diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json
index bc0cdbfcb3..2e4f6df9c5 100644
--- a/.openpublishing.redirection.json
+++ b/.openpublishing.redirection.json
@@ -20810,635 +20810,650 @@
"redirect_url": "/microsoft-store",
"redirect_document_id": false
},
+ {
+ "source_path": "windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md",
+ "redirect_url": "/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-architecture",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md",
+ "redirect_url": "/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-configure-using-wsb-file",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md",
+ "redirect_url": "/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview",
+ "redirect_document_id": false
+ },
{
"source_path": "windows/security/information-protection/index.md",
"redirect_url": "/windows/security/encryption-data-protection",
"redirect_document_id": false
},
{
- "source_path": "windows/security/identity-protection/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/identity-protection/vpn/vpn-authentication.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-authentication",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/identity-protection/vpn/vpn-auto-trigger-profile.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-auto-trigger-profile",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/identity-protection/vpn/vpn-conditional-access.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-conditional-access",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/identity-protection/vpn/vpn-connection-type.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-connection-type",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/identity-protection/vpn/vpn-guide.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-guide",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/identity-protection/vpn/vpn-name-resolution.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-name-resolution",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/identity-protection/vpn/vpn-office-365-optimization.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-office-365-optimization",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/identity-protection/vpn/vpn-profile-options.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-profile-options",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/identity-protection/vpn/vpn-routing.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-routing",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/identity-protection/vpn/vpn-security-features.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-security-features",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/assign-security-group-filters-to-the-gpo",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/basic-firewall-policy-design",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/best-practices-configuring.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/best-practices-configuring",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/boundary-zone-gpos",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/boundary-zone.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/boundary-zone",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/certificate-based-isolation-policy-design-example",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/certificate-based-isolation-policy-design",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/change-rules-from-request-to-require-mode",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-basic-firewall-settings",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-boundary-zone",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-encryption-zone",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-isolated-domain",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-group-policy-objects",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-inbound-firewall-rules",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-outbound-firewall-rules",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-basic-firewall-policy-design",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-domain-isolation-policy-design",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/configure-authentication-methods.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-authentication-methods",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-data-protection-quick-mode-settings",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-key-exchange-main-mode-settings",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-the-rules-to-require-encryption",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-the-windows-firewall-log",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-the-workstation-authentication-certificate-template",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/confirm-that-certificates-are-deployed-correctly",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/copy-a-gpo-to-create-a-new-gpo",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-a-group-account-in-active-directory",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-a-group-policy-object",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-authentication-exemption-list-rule",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-authentication-request-rule",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-icmp-rule",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-port-rule",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-program-or-service-rule",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-port-rule",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-program-or-service-rule",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-inbound-rules-to-support-rpc",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/create-windows-firewall-rules-in-intune.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-windows-firewall-rules-in-intune",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-wmi-filters-for-the-gpo",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/determining-the-trusted-state-of-your-devices",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/documenting-the-zones.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/documenting-the-zones",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/domain-isolation-policy-design-example",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/domain-isolation-policy-design",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/enable-predefined-inbound-rules",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/enable-predefined-outbound-rules",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/encryption-zone-gpos",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/encryption-zone.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/encryption-zone",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/exempt-icmp-from-authentication",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/exemption-list.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/exemption-list",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/filter-origin-documentation.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/filter-origin-documentation",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/firewall-gpos.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/firewall-gpos",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/firewall-policy-design-example",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/firewall-settings-lost-on-upgrade",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-active-directory-deployment",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-current-network-infrastructure",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-devices",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-other-relevant-information",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-the-information-you-need",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-boundary",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-encryption",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-firewall",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-isolateddomain-clients",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-isolateddomain-servers",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/isolated-domain-gpos",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/isolated-domain.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/isolated-domain",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/isolating-apps-on-your-network",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/link-the-gpo-to-the-domain",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-windows-firewall",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/open-windows-firewall-with-advanced-security",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-certificate-based-authentication",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-domain-isolation-zones",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-gpo-deployment",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-isolation-groups-for-the-zones",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/planning-network-access-groups.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-network-access-groups",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-server-isolation-zones",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-settings-for-a-basic-firewall-policy",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/planning-the-gpos.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-the-gpos",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-your-windows-firewall-with-advanced-security-design",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/protect-devices-from-unwanted-network-traffic",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/quarantine.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/quarantine",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/require-encryption-when-accessing-sensitive-network-resources",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-specified-users-or-devices",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-trusted-devices",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/restrict-server-access-to-members-of-a-group-only",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/server-isolation-gpos.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-gpos",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design-example",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/troubleshooting-uwp-firewall.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/troubleshooting-uwp-firewall",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/verify-that-network-traffic-is-authenticated",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-deployment-guide",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-design-guide",
- "redirect_document_id": false
- },
- {
- "source_path": "windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md",
- "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security",
- "redirect_document_id": false
- }
+ "source_path": "windows/security/identity-protection/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/identity-protection/vpn/vpn-authentication.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-authentication",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/identity-protection/vpn/vpn-auto-trigger-profile.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-auto-trigger-profile",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/identity-protection/vpn/vpn-conditional-access.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-conditional-access",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/identity-protection/vpn/vpn-connection-type.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-connection-type",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/identity-protection/vpn/vpn-guide.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-guide",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/identity-protection/vpn/vpn-name-resolution.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-name-resolution",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/identity-protection/vpn/vpn-office-365-optimization.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-office-365-optimization",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/identity-protection/vpn/vpn-profile-options.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-profile-options",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/identity-protection/vpn/vpn-routing.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-routing",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/identity-protection/vpn/vpn-security-features.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-security-features",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/assign-security-group-filters-to-the-gpo",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/basic-firewall-policy-design",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/best-practices-configuring.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/best-practices-configuring",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/boundary-zone-gpos",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/boundary-zone.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/boundary-zone",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/certificate-based-isolation-policy-design-example",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/certificate-based-isolation-policy-design",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/change-rules-from-request-to-require-mode",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-basic-firewall-settings",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-boundary-zone",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-encryption-zone",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-isolated-domain",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-group-policy-objects",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-inbound-firewall-rules",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-outbound-firewall-rules",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-basic-firewall-policy-design",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-domain-isolation-policy-design",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/configure-authentication-methods.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-authentication-methods",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-data-protection-quick-mode-settings",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-key-exchange-main-mode-settings",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-the-rules-to-require-encryption",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-the-windows-firewall-log",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-the-workstation-authentication-certificate-template",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/confirm-that-certificates-are-deployed-correctly",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/copy-a-gpo-to-create-a-new-gpo",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-a-group-account-in-active-directory",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-a-group-policy-object",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-authentication-exemption-list-rule",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-authentication-request-rule",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-icmp-rule",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-port-rule",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-program-or-service-rule",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-port-rule",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-program-or-service-rule",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-inbound-rules-to-support-rpc",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/create-windows-firewall-rules-in-intune.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-windows-firewall-rules-in-intune",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-wmi-filters-for-the-gpo",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/determining-the-trusted-state-of-your-devices",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/documenting-the-zones.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/documenting-the-zones",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/domain-isolation-policy-design-example",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/domain-isolation-policy-design",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/enable-predefined-inbound-rules",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/enable-predefined-outbound-rules",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/encryption-zone-gpos",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/encryption-zone.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/encryption-zone",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/exempt-icmp-from-authentication",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/exemption-list.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/exemption-list",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/filter-origin-documentation.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/filter-origin-documentation",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/firewall-gpos.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/firewall-gpos",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/firewall-policy-design-example",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/firewall-settings-lost-on-upgrade",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-active-directory-deployment",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-current-network-infrastructure",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-devices",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-other-relevant-information",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-the-information-you-need",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-boundary",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-encryption",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-firewall",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-isolateddomain-clients",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-isolateddomain-servers",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/isolated-domain-gpos",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/isolated-domain.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/isolated-domain",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/isolating-apps-on-your-network",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/link-the-gpo-to-the-domain",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-windows-firewall",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/open-windows-firewall-with-advanced-security",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-certificate-based-authentication",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-domain-isolation-zones",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-gpo-deployment",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-isolation-groups-for-the-zones",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/planning-network-access-groups.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-network-access-groups",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-server-isolation-zones",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-settings-for-a-basic-firewall-policy",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/planning-the-gpos.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-the-gpos",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-your-windows-firewall-with-advanced-security-design",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/protect-devices-from-unwanted-network-traffic",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/quarantine.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/quarantine",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/require-encryption-when-accessing-sensitive-network-resources",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-specified-users-or-devices",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-trusted-devices",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/restrict-server-access-to-members-of-a-group-only",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/server-isolation-gpos.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-gpos",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design-example",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/troubleshooting-uwp-firewall.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/troubleshooting-uwp-firewall",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/verify-that-network-traffic-is-authenticated",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-deployment-guide",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-design-guide",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md",
+ "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security",
+ "redirect_document_id": false
+ }
]
-}
+}
\ No newline at end of file
diff --git a/windows/security/application-security/application-isolation/toc.yml b/windows/security/application-security/application-isolation/toc.yml
index 8c17971749..cb920b5e4e 100644
--- a/windows/security/application-security/application-isolation/toc.yml
+++ b/windows/security/application-security/application-isolation/toc.yml
@@ -12,9 +12,9 @@ items:
- name: Windows containers π
href: /virtualization/windowscontainers/about
- name: Windows Sandbox
- href: ../../threat-protection/windows-sandbox/windows-sandbox-overview.md
+ href: ./windows-sandbox/windows-sandbox-overview.md
items:
- name: Windows Sandbox architecture
- href: ../../threat-protection/windows-sandbox/windows-sandbox-architecture.md
+ href: ./windows-sandbox/windows-sandbox-architecture.md
- name: Windows Sandbox configuration
- href: ../../threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md
\ No newline at end of file
+ href: ./windows-sandbox/windows-sandbox-configure-using-wsb-file.md
\ No newline at end of file
diff --git a/windows/security/threat-protection/windows-sandbox/images/1-dynamic-host.png b/windows/security/application-security/application-isolation/windows-sandbox/images/1-dynamic-host.png
similarity index 100%
rename from windows/security/threat-protection/windows-sandbox/images/1-dynamic-host.png
rename to windows/security/application-security/application-isolation/windows-sandbox/images/1-dynamic-host.png
diff --git a/windows/security/threat-protection/windows-sandbox/images/2-dynamic-working.png b/windows/security/application-security/application-isolation/windows-sandbox/images/2-dynamic-working.png
similarity index 100%
rename from windows/security/threat-protection/windows-sandbox/images/2-dynamic-working.png
rename to windows/security/application-security/application-isolation/windows-sandbox/images/2-dynamic-working.png
diff --git a/windows/security/threat-protection/windows-sandbox/images/3-memory-sharing.png b/windows/security/application-security/application-isolation/windows-sandbox/images/3-memory-sharing.png
similarity index 100%
rename from windows/security/threat-protection/windows-sandbox/images/3-memory-sharing.png
rename to windows/security/application-security/application-isolation/windows-sandbox/images/3-memory-sharing.png
diff --git a/windows/security/threat-protection/windows-sandbox/images/4-integrated-kernal.png b/windows/security/application-security/application-isolation/windows-sandbox/images/4-integrated-kernal.png
similarity index 100%
rename from windows/security/threat-protection/windows-sandbox/images/4-integrated-kernal.png
rename to windows/security/application-security/application-isolation/windows-sandbox/images/4-integrated-kernal.png
diff --git a/windows/security/threat-protection/windows-sandbox/images/5-wddm-gpu-virtualization.png b/windows/security/application-security/application-isolation/windows-sandbox/images/5-wddm-gpu-virtualization.png
similarity index 100%
rename from windows/security/threat-protection/windows-sandbox/images/5-wddm-gpu-virtualization.png
rename to windows/security/application-security/application-isolation/windows-sandbox/images/5-wddm-gpu-virtualization.png
diff --git a/windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md b/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-architecture.md
similarity index 97%
rename from windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md
rename to windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-architecture.md
index 0dfbc42f89..dac2d9f311 100644
--- a/windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md
+++ b/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-architecture.md
@@ -1,13 +1,8 @@
---
title: Windows Sandbox architecture
description: Windows Sandbox architecture
-ms.prod: windows-client
-author: vinaypamnani-msft
-ms.author: vinpa
-manager: aaroncz
ms.topic: article
-ms.date: 6/30/2022
-ms.technology: itpro-security
+ms.date: 05/25/2023
---
# Windows Sandbox architecture
@@ -19,7 +14,7 @@ Windows Sandbox benefits from new container technology in Windows to achieve a c
Rather than requiring a separate copy of Windows to boot the sandbox, Dynamic Base Image technology uses the copy of Windows already installed on the host.
Most OS files are immutable and can be freely shared with Windows Sandbox. A small subset of operating system files are mutable and can't be shared, so the sandbox base image contains pristine copies of them. A complete Windows image can be constructed from a combination of the sharable immutable files on the host and the pristine copies of the mutable files. With the help of this scheme, Windows Sandbox has a full Windows installation to boot from without needing to download or store an extra copy of Windows.
-
+
Before Windows Sandbox is installed, the dynamic base image package is stored as a compressed 30-MB package. Once it's installed, the dynamic base image occupies about 500 MB of disk space.

@@ -43,7 +38,7 @@ With ordinary virtual machines, the Microsoft hypervisor controls the scheduling

Windows Sandbox employs a unique policy that allows the virtual processors of the Sandbox to be scheduled like host threads. Under this scheme, high-priority tasks on the host can preempt less important work in the Sandbox. This preemption means that the most important work will be prioritized, whether it's on the host or in the container.
-
+
## WDDM GPU virtualization
Hardware accelerated rendering is key to a smooth and responsive user experience, especially for graphics-intensive use cases. Microsoft works with its graphics ecosystem partners to integrate modern graphics virtualization capabilities directly into DirectX and Windows Display Driver Model (WDDM), the driver model used by Windows.
@@ -53,7 +48,7 @@ This feature allows programs running inside the sandbox to compete for GPU resou

To take advantage of these benefits, a system with a compatible GPU and graphics drivers (WDDM 2.5 or newer) is required. Incompatible systems will render apps in Windows Sandbox with Microsoft's CPU-based rendering technology, Windows Advanced Rasterization Platform (WARP).
-
+
## Battery pass-through
Windows Sandbox is also aware of the host's battery state, which allows it to optimize its power consumption. This functionality is critical for technology that is used on laptops, where battery life is often critical.
diff --git a/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md b/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-configure-using-wsb-file.md
similarity index 98%
rename from windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md
rename to windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-configure-using-wsb-file.md
index e9dc1bb0cc..a0d3dc4bea 100644
--- a/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md
+++ b/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-configure-using-wsb-file.md
@@ -1,16 +1,11 @@
---
title: Windows Sandbox configuration
description: Windows Sandbox configuration
-ms.prod: windows-client
-author: vinaypamnani-msft
-ms.author: vinpa
-manager: aaroncz
ms.collection:
- highpri
- tier2
ms.topic: article
-ms.date: 6/30/2022
-ms.technology: itpro-security
+ms.date: 05/25/2023
---
# Windows Sandbox configuration
diff --git a/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md b/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview.md
similarity index 89%
rename from windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md
rename to windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview.md
index 8f3d7bd7de..02bb837f09 100644
--- a/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md
+++ b/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview.md
@@ -1,23 +1,18 @@
---
title: Windows Sandbox
description: Windows Sandbox overview
-ms.prod: windows-client
-author: vinaypamnani-msft
-ms.author: vinpa
-manager: aaroncz
ms.collection:
- highpri
- tier2
ms.topic: article
-ms.date: 6/30/2022
-ms.technology: itpro-security
+ms.date: 05/25/2023
---
# Windows Sandbox
Windows Sandbox provides a lightweight desktop environment to safely run applications in isolation. Software installed inside the Windows Sandbox environment remains "sandboxed" and runs separately from the host machine.
-A sandbox is temporary. When it's closed, all the software and files and the state are deleted. You get a brand-new instance of the sandbox every time you open the application. Note, however, that as of [Windows 11 Build 22509](https://blogs.windows.com/windows-insider/2021/12/01/announcing-windows-11-insider-preview-build-22509/), your data will persist through a restart initiated from inside the virtualized environmentβuseful for installing applications that require the OS to reboot.
+A sandbox is temporary. When it's closed, all the software and files and the state are deleted. You get a brand-new instance of the sandbox every time you open the application. Note, however, that as of Windows 11, version 22H2, your data will persist through a restart initiated from inside the virtualized environmentβuseful for installing applications that require the OS to reboot.
Software and applications installed on the host aren't directly available in the sandbox. If you need specific applications available inside the Windows Sandbox environment, they must be explicitly installed within the environment.
@@ -32,7 +27,7 @@ Windows Sandbox has the following properties:
> [!IMPORTANT]
> Windows Sandbox enables network connection by default. It can be disabled using the [Windows Sandbox configuration file](/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file#networking).
-[!INCLUDE [windows-sandbox](../../../../includes/licensing/windows-sandbox.md)]
+[!INCLUDE [windows-sandbox](../../../../../includes/licensing/windows-sandbox.md)]
## Prerequisites
diff --git a/windows/security/apps.md b/windows/security/apps.md
index cbf8e3d5c8..a2e62786ce 100644
--- a/windows/security/apps.md
+++ b/windows/security/apps.md
@@ -1,7 +1,7 @@
---
title: Windows application security
description: Get an overview of application security in Windows
-ms.reviewer:
+ms.reviewer:
manager: aaroncz
ms.author: paoloma
author: paolomatarazzo
@@ -21,7 +21,6 @@ The following table summarizes the Windows security features and capabilities fo
|:---|:---|
| Windows Defender Application Control | Application control is one of the most effective security controls to prevent unwanted or malicious code from running. It moves away from an application trust model where all code is assumed trustworthy to one where apps must earn trust to run. Learn more: [Application Control for Windows](threat-protection/windows-defender-application-control/windows-defender-application-control.md) |
| Microsoft Defender Application Guard | Application Guard uses chip-based hardware isolation to isolate untrusted websites and untrusted Office files, seamlessly running untrusted websites and files in an isolated Hyper-V-based container, separate from the desktop operating system, and making sure that anything that happens within the container remains isolated from the desktop. Learn more [Microsoft Defender Application Guard overview](threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md). |
-| Windows Sandbox | Windows Sandbox provides a lightweight desktop environment to safely run applications in isolation. Software installed inside the Windows Sandbox environment remains "sandboxed" and runs separately from the host machine. A sandbox is temporary. When it's closed, all the software and files and the state are deleted. You get a brand-new instance of the sandbox every time you open the application. Learn more: [Windows Sandbox](threat-protection\windows-sandbox\windows-sandbox-overview.md)
+| Windows Sandbox | Windows Sandbox provides a lightweight desktop environment to safely run applications in isolation. Software installed inside the Windows Sandbox environment remains "sandboxed" and runs separately from the host machine. A sandbox is temporary. When it's closed, all the software and files and the state are deleted. You get a brand-new instance of the sandbox every time you open the application. Learn more: [Windows Sandbox](application-security/application-isolation/windows-sandbox/windows-sandbox-overview.md) |
| Email Security | With Windows S/MIME email security, users can encrypt outgoing messages and attachments, so only intended recipients with digital identification (ID)βalso called a certificateβcan read them. Users can digitally sign a message, which verifies the identity of the sender and ensures the message has not been tampered with.[Configure S/MIME for Windows 10](identity-protection/configure-s-mime.md) |
| Microsoft Defender SmartScreen | Microsoft Defender SmartScreen protects against phishing or malware websites and applications, and the downloading of potentially malicious files. Learn more: [Microsoft Defender SmartScreen overview](threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md) |
-
diff --git a/windows/security/docfx.json b/windows/security/docfx.json
index d8d58c9943..e387747efd 100644
--- a/windows/security/docfx.json
+++ b/windows/security/docfx.json
@@ -54,10 +54,10 @@
}
},
"contributors_to_exclude": [
- "rjagiewich",
- "traya1",
- "rmca14",
- "claydetels19",
+ "rjagiewich",
+ "traya1",
+ "rmca14",
+ "claydetels19",
"jborsecnik",
"tiburd",
"AngelaMotherofDragons",
@@ -66,68 +66,76 @@
"garycentric",
"beccarobins"
],
- "searchScope": ["Windows 10"]
+ "searchScope": [
+ "Windows 10"
+ ]
},
"fileMetadata": {
- "author":{
+ "author": {
+ "application-security/application-isolation/windows-sandbox/**/*.md": "vinaypamnani-msft",
"identity-protection/**/*.md": "paolomatarazzo",
"operating-system-security/network-security/**/*.md": "paolomatarazzo",
"operating-system-security/network-security/windows-firewall/**/*.md": "ngangulyms"
},
- "ms.author":{
+ "ms.author": {
+ "application-security/application-isolation/windows-sandbox/**/*.md": "vinpa",
"identity-protection/**/*.md": "paoloma",
"operating-system-security/network-security/**/*.md": "paoloma",
"operating-system-security/network-security/windows-firewall/*.md": "nganguly"
},
- "appliesto":{
+ "appliesto": {
+ "application-security/application-isolation/windows-sandbox/**/*.md": [
+ "β
Windows 11",
+ "β
Windows 10"
+ ],
"identity-protection/**/*.md": [
- "β
Windows 11",
- "β
Windows 10"
+ "β
Windows 11",
+ "β
Windows 10"
],
"identity-protection/credential-guard/**/*.md": [
- "β
Windows 11",
- "β
Windows 10",
- "β
Windows Server 2022",
- "β
Windows Server 2019",
- "β
Windows Server 2016"
+ "β
Windows 11",
+ "β
Windows 10",
+ "β
Windows Server 2022",
+ "β
Windows Server 2019",
+ "β
Windows Server 2016"
],
"identity-protection/smart-cards/**/*.md": [
- "β
Windows 11",
- "β
Windows 10",
- "β
Windows Server 2022",
- "β
Windows Server 2019",
- "β
Windows Server 2016"
+ "β
Windows 11",
+ "β
Windows 10",
+ "β
Windows Server 2022",
+ "β
Windows Server 2019",
+ "β
Windows Server 2016"
],
"identity-protection/user-account-control/**/*.md": [
- "β
Windows 11",
- "β
Windows 10",
- "β
Windows Server 2022",
- "β
Windows Server 2019",
- "β
Windows Server 2016"
+ "β
Windows 11",
+ "β
Windows 10",
+ "β
Windows Server 2022",
+ "β
Windows Server 2019",
+ "β
Windows Server 2016"
],
"identity-protection/virtual-smart-cards/**/*.md": [
- "β
Windows 11",
- "β
Windows 10",
- "β
Windows Server 2022",
- "β
Windows Server 2019",
- "β
Windows Server 2016"
+ "β
Windows 11",
+ "β
Windows 10",
+ "β
Windows Server 2022",
+ "β
Windows Server 2019",
+ "β
Windows Server 2016"
],
"operating-system-security/network-security/windows-firewall/**/*.md": [
- "β
Windows 11",
- "β
Windows 10",
- "β
Windows Server 2022",
- "β
Windows Server 2019",
- "β
Windows Server 2016"
+ "β
Windows 11",
+ "β
Windows 10",
+ "β
Windows Server 2022",
+ "β
Windows Server 2019",
+ "β
Windows Server 2016"
]
},
- "ms.reviewer":{
+ "ms.reviewer": {
"identity-protection/hello-for-business/*.md": "erikdau",
"identity-protection/credential-guard/*.md": "zwhittington",
"identity-protection/access-control/*.md": "sulahiri",
"operating-system-security/network-security/windows-firewall/*.md": "paoloma",
"operating-system-security/network-security/vpn/*.md": "pesmith"
},
- "ms.collection":{
+ "ms.collection": {
"identity-protection/hello-for-business/*.md": "tier1",
"information-protection/bitlocker/*.md": "tier1",
"information-protection/personal-data-encryption/*.md": "tier1",
@@ -142,4 +150,4 @@
"dest": "security",
"markdownEngineName": "markdig"
}
-}
+}
\ No newline at end of file
diff --git a/windows/security/index.yml b/windows/security/index.yml
index ce7aece4b4..535f5f269a 100644
--- a/windows/security/index.yml
+++ b/windows/security/index.yml
@@ -90,7 +90,7 @@ landingContent:
- text: Application Guard
url: threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md
- text: Windows Sandbox
- url: threat-protection/windows-sandbox/windows-sandbox-overview.md
+ url: application-security\application-isolation\windows-sandbox\windows-sandbox-overview.md
- text: Microsoft Defender SmartScreen
url: threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md
- text: S/MIME for Windows