open-windows-firewall-with-advanced-security.md) ### [Open Windows Firewall](open-windows-firewall-with-advanced-security.md)
### [Restrict Server Access](restrict-server-access-to-members-of-a-group-only.md) ### [Restrict server access](restrict-server-access-to-members-of-a-group-only.md)
### [Enable Windows Firewall](turn-on-windows-firewall-and-configure-default-behavior.md) ### [Enable Windows Firewall](turn-on-windows-firewall-and-configure-default-behavior.md)
### [Verify Network Traffic](verify-that-network-traffic-is-authenticated.md) ### [Verify Network Traffic](verify-that-network-traffic-is-authenticated.md)
### [Verify Network Traffic](verify-that-network-traffic-is-authenticated.md)
## [References]() ## [References]()
### [Checklist: Creating Group Policy Objects](checklist-creating-group-policy-objects.md) ### [Checklist: Creating Group Policy objects](checklist-creating-group-policy-objects.md)
### [Checklist: Creating Inbound Firewall Rules](checklist-creating-inbound-firewall-rules.md) ### [Checklist: Creating inbound firewall rules](checklist-creating-inbound-firewall-rules.md)
### [Checklist: Creating Outbound Firewall Rules](checklist-creating-outbound-firewall-rules.md) ### [Checklist: Creating Outbound Firewall Rules](checklist-creating-outbound-firewall-rules.md)
### [Checklist: Configuring Basic Firewall Settings](checklist-configuring-basic-firewall-settings.md) ### [Checklist: Configuring Basic Firewall Settings](checklist-configuring-basic-firewall-settings.md)
### [Checklist: Configuring Rules for the Isolated Domain](checklist-configuring-rules-for-the-isolated-domain.md) ### [Checklist: Configuring rules for the isolated domain](checklist-configuring-rules-for-the-isolated-domain.md)
### [Checklist: Configuring Rules for the Boundary Zone](checklist-configuring-rules-for-the-boundary-zone.md) ### [Checklist: Configuring rules for the boundary zone](checklist-configuring-rules-for-the-boundary-zone.md)
### [Checklist: Configuring Rules for the Encryption Zone](checklist-configuring-rules-for-the-encryption-zone.md) ### [Checklist: Configuring rules for the encryption zone](checklist-configuring-rules-for-the-encryption-zone.md)
### [Checklist: Configuring Rules for an Isolated Server Zone](checklist-configuring-rules-for-an-isolated-server-zone.md) ### [Checklist: Configuring rules for an isolated server zone](checklist-configuring-rules-for-an-isolated-server-zone.md)
### [Checklist: Configuring Rules for Servers in a Standalone Isolated Server Zone](checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md) ### [Checklist: Configuring rules for servers in a standalone isolated server zone](checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md)
### [Checklist: Creating Rules for Clients of a Standalone Isolated Server Zone](checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md) ### [Checklist: Creating rules for clients of a standalone isolated server zone](checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md)
### [Appendix A: Sample GPO Template Files for Settings Used in this Guide](appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md) ### [Appendix A: Sample GPO template files for settings used in this guide](appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md)
## [Troubleshooting]() ## [Troubleshooting]()
### [Troubleshooting UWP App Connectivity Issues in Windows Firewall](troubleshooting-uwp-firewall.md) ### [Troubleshooting UWP app connectivity issues in Windows Firewall](troubleshooting-uwp-firewall.md)

View File

@ -1,6 +1,6 @@
--- ---
title: Identify Goals for your WFAS Deployment (Windows 10) title: Identify implementation goals for Windows Defender Firewall with Advanced Security Deployment (Windows 10)
description: Identifying Your Windows Defender Firewall with Advanced Security (WFAS) Deployment Goals description: Identifying Your Windows Defender Firewall with Advanced Security (WFAS) implementation goals
ms.assetid: 598cf45e-2e1c-4947-970f-361dfa264bba ms.assetid: 598cf45e-2e1c-4947-970f-361dfa264bba
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp
@ -17,22 +17,21 @@ ms.topic: conceptual
ms.date: 08/17/2017 ms.date: 08/17/2017
--- ---
# Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals # Identifying Windows Defender Firewall with Advanced Security implementation goals
**Applies to** **Applies to**
- Windows 10 - Windows 10
- Windows Server 2016 - Windows Server 2016
Correctly identifying your Windows Defender Firewall with Advanced Security deployment goals is essential for the success of your Windows Defender Firewall design project. Form a project team that can clearly articulate deployment issues in a vision statement. When you write your vision statement, identify, clarify, and refine your deployment goals. Prioritize and, if possible, combine your deployment goals so that you can design and deploy Windows Defender Firewall by using an iterative approach. You can take advantage of the predefined Windows Defender Firewall deployment goals presented in this guide that are relevant to your scenarios. Correctly identifying your Windows Defender Firewall with Advanced Security implementation goals is essential for the success of your Windows Defender Firewall design project. Form a project team that can clearly articulate deployment issues in a vision statement. When you write your vision statement, identify, clarify, and refine your implementation goals. Prioritize and, if possible, combine your implementation goals so that you can design and deploy Windows Defender Firewall by using an iterative approach. You can take advantage of the predefined Windows Defender Firewall implementation goals presented in this guide that are relevant to your scenarios.
The following table lists the three main tasks for articulating, refining, and subsequently documenting your Windows Defender Firewall deployment goals: The following table lists the three main tasks for articulating, refining, and subsequently documenting your Windows Defender Firewall implementation goals:
| Deployment goal tasks | Reference links | | Deployment goal tasks | Reference links |
|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| |--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| Evaluate predefined Windows Defender Firewall with Advanced Security deployment goals that are provided in this section of the guide, and combine one or more goals to reach your organizational objectives. | Predefined deployment goals: <p><ul><li>[Protect Devices from Unwanted Network Traffic](protect-devices-from-unwanted-network-traffic.md)</li><p><li>[Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md)</li> <p><li>[Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md)</li> <p><li>[Restrict Access to Sensitive Resources to Only Specified Users or Devices](restrict-access-to-only-specified-users-or-devices.md)</li></ul> | | Evaluate predefined Windows Defender Firewall with Advanced Security implementation goals that are provided in this section of the guide, and combine one or more goals to reach your organizational objectives. | Predefined implementation goals: <p><ul><li>[Protect Devices from Unwanted Network Traffic](protect-devices-from-unwanted-network-traffic.md)</li><p><li>[Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md)</li> <p><li>[Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md)</li> <p><li>[Restrict Access to Sensitive Resources to Only Specified Users or Devices](restrict-access-to-only-specified-users-or-devices.md)</li></ul> |
| Map one goal or a combination of the predefined deployment goals to an existing Windows Defender Firewall with Advanced Security design. | <ul><li>[Mapping Your Deployment Goals to a Windows Defender Firewall with Advanced Security Design](mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md)</li></ul> | | Map one goal or a combination of the predefined implementation goals to an existing Windows Defender Firewall with Advanced Security design. | <ul><li>[Mapping Your implementation goals to a Windows Defender Firewall with Advanced Security Design](mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md)</li></ul> |
| Based on the status of your current infrastructure, document your deployment goals for your Windows Defender Firewall with Advanced Security design into a deployment plan. | <ul><li>[Designing A Windows Defender Firewall Strategy](designing-a-windows-firewall-with-advanced-security-strategy.md)</li> <p><li>[Planning Your Windows Defender Firewall Design with Advanced Security](planning-your-windows-firewall-with-advanced-security-design.md)</li></ul> | | Based on the status of your current infrastructure, document your implementation goals for your Windows Defender Firewall with Advanced Security design into a deployment plan. | <ul><li>[Designing A Windows Defender Firewall Strategy](designing-a-windows-firewall-with-advanced-security-strategy.md)</li> <p><li>[Planning Your Windows Defender Firewall Design with Advanced Security](planning-your-windows-firewall-with-advanced-security-design.md)</li></ul> |
<br /> <br />

View File

@ -1,5 +1,5 @@
--- ---
title: Protect Devices from Unwanted Network Traffic (Windows 10) title: Protect devices from unwanted network traffic (Windows 10)
description: Protect Devices from Unwanted Network Traffic description: Protect Devices from Unwanted Network Traffic
ms.assetid: 307d2b38-e8c4-4358-ae16-f2143af965dc ms.assetid: 307d2b38-e8c4-4358-ae16-f2143af965dc
ms.reviewer: ms.reviewer:
@ -17,7 +17,7 @@ ms.topic: conceptual
ms.date: 04/19/2017 ms.date: 04/19/2017
--- ---
# Protect Devices from Unwanted Network Traffic # Protect devices from unwanted network traffic
**Applies to** **Applies to**
- Windows 10 - Windows 10

View File

@ -1,6 +1,6 @@
--- ---
title: Restrict Access to Only Trusted Devices (Windows 10) title: Restrict access to only trusted devices (Windows 10)
description: Restrict Access to Only Trusted Devices description: estrict access to only trusted devices
ms.assetid: bc1f49a4-7d54-4857-8af9-b7c79f47273b ms.assetid: bc1f49a4-7d54-4857-8af9-b7c79f47273b
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp
@ -17,7 +17,7 @@ ms.topic: conceptual
ms.date: 08/17/2017 ms.date: 08/17/2017
--- ---
# Restrict Access to Only Trusted Devices # Restrict access to only trusted devices
**Applies to** **Applies to**
- Windows 10 - Windows 10

View File

@ -1,6 +1,6 @@
--- ---
title: Windows Defender Firewall with Advanced Security Design Guide (Windows 10) title: Windows Defender Firewall with Advanced Security design guide (Windows 10)
description: Windows Defender Firewall with Advanced Security Design Guide description: Windows Defender Firewall with Advanced Security design guide
ms.assetid: 5c631389-f232-4b95-9e48-ec02b8677d51 ms.assetid: 5c631389-f232-4b95-9e48-ec02b8677d51
ms.reviewer: ms.reviewer:
ms.author: dansimp ms.author: dansimp
@ -17,8 +17,7 @@ ms.topic: conceptual
ms.date: 10/05/2017 ms.date: 10/05/2017
--- ---
# Windows Defender Firewall with Advanced Security # Windows Defender Firewall with Advanced Security design guide
Design Guide
**Applies to** **Applies to**
- Windows 10 - Windows 10