. For example, error code 1332 means that “no mapping between account names and security IDs was done”.
+
+**GPO List** \[Type = UnicodeString\]: the list of Group Policy Objects that include “Security Settings” policies, and that were applied with errors to the computer. The format of the list item is: “GROUP\_POLICY\_GUID GROUP\_POLICY\_NAME”.
+
+You can find specific GROUP\_POLICY\_GUID using **Get-GPO** PowerShell cmdlet with “**–Name** GROUP\_POLICY\_NAME” parameter. Row “Id” is the GUID of the Group Policy:
+
+
+
+> **Note** **GUID** is an acronym for 'Globally Unique Identifier'. It is a 128-bit integer number used to identify resources, activities or instances.
+
+## Security Monitoring Recommendations
+
+For 6145(F): One or more errors occurred while processing security policy in the group policy objects.
+
+- This event indicates that Group Policy Objects which were applied to the computer or device had some errors during processing. If you see this event, we recommend checking settings in the GPOs from **GPO List** and resolving the cause of the errors.
+
+- If you have a pre-defined list of Group Policy Objects that contain Security Settings and that must be applied to specific computers, check this event to see if errors occurred when the Security Settings were applied. If so, you can review the error codes and investigate the cause of the failure.
+
+- Typically this event has an informational purpose and the reason is configuration errors in Group Policy’s security settings.
+
+- This event might be used for Group Policy troubleshooting purposes.
+
diff --git a/windows/keep-secure/event-6281.md b/windows/keep-secure/event-6281.md
new file mode 100644
index 0000000000..5f76bd8681
--- /dev/null
+++ b/windows/keep-secure/event-6281.md
@@ -0,0 +1,43 @@
+---
+title: 6281(F) Code Integrity determined that the page hashes of an image file are not valid. (Windows 10)
+description: Describes security event 6281(F) Code Integrity determined that the page hashes of an image file are not valid.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6281(F): Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error.
+
+[Code Integrity](https://technet.microsoft.com/en-us/library/dd348642(v=ws.10).aspx) is a feature that improves the security of the operating system by validating the integrity of a driver or system file each time it is loaded into memory. Code Integrity detects whether an unsigned driver or system file is being loaded into the kernel, or whether a system file has been modified by malicious software that is being run by a user account with administrative permissions. On x64-based versions of the operating system, kernel-mode drivers must be digitally signed.
+
+This event generates when [code Integrity](https://technet.microsoft.com/en-us/library/dd348642(v=ws.10).aspx) determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. This event also generates when signing certificate was revoked. The invalid hashes could indicate a potential disk device error.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit System Integrity](audit-system-integrity.md)
+
+***Event Schema:***
+
+*Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error.*
+
+*File Name:%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- We recommend monitoring for this event, especially on high value assets or computers, because it can be a sign of a software or configuration issue, or a malicious action.
+
diff --git a/windows/keep-secure/event-6400.md b/windows/keep-secure/event-6400.md
new file mode 100644
index 0000000000..814cd9ffca
--- /dev/null
+++ b/windows/keep-secure/event-6400.md
@@ -0,0 +1,39 @@
+---
+title: 6400(-) BranchCache Received an incorrectly formatted response while discovering availability of content. (Windows 10)
+description: Describes security event 6400(-) BranchCache Received an incorrectly formatted response while discovering availability of content.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6400(-): BranchCache: Received an incorrectly formatted response while discovering availability of content.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*BranchCache: Received an incorrectly formatted response while discovering availability of content.*
+
+*IP address of the client that sent this response:%1 *
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6401.md b/windows/keep-secure/event-6401.md
new file mode 100644
index 0000000000..f7d1d86945
--- /dev/null
+++ b/windows/keep-secure/event-6401.md
@@ -0,0 +1,39 @@
+---
+title: 6401(-) BranchCache Received invalid data from a peer. Data discarded. (Windows 10)
+description: Describes security event 6401(-) BranchCache Received invalid data from a peer. Data discarded.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6401(-): BranchCache: Received invalid data from a peer. Data discarded.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*BranchCache: Received invalid data from a peer. Data discarded. *
+
+*IP address of the client that sent this data:%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6402.md b/windows/keep-secure/event-6402.md
new file mode 100644
index 0000000000..95d011d2ac
--- /dev/null
+++ b/windows/keep-secure/event-6402.md
@@ -0,0 +1,39 @@
+---
+title: 6402(-) BranchCache The message to the hosted cache offering it data is incorrectly formatted. (Windows 10)
+description: Describes security event 6402(-) BranchCache The message to the hosted cache offering it data is incorrectly formatted.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6402(-): BranchCache: The message to the hosted cache offering it data is incorrectly formatted.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*BranchCache: The message to the hosted cache offering it data is incorrectly formatted. *
+
+*IP address of the client that sent this message: %1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6403.md b/windows/keep-secure/event-6403.md
new file mode 100644
index 0000000000..bead5c33d0
--- /dev/null
+++ b/windows/keep-secure/event-6403.md
@@ -0,0 +1,39 @@
+---
+title: 6403(-) BranchCache The hosted cache sent an incorrectly formatted response to the client. (Windows 10)
+description: Describes security event 6403(-) BranchCache The hosted cache sent an incorrectly formatted response to the client.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6403(-): BranchCache: The hosted cache sent an incorrectly formatted response to the client.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*BranchCache: The hosted cache sent an incorrectly formatted response to the client’s message to offer it data. *
+
+*Domain name of the hosted cache is:%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6404.md b/windows/keep-secure/event-6404.md
new file mode 100644
index 0000000000..b01dff56dd
--- /dev/null
+++ b/windows/keep-secure/event-6404.md
@@ -0,0 +1,41 @@
+---
+title: 6404(-) BranchCache Hosted cache could not be authenticated using the provisioned SSL certificate. (Windows 10)
+description: Describes security event 6404(-) BranchCache Hosted cache could not be authenticated using the provisioned SSL certificate.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6404(-): BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate. *
+
+*Domain name of the hosted cache:%1*
+
+*Error Code:%2*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6405.md b/windows/keep-secure/event-6405.md
new file mode 100644
index 0000000000..e17b4ca9f4
--- /dev/null
+++ b/windows/keep-secure/event-6405.md
@@ -0,0 +1,37 @@
+---
+title: 6405(-) BranchCache %2 instance(s) of event id %1 occurred. (Windows 10)
+description: Describes security event 6405(-) BranchCache %2 instance(s) of event id %1 occurred.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6405(-): BranchCache: %2 instance(s) of event id %1 occurred.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*BranchCache: %2 instance(s) of event id %1 occurred.*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6406.md b/windows/keep-secure/event-6406.md
new file mode 100644
index 0000000000..0d964b060b
--- /dev/null
+++ b/windows/keep-secure/event-6406.md
@@ -0,0 +1,39 @@
+---
+title: 6406(-) %1 registered to Windows Firewall to control filtering for the following %2. (Windows 10)
+description: Describes security event 6406(-) %1 registered to Windows Firewall to control filtering for the following %2.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6406(-): %1 registered to Windows Firewall to control filtering for the following: %2.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*%1 registered to Windows Firewall to control filtering for the following:*
+
+*%2.*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6407.md b/windows/keep-secure/event-6407.md
new file mode 100644
index 0000000000..98a71f5c1c
--- /dev/null
+++ b/windows/keep-secure/event-6407.md
@@ -0,0 +1,37 @@
+---
+title: 6407(-) 1%. (Windows 10)
+description: Describes security event 6407(-) 1%.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6407(-): 1%.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6408.md b/windows/keep-secure/event-6408.md
new file mode 100644
index 0000000000..29b4a1f469
--- /dev/null
+++ b/windows/keep-secure/event-6408.md
@@ -0,0 +1,37 @@
+---
+title: 6408(-) Registered product %1 failed and Windows Firewall is now controlling the filtering for %2. (Windows 10)
+description: Describes security event 6408(-) Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6408(-): Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6409.md b/windows/keep-secure/event-6409.md
new file mode 100644
index 0000000000..7716be0032
--- /dev/null
+++ b/windows/keep-secure/event-6409.md
@@ -0,0 +1,39 @@
+---
+title: 6409(-) BranchCache A service connection point object could not be parsed. (Windows 10)
+description: Describes security event 6409(-) BranchCache A service connection point object could not be parsed.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6409(-): BranchCache: A service connection point object could not be parsed.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[BranchCache](https://technet.microsoft.com/en-us/library/dd425028.aspx) events are outside the scope of this document.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit Other System Events](audit-other-system-events.md)
+
+***Event Schema:***
+
+*BranchCache: A service connection point object could not be parsed. *
+
+*SCP object GUID: %1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2008 R2, Windows 7.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/event-6410.md b/windows/keep-secure/event-6410.md
new file mode 100644
index 0000000000..b0a4c89708
--- /dev/null
+++ b/windows/keep-secure/event-6410.md
@@ -0,0 +1,43 @@
+---
+title: 6410(F) Code integrity determined that a file does not meet the security requirements to load into a process. (Windows 10)
+description: Describes security event 6410(F) Code integrity determined that a file does not meet the security requirements to load into a process.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6410(F): Code integrity determined that a file does not meet the security requirements to load into a process.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+[Code Integrity](https://technet.microsoft.com/en-us/library/dd348642(v=ws.10).aspx) is a feature that improves the security of the operating system by validating the integrity of a driver or system file each time it is loaded into memory. Code Integrity detects whether an unsigned driver or system file is being loaded into the kernel, or whether a system file has been modified by malicious software that is being run by a user account with administrative permissions. On x64-based versions of the operating system, kernel-mode drivers must be digitally signed.
+
+This event generates due to writable [shared sections](https://msdn.microsoft.com/en-us/library/windows/desktop/cc307397.aspx) being present in a file image.
+
+There is no example of this event in this document.
+
+***Subcategory:*** [Audit System Integrity](audit-system-integrity.md)
+
+***Event Schema:***
+
+*Code integrity determined that a file does not meet the security requirements to load into a process. This could be due to the use of shared sections or other issues.*
+
+*File Name:%1*
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2012 R2, Windows 8.1.
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- We recommend monitoring for this event, especially on high value assets or computers, because it can be a sign of a software or configuration issue, or a malicious action.
+
+
+
diff --git a/windows/keep-secure/event-6416.md b/windows/keep-secure/event-6416.md
new file mode 100644
index 0000000000..9f93d86eb0
--- /dev/null
+++ b/windows/keep-secure/event-6416.md
@@ -0,0 +1,154 @@
+---
+title: 6416(S) A new external device was recognized by the System. (Windows 10)
+description: Describes security event 6416(S) A new external device was recognized by the System.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6416(S): A new external device was recognized by the System.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit PNP Activity](audit-pnp-activity.md)
+
+***Event Description:***
+
+This event generates every time a new external device is recognized by a system.
+
+This event generates, for example, when a new external device is connected or enabled.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 6416
+ 1
+ 0
+ 13316
+ 0
+ 0x8020000000000000
+
+ 436
+
+
+ Security
+ DESKTOP-NFC0HVN
+
+
+-
+ S-1-5-18
+ DESKTOP-NFC0HVN$
+ WORKGROUP
+ 0x3e7
+ SCSI\\Disk&Ven\_Seagate&Prod\_Expansion\\000000
+ Seagate Expansion SCSI Disk Device
+ {4D36E967-E325-11CE-BFC1-08002BE10318}
+ DiskDrive
+ SCSI\\DiskSeagate\_Expansion\_\_\_\_\_\_\_0636 SCSI\\DiskSeagate\_Expansion\_\_\_\_\_\_\_ SCSI\\DiskSeagate\_ SCSI\\Seagate\_Expansion\_\_\_\_\_\_\_0 Seagate\_Expansion\_\_\_\_\_\_\_0 GenDisk
+ SCSI\\Disk SCSI\\RAW
+ Bus Number 0, Target Id 0, LUN 0
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows Server 2016, Windows 10.
+
+***Event Versions:***
+
+- 0 - Windows 10.
+
+- 1 - Windows 10 \[Version 1511\].
+
+ - Added “Device ID” field.
+
+ - Added “Device Name” field.
+
+ - Added “Class Name” field.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that registered the new device. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that registered the new device.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Device ID** \[Type = UnicodeString\] \[Version 1\]: “**Device instance path**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Device Name** \[Type = UnicodeString\] \[Version 1\]: “**Device description**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class ID** \[Type = UnicodeString\]: “**Class Guid**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class Name** \[Type = UnicodeString\] \[Version 1\]: “**Class**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Vendor IDs** \[Type = UnicodeString\]: “**Hardware Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Compatible IDs** \[Type = UnicodeString\]: “**Compatible Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Location Information** \[Type = UnicodeString\]: “**Location information**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+## Security Monitoring Recommendations
+
+For 6416(S): A new external device was recognized by the System.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM.
+
+- You can use this event to track the events and event information shown in the following table by using the listed fields:
+
+| Event and event information to monitor | Field to use |
+|-----------------------------------------------------|----------------------------|
+| Device recognition events, **Device Instance Path** | “**Device ID**” |
+| Device recognition events, **Device Description** | “**Device Name**” |
+| Device recognition events, **Class GUID** | “**Class ID**” |
+| Device recognition events, **Hardware IDs** | “**Vendor IDs**” |
+| Device recognition events, **Compatible IDs** | “**Compatible IDs**” |
+| Device recognition events, **Location information** | “**Location Information**” |
+
diff --git a/windows/keep-secure/event-6419.md b/windows/keep-secure/event-6419.md
new file mode 100644
index 0000000000..b874b2ea54
--- /dev/null
+++ b/windows/keep-secure/event-6419.md
@@ -0,0 +1,142 @@
+---
+title: 6419(S) A request was made to disable a device. (Windows 10)
+description: Describes security event 6419(S) A request was made to disable a device.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6419(S): A request was made to disable a device.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit PNP Activity](audit-pnp-activity.md)
+
+***Event Description:***
+
+This event generates every time when someone made a request to disable a device.
+
+This event doesn’t mean that device was disabled.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 6419
+ 0
+ 0
+ 13316
+ 0
+ 0x8020000000000000
+
+ 483
+
+
+ Security
+ DESKTOP-NFC0HVN
+
+
+-
+ S-1-5-21-2695983153-1310895815-1903476278-1001
+ ladmin
+ DESKTOP-NFC0HVN
+ 0x3fcc7
+ USB\\VID\_138A&PID\_0017\\FFBC12C950A0
+ Synaptics FP Sensors (WBF) (PID=0017)
+ {53D29EF7-377C-4D14-864B-EB3A85769359}
+ Biometric
+ USB\\VID\_138A&PID\_0017&REV\_0078 USB\\VID\_138A&PID\_0017
+ USB\\Class\_FF&SubClass\_00&Prot\_00 USB\\Class\_FF&SubClass\_00 USB\\Class\_FF
+ Port\_\#0002.Hub\_\#0004
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows 10 \[Version 1511\].
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made the request. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made the request.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Device ID** \[Type = UnicodeString\]: “**Device instance path**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Device Name** \[Type = UnicodeString\]: “**Device description**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class ID** \[Type = UnicodeString\]: “**Class Guid**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class Name** \[Type = UnicodeString\]: “**Class**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Hardware IDs** \[Type = UnicodeString\]: “**Hardware Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Compatible IDs** \[Type = UnicodeString\]: “**Compatible Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Location Information** \[Type = UnicodeString\]: “**Location information**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+## Security Monitoring Recommendations
+
+For 6419(S): A request was made to disable a device.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- You can use this event to track the events and event information shown in the following table by using the listed fields:
+
+| Event and event information to monitor | Field to use |
+|---------------------------------------------------|----------------------------|
+| Device disable requests, **Device Instance Path** | “**Device ID**” |
+| Device disable requests, **Device Description** | “**Device Name**” |
+| Device disable requests, **Class GUID** | “**Class ID**” |
+| Device disable requests, **Hardware IDs** | “**Hardware IDs**” |
+| Device disable requests, **Compatible IDs** | “**Compatible IDs**” |
+| Device disable requests, **Location information** | “**Location Information**” |
+
diff --git a/windows/keep-secure/event-6420.md b/windows/keep-secure/event-6420.md
new file mode 100644
index 0000000000..ec339814ea
--- /dev/null
+++ b/windows/keep-secure/event-6420.md
@@ -0,0 +1,140 @@
+---
+title: 6420(S) A device was disabled. (Windows 10)
+description: Describes security event 6420(S) A device was disabled.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6420(S): A device was disabled.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit PNP Activity](audit-pnp-activity.md)
+
+***Event Description:***
+
+This event generates every time specific device was disabled.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 6420
+ 0
+ 0
+ 13316
+ 0
+ 0x8020000000000000
+
+ 484
+
+
+ Security
+ DESKTOP-NFC0HVN
+
+
+-
+ S-1-5-18
+ DESKTOP-NFC0HVN$
+ WORKGROUP
+ 0x3e7
+ USB\\VID\_138A&PID\_0017\\ffbc12c950a0
+ Synaptics FP Sensors (WBF) (PID=0017)
+ {53D29EF7-377C-4D14-864B-EB3A85769359}
+ Biometric
+ USB\\VID\_138A&PID\_0017&REV\_0078 USB\\VID\_138A&PID\_0017
+ USB\\Class\_FF&SubClass\_00&Prot\_00 USB\\Class\_FF&SubClass\_00 USB\\Class\_FF
+ Port\_\#0002.Hub\_\#0004
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows 10 \[Version 1511\].
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that disabled the device. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that disabled the device.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Device ID** \[Type = UnicodeString\]: “**Device instance path**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Device Name** \[Type = UnicodeString\]: “**Device description**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class ID** \[Type = UnicodeString\]: “**Class Guid**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class Name** \[Type = UnicodeString\]: “**Class**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Hardware IDs** \[Type = UnicodeString\]: “**Hardware Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Compatible IDs** \[Type = UnicodeString\]: “**Compatible Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Location Information** \[Type = UnicodeString\]: “**Location information**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+## Security Monitoring Recommendations
+
+For 6420(S): A device was disabled.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- You can use this event to track the events and event information shown in the following table by using the listed fields:
+
+| Event and event information to monitor | Field to use |
+|-------------------------------------------------|----------------------------|
+| Device disable events, **Device Instance Path** | “**Device ID**” |
+| Device disable events, **Device Description** | “**Device Name**” |
+| Device disable events, **Class GUID** | “**Class ID**” |
+| Device disable events, **Hardware IDs** | “**Hardware IDs**” |
+| Device disable events, **Compatible IDs** | “**Compatible IDs**” |
+| Device disable events, **Location information** | “**Location Information**” |
+
diff --git a/windows/keep-secure/event-6421.md b/windows/keep-secure/event-6421.md
new file mode 100644
index 0000000000..ea9ce9c6a5
--- /dev/null
+++ b/windows/keep-secure/event-6421.md
@@ -0,0 +1,142 @@
+---
+title: 6421(S) A request was made to enable a device. (Windows 10)
+description: Describes security event 6421(S) A request was made to enable a device.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6421(S): A request was made to enable a device.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit PNP Activity](audit-pnp-activity.md)
+
+***Event Description:***
+
+This event generates every time when someone made a request to enable a device.
+
+This event doesn’t mean that device was enabled.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 6421
+ 0
+ 0
+ 13316
+ 0
+ 0x8020000000000000
+
+ 485
+
+
+ Security
+ DESKTOP-NFC0HVN
+
+
+-
+ S-1-5-21-2695983153-1310895815-1903476278-1001
+ ladmin
+ DESKTOP-NFC0HVN
+ 0x3fcc7
+ USB\\VID\_138A&PID\_0017\\FFBC12C950A0
+ Synaptics FP Sensors (WBF) (PID=0017)
+ {53D29EF7-377C-4D14-864B-EB3A85769359}
+ Biometric
+ USB\\VID\_138A&PID\_0017&REV\_0078 USB\\VID\_138A&PID\_0017
+ USB\\Class\_FF&SubClass\_00&Prot\_00 USB\\Class\_FF&SubClass\_00 USB\\Class\_FF
+ Port\_\#0002.Hub\_\#0004
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows 10 \[Version 1511\].
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that made the request. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that made the request.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Device ID** \[Type = UnicodeString\]: “**Device instance path**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Device Name** \[Type = UnicodeString\]: “**Device description**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class ID** \[Type = UnicodeString\]: “**Class Guid**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class Name** \[Type = UnicodeString\]: “**Class**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Hardware IDs** \[Type = UnicodeString\]: “**Hardware Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Compatible IDs** \[Type = UnicodeString\]: “**Compatible Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Location Information** \[Type = UnicodeString\]: “**Location information**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+## Security Monitoring Recommendations
+
+For 6421(S): A request was made to enable a device.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- You can use this event to track the events and event information shown in the following table by using the listed fields:
+
+| Event and event information to monitor | Field to use |
+|--------------------------------------------------|----------------------------|
+| Device enable requests, **Device Instance Path** | “**Device ID**” |
+| Device enable requests, **Device Description** | “**Device Name**” |
+| Device enable requests, **Class GUID** | “**Class ID**” |
+| Device enable requests, **Hardware IDs** | “**Hardware IDs**” |
+| Device enable requests, **Compatible IDs** | “**Compatible IDs**” |
+| Device enable requests, **Location information** | “**Location Information**” |
+
diff --git a/windows/keep-secure/event-6422.md b/windows/keep-secure/event-6422.md
new file mode 100644
index 0000000000..fb59fad3bf
--- /dev/null
+++ b/windows/keep-secure/event-6422.md
@@ -0,0 +1,142 @@
+---
+title: 6422(S) A device was enabled. (Windows 10)
+description: Describes security event 6422(S) A device was enabled.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6422(S): A device was enabled.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit PNP Activity](audit-pnp-activity.md)
+
+***Event Description:***
+
+This event generates every time specific device was enabled.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 6422
+ 0
+ 0
+ 13316
+ 0
+ 0x8020000000000000
+
+ 486
+
+
+ Security
+ DESKTOP-NFC0HVN
+
+
+-
+ S-1-5-18
+ DESKTOP-NFC0HVN$
+ WORKGROUP
+ 0x3e7
+ USB\\VID\_138A&PID\_0017\\ffbc12c950a0
+ Synaptics FP Sensors (WBF) (PID=0017)
+ {53D29EF7-377C-4D14-864B-EB3A85769359}
+ Biometric
+ USB\\VID\_138A&PID\_0017&REV\_0078 USB\\VID\_138A&PID\_0017
+ USB\\Class\_FF&SubClass\_00&Prot\_00 USB\\Class\_FF&SubClass\_00 USB\\Class\_FF
+ Port\_\#0002.Hub\_\#0004
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows 10 \[Version 1511\].
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that enabled the device. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that enabled the device.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Device ID** \[Type = UnicodeString\]: “**Device instance path**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Device Name** \[Type = UnicodeString\]: “**Device description**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class ID** \[Type = UnicodeString\]: “**Class Guid**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class Name** \[Type = UnicodeString\]: “**Class**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Hardware IDs** \[Type = UnicodeString\]: “**Hardware Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Compatible IDs** \[Type = UnicodeString\]: “**Compatible Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Location Information** \[Type = UnicodeString\]: “**Location information**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+## Security Monitoring Recommendations
+
+For 6422(S): A device was enabled.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM.
+
+- You can use this event to track the events and event information shown in the following table by using the listed fields:
+
+| Event and event information to monitor | Field to use |
+|------------------------------------------------|----------------------------|
+| Device enable events, **Device Instance Path** | “**Device ID**” |
+| Device enable events, **Device Description** | “**Device Name**” |
+| Device enable events, **Class GUID** | “**Class ID**” |
+| Device enable events, **Hardware IDs** | “**Hardware IDs**” |
+| Device enable events, **Compatible IDs** | “**Compatible IDs**” |
+| Device enable events, **Location information** | “**Location Information**” |
+
diff --git a/windows/keep-secure/event-6423.md b/windows/keep-secure/event-6423.md
new file mode 100644
index 0000000000..09e75dc4cd
--- /dev/null
+++ b/windows/keep-secure/event-6423.md
@@ -0,0 +1,148 @@
+---
+title: 6423(S) The installation of this device is forbidden by system policy. (Windows 10)
+description: Describes security event 6423(S) The installation of this device is forbidden by system policy.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6423(S): The installation of this device is forbidden by system policy.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+
+
+***Subcategory:*** [Audit PNP Activity](audit-pnp-activity.md)
+
+***Event Description:***
+
+This event generates every time installation of this device is forbidden by system policy.
+
+Device installation restriction group policies are located here: **\\Computer Configuration\\Administrative Templates\\System\\Device Installation\\Device Installation Restrictions**. If one of the policies restricts installation of a specific device, this event will be generated.
+
+> **Note** For recommendations, see [Security Monitoring Recommendations](#security-monitoring-recommendations) for this event.
+
+
+
+***Event XML:***
+```
+-
+-
+
+ 6423
+ 0
+ 0
+ 13316
+ 0
+ 0x8020000000000000
+
+ 488
+
+
+ Security
+ DESKTOP-NFC0HVN
+
+
+-
+ S-1-5-18
+ DESKTOP-NFC0HVN$
+ WORKGROUP
+ 0x3e7
+ USB\\VID\_04F3&PID\_012D\\7&1E3A8971&0&2
+ Touchscreen
+ {00000000-0000-0000-0000-000000000000}
+
+ USB\\VID\_04F3&PID\_012D&REV\_0013 USB\\VID\_04F3&PID\_012D
+ USB\\Class\_03&SubClass\_00&Prot\_00 USB\\Class\_03&SubClass\_00 USB\\Class\_03
+ Port\_\#0002.Hub\_\#0004
+
+
+
+```
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows 10 \[Version 1511\].
+
+***Event Versions:*** 0.
+
+***Field Descriptions:***
+
+**Subject:**
+
+- **Security ID** \[Type = SID\]**:** SID of account that forbids the device installation. Event Viewer automatically tries to resolve SIDs and show the account name. If the SID cannot be resolved, you will see the source data in the event.
+
+> **Note** A **security identifier (SID)** is a unique value of variable length used to identify a trustee (security principal). Each account has a unique SID that is issued by an authority, such as an Active Directory domain controller, and stored in a security database. Each time a user logs on, the system retrieves the SID for that user from the database and places it in the access token for that user. The system uses the SID in the access token to identify the user in all subsequent interactions with Windows security. When a SID has been used as the unique identifier for a user or group, it cannot ever be used again to identify another user or group. For more information about SIDs, see [Security Identifiers](https://msdn.microsoft.com/en-us/library/windows/desktop/aa379571(v=vs.85).aspx).
+
+- **Account Name** \[Type = UnicodeString\]**:** the name of the account that forbids the device installation.
+
+- **Account Domain** \[Type = UnicodeString\]**:** subject’s domain or computer name. Formats vary, and include the following:
+
+ - Domain NETBIOS name example: CONTOSO
+
+ - Lowercase full domain name: contoso.local
+
+ - Uppercase full domain name: CONTOSO.LOCAL
+
+ - For some [well-known security principals](https://support.microsoft.com/en-us/kb/243330), such as LOCAL SERVICE or ANONYMOUS LOGON, the value of this field is “NT AUTHORITY”.
+
+ - For local user accounts, this field will contain the name of the computer or device that this account belongs to, for example: “Win81”.
+
+- **Logon ID** \[Type = HexInt64\]**:** hexadecimal value that can help you correlate this event with recent events that might contain the same Logon ID, for example, “[4624](event-4624.md): An account was successfully logged on.”
+
+**Device ID** \[Type = UnicodeString\]: “**Device instance path**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Device Name** \[Type = UnicodeString\]: “**Device description**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class ID** \[Type = UnicodeString\]: “**Class Guid**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Class Name** \[Type = UnicodeString\]: “**Class**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Hardware IDs** \[Type = UnicodeString\]: “**Hardware Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Compatible IDs** \[Type = UnicodeString\]: “**Compatible Ids**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+**Location Information** \[Type = UnicodeString\]: “**Location information**” attribute of device. To see device properties, start Device Manager, open specific device properties, and click “Details”:
+
+
+
+## Security Monitoring Recommendations
+
+For 6423(S): The installation of this device is forbidden by system policy.
+
+> **Important** For this event, also see [Appendix A: Security monitoring recommendations for many audit events](appendix-a-security-monitoring-recommendations-for-many-audit-events.md).
+
+- If you want to track device installation policy violations then you need to track every event of this type.
+
+
+
+- Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM.
+
+- You can use this event to track the policy violations and related information shown in the following table by using the listed fields:
+
+| Policy violation and related information to monitor | Field to use |
+|-----------------------------------------------------------------|----------------------------|
+| Device installation policy violations, **Device Instance Path** | “**Device ID**” |
+| Device installation policy violations, **Device Description** | “**Device Name**” |
+| Device installation policy violations, **Class GUID** | “**Class ID**” |
+| Device installation policy violations, **Hardware IDs** | “**Hardware IDs**” |
+| Device installation policy violations, **Compatible IDs** | “**Compatible IDs**” |
+| Device installation policy violations, **Location information** | “**Location Information**” |
+
diff --git a/windows/keep-secure/event-6424.md b/windows/keep-secure/event-6424.md
new file mode 100644
index 0000000000..a91d282a95
--- /dev/null
+++ b/windows/keep-secure/event-6424.md
@@ -0,0 +1,31 @@
+---
+title: 6424(S) The installation of this device was allowed, after having previously been forbidden by policy. (Windows 10)
+description: Describes security event 6424(S) The installation of this device was allowed, after having previously been forbidden by policy.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# 6424(S): The installation of this device was allowed, after having previously been forbidden by policy.
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+This event occurs rarely, and in some situations may be difficult to reproduce.
+
+***Subcategory:*** [Audit PNP Activity](audit-pnp-activity.md)
+
+***Required Server Roles:*** None.
+
+***Minimum OS Version:*** Windows 10 \[Version 1511\].
+
+***Event Versions:*** 0.
+
+## Security Monitoring Recommendations
+
+- There is no recommendation for this event in this document.
+
diff --git a/windows/keep-secure/exempt-icmp-from-authentication.md b/windows/keep-secure/exempt-icmp-from-authentication.md
new file mode 100644
index 0000000000..a60e483753
--- /dev/null
+++ b/windows/keep-secure/exempt-icmp-from-authentication.md
@@ -0,0 +1,30 @@
+---
+title: Exempt ICMP from Authentication (Windows 10)
+description: Exempt ICMP from Authentication
+ms.assetid: c086c715-8d0c-4eb5-9ea7-2f7635a55548
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Exempt ICMP from Authentication
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+This procedure shows you how to add exemptions for any network traffic that uses the ICMP protocol.
+
+**Administrative credentials**
+
+To complete this procedure, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the GPOs.
+
+To exempt ICMP network traffic from authentication
+
+1. [Open the Group Policy Management Console to Windows Firewall with Advanced Security](open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md).
+
+2. On the main Windows Firewall with Advanced Security page, click **Windows Firewall Properties**.
+
+3. On the **IPsec settings** tab, change **Exempt ICMP from IPsec** to **Yes**, and then click **OK**.
diff --git a/windows/keep-secure/exemption-list.md b/windows/keep-secure/exemption-list.md
new file mode 100644
index 0000000000..3ebf7a465b
--- /dev/null
+++ b/windows/keep-secure/exemption-list.md
@@ -0,0 +1,52 @@
+---
+title: Exemption List (Windows 10)
+description: Exemption List
+ms.assetid: a05e65b4-b48d-44b1-a7f1-3a8ea9c19ed8
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Exemption List
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+When you implement a server and domain isolation security model in your organization, you are likely to find some additional challenges. Key infrastructure servers such as DNS servers and DHCP servers typically must be available to all devicess on the internal network, yet secured from network attacks. However, if they must remain available to all devicess on the network, not just to isolated domain members, then these servers cannot require IPsec for inbound access, nor can they use IPsec transport mode for outbound traffic.
+
+In addition to the infrastructure servers mentioned earlier, there might also be other servers on the network that trusted devices cannot use IPsec to access, which would be added to the exemption list.
+
+Generally, the following conditions are reasons to consider adding a device to the exemption list:
+
+- If the device must be accessed by trusted devices but it does not have a compatible IPsec implementation.
+
+- If the device must provide services to both trusted and untrusted devices, but does not meet the criteria for membership in the boundary zone.
+
+- If the device must be accessed by trusted devices from different isolated domains that do not have an Active Directory trust relationship established with each other.
+
+- If the device is a domain controller running version of Windows earlier than Windows Server 2008, or if any of its clients are running a version of Windows earlier than Windows Vista.
+
+- If the device must support trusted and untrusted devices, but cannot use IPsec to help secure communications to trusted devices.
+
+For large organizations, the list of exemptions might grow very large if all the exemptions are implemented by one connection security rule for the whole domain or for all trusted forests. If you can require all devices in your isolated domain to run at least Windows Vista or Windows Server 2008, you can greatly reduce the size of this list. A large exemption list has several unwanted effects on every device that receives the GPO, including the following:
+
+- Reduces the overall effectiveness of isolation.
+
+- Creates a larger management burden (because of frequent updates).
+
+- Increases the size of the IPsec policy, which means that it consumes more memory and CPU resources, slows down network throughput, and increases the time required to download and apply the GPO containing the IPsec policy.
+
+To keep the number of exemptions as small as possible, you have several options:
+
+- Carefully consider the communications requirements of each isolation zone, especially server-only zones. They might not be required to communicate with every exemption in the domain-level policy for clients.
+
+- Consolidate server functions. If several exempt services can be hosted at one IP address, the number of exemptions is reduced.
+
+- Consolidate exempted hosts on the same subnet. Where network traffic volume allows, you might be able to locate the servers on a subnet that is exempted, instead of using exemptions for each IP address.
+
+As with defining the boundary zone, create a formal process to approve hosts being added to the exemption list. For a model of processing requests for exemptions, see the decision flowchart in the [Boundary Zone](boundary-zone.md) section.
+
+**Next: **[Isolated Domain](isolated-domain.md)
diff --git a/windows/keep-secure/firewall-gpos.md b/windows/keep-secure/firewall-gpos.md
new file mode 100644
index 0000000000..b264a38993
--- /dev/null
+++ b/windows/keep-secure/firewall-gpos.md
@@ -0,0 +1,22 @@
+---
+title: Firewall GPOs (Windows 10)
+description: Firewall GPOs
+ms.assetid: 720645fb-a01f-491e-8d05-c9c6d5e28033
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Firewall GPOs
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+All the devices on Woodgrove Bank's network that run Windows are part of the isolated domain, except domain controllers. To configure firewall rules, the GPO described in this section is linked to the domain container in the Active Directory OU hierarchy, and then filtered by using security group filters and WMI filters.
+
+The GPO created for the example Woodgrove Bank scenario include the following:
+
+- [GPO\_DOMISO\_Firewall](gpo-domiso-firewall.md)
diff --git a/windows/keep-secure/firewall-policy-design-example.md b/windows/keep-secure/firewall-policy-design-example.md
new file mode 100644
index 0000000000..41310314aa
--- /dev/null
+++ b/windows/keep-secure/firewall-policy-design-example.md
@@ -0,0 +1,106 @@
+---
+title: Firewall Policy Design Example (Windows 10)
+description: Firewall Policy Design Example
+ms.assetid: 0dc3bcfe-7a4d-4a15-93a9-64b13bd775a7
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Firewall Policy Design Example
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+In this example, the fictitious company Woodgrove Bank is a financial services institution.
+
+Woodgrove Bank has an Active Directory domain that provides Group Policy-based management for all their Windows devices. The Active Directory domain controllers also host Domain Name System (DNS) for host name resolution. Separate devices host Windows Internet Name Service (WINS) for network basic input/output system (NetBIOS) name resolution. A set of devices that are running UNIX provide the Dynamic Host Configuration Protocol (DHCP) services for automatic IP addressing.
+
+Woodgrove Bank is in the process of migrating their devices from Windows Vista and Windows Server 2008 to Windows 10 and Windows Server 2016 Technical Preview. A significant number of the devices at Woodgrove Bank continue to run Windows Vista and Windows Server 2008. Interoperability between the previous and newer operating systems must be maintained. Wherever possible, security features applied to the newer operating systems must also be applied to the previous operating systems.
+
+A key line-of-business program called WGBank consists of a client program running on most of the desktop devices in the organization. This program accesses several front-end server devices that run the server-side part of WGBank. These front-end servers only do the processing — they do not store the data. The data is stored in several back-end database devices that are running Microsoft SQL Server.
+
+## Design requirements
+
+The network administrators want to implement Windows Firewall with Advanced Security throughout their organization to provide an additional security layer to their overall security strategy. They want to create firewall rules that allow their business programs to operate, while blocking network traffic that is not wanted.
+
+The following illustration shows the traffic protection needs for this design example.
+
+
+
+1. The network infrastructure servers that are running services, such as Active Directory, DNS, DHCP, or WINS, can receive unsolicited inbound requests from network clients. The network clients can receive the responses from the infrastructure servers.
+
+2. The WGBank front-end servers can receive unsolicited inbound traffic from the client devices and the WGBank partner servers. The WGBank client devices and partner servers can receive the response.
+
+3. The WGBank front-end servers can send updated information to the client devices to support real-time display. The clients do not poll for this unsolicited traffic, but must be able to receive it.
+
+4. The WGBank back-end servers can receive SQL query requests from the WGBank front-end servers. The WGBank front-end servers can receive the corresponding responses.
+
+5. There is no direct communications between the client devices and the WGBank back-end devices.
+
+6. There is no unsolicited traffic from the WGBank back-end devices to the WGBank front-end servers.
+
+7. Company policy prohibits the use of peer-to-peer file transfer software. A recent review by the IT staff found that although the perimeter firewall does prevent most of the programs in this category from working, two programs are being used by staff members that do not require an outside server. Firewall rules must block the network traffic created by these programs.
+
+8. The WGBank partner servers can receive inbound requests from partner devices through the Internet.
+
+Other traffic notes:
+
+- Devices are not to receive any unsolicited traffic from any computer other than specifically allowed above.
+
+- Other outbound network traffic from the client devices not specifically identified in this example is permitted.
+
+## Design details
+
+
+Woodgrove Bank uses Active Directory groups and Group Policy Objects to deploy the firewall settings and rules to the devices on their network. They know that they must deploy policies to the following collections of devices:
+
+- Client devices that run Windows 10, Windows 8, or Windows 7
+
+- WGBank front-end servers that run Windows Server 2016 Technical Preview, Windows Server 2012 R2, Windows Server 2012 or Windows Server 2008 R2 (there are none in place yet, but their solution must support adding them)
+
+- WGBank partner servers that run Windows Server 2008
+
+- WGBank back-end SQL Server devices that run Windows Server 2008 (there are none in place yet, but their solution must support adding them)
+
+- Infrastructure servers that run Windows Server 2008
+
+- Active Directory domain controllers that run Windows Server 2008 R2 or Windows Server 2012
+
+- DHCP servers that run the UNIX operating system
+
+After evaluating these sets of devices, and comparing them to the Active Directory organizational unit (OU) structure, Woodgrove Bank network administrators determined that there was not a good one-to-one match between the OUs and the sets. Therefore the firewall GPOs will not be linked directly to OUs that hold the relevant devices. Instead, the GPOs are linked to the domain container in Active Directory, and then WMI and group filters are attached to the GPO to ensure that it is applied to the correct devices.
+
+Setting up groups as described here ensures that you do not have to know what operating system a computer is running before assigning it to a group. A combination of WMI filters and security group filters are used to ensure that members of the group receive the GPO appropriate for the version of Windows running on that computer. For some groups, you might have four or even five GPOs.
+
+The following groups were created by using the Active Directory Users and Computers Microsoft Management Console (MMC) snap-in, and all devices that run Windows were added to the correct groups:
+
+- **CG\_FIREWALL\_ALLCOMPUTERS**. Add the predefined and system managed **Domain computers** group as a member of this group. All members of the FIREWALL\_ALLCOMPUTERS group receive an operating system-specific GPO with the common firewall rules applied to all devices.
+
+ The two device types (client and server) are distinguished by using a WMI filters to ensure that only the policy intended for devices that are running a client version of Windows can be applied to that computer. A similar WMI filter on the server GPO ensures that only devices that are running server versions of Windows can apply that GPO. Each of the GPOs also have security group filters to prevent members of the group FIREWALL\_NO\_DEFAULT from receiving either of these two GPOs.
+
+ - Client devices receive a GPO that configures Windows Firewall with Advanced Security to enforce the default Windows Firewall behavior (allow outbound, block unsolicited inbound). The client default GPO also includes the built-in firewall rule groups Core Networking and File and Printer Sharing. The Core Networking group is enabled for all profiles, whereas the File and Printer Sharing group is enabled for only the Domain and Private profiles. The GPO also includes inbound firewall rules to allow the WGBank front-end server dashboard update traffic, and rules to prevent company-prohibited programs from sending or receiving network traffic, both inbound and outbound.
+
+ - Server devices receive a GPO that includes similar firewall configuration to the client computer GPO. The primary difference is that the rules are enabled for all profiles (not just domain and private). Also, the rules for WGBank dashboard update are not included, because it is not needed on server devices.
+
+ All rules are scoped to allow network traffic only from devices on Woodgrove Bank's corporate network.
+
+- **CG\_FIREWALL\_NO\_DEFAULT**. Members of this group do not receive the default firewall GPO. Devices are added to this group if there is a business requirement for it to be exempted from the default firewall behavior. The use of a group to represent the exceptions instead of the group members directly makes it easier to support the dynamic nature of the client computer population. A new computer joined to the domain is automatically given the appropriate default firewall GPO, unless it is a member of this group.
+
+- **CG\_FIREWALL\_WGB\_FE**. This group contains the computer accounts for all the WGBank front-end server devices. Members of this group receive a GPO that configures Windows Firewall with Advanced Security with inbound firewall rules to allow unsolicited WGBank client traffic. Devices in this group also receive the default firewall GPO.
+
+- **CG\_FIREWALL\_WGB\_SQL**. This group contains the computer accounts for all the WGBank back-end devices that run SQL Server. Members of this group receive a GPO that configures Windows Firewall with Advanced Security with inbound firewall rules to allow the SQL Server program to receive unsolicited queries only from the WGBank front-end servers. Devices in this group also receive the default firewall GPO.
+
+- **CG\_FIREWALL\_BOUNDARY\_WGBANKFE**. This group contains the computer accounts for the servers that host Web services that can be accessed from the Internet. Members of this group receive a GPO that adds an inbound firewall rule to allow inbound HTTP and HTTPS network traffic from any address, including the Internet. Devices in this group also receive the default firewall GPO.
+
+- **CG\_FIREWALL\_WINS**. This group contains the computer accounts for all the WINS server devices. Members of this group receive a GPO that configures Windows Firewall with Advanced Security with an inbound firewall rule to allow unsolicited inbound requests from WINS clients. Devices in this group also receive the default firewall GPO.
+
+- **CG\_FIREWALL\_ADDC**. This group contains all the computer accounts for the Active Directory domain controller server devices. Members of this group receive a GPO that configures Windows Firewall with Advanced Security with inbound firewall rules to allow unsolicited Active Directory client and server-to-server traffic. Devices in this group also receive the default firewall GPO.
+
+In your own design, create a group for each computer role in your organization that requires different or additional firewall rules. For example, file servers and print servers require additional rules to allow the incoming network traffic for those functions. If a function is ordinarily performed on most devices on the network, you might consider adding devices performing those roles to the common default firewall GPO set, unless there is a security reason not to include it there.
+
+**Next: **[Domain Isolation Policy Design Example](domain-isolation-policy-design-example.md)
+
diff --git a/windows/keep-secure/gathering-information-about-your-active-directory-deployment.md b/windows/keep-secure/gathering-information-about-your-active-directory-deployment.md
new file mode 100644
index 0000000000..33727fc9f4
--- /dev/null
+++ b/windows/keep-secure/gathering-information-about-your-active-directory-deployment.md
@@ -0,0 +1,32 @@
+---
+title: Gathering Information about Your Active Directory Deployment (Windows 10)
+description: Gathering Information about Your Active Directory Deployment
+ms.assetid: b591b85b-12ac-4329-a47e-bc1b03e66eb0
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Gathering Information about Your Active Directory Deployment
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+Active Directory is another important item about which you must gather information. You must understand the forest structure. This includes domain layout, organizational unit (OU) architecture, and site topology. This information makes it possible to know where devices are currently placed, their configuration, and the impact of changes to Active Directory that result from implementing Windows Firewall with Advanced Security. Review the following list for information needed:
+
+- **Names and number of forests**. The forest (not the domain) is the security boundary in an Active Directory implementation. You must understand the current Active Directory architecture to determine the most effective strategy for deploying your firewall and connection security rules using Group Policy. It also enables you to understand which devices can be isolated and how best to accomplish the required degree of isolation.
+
+- **Names and number of domains**. Authentication in server and domain isolation uses the IKE negotiation process with the Kerberos V5 protocol. This protocol assumes that devices are domain members.
+
+- **Number and types of trusts**. Trusts affect the logical boundaries of domain isolation and define whether IKE negotiation can occur between devices in different Active Directory domains.
+
+- **Names and number of sites**. Site architecture is usually aligned with the network topology. Understanding how sites are defined in Active Directory will help provide insight into replication and other details. Site architecture can provide a better understanding of the current Active Directory deployment.
+
+- **OU structure**. OUs are logical constructs and can therefore be molded to fit many different requirements and goals. The OU structure is an ideal place to examine how Group Policy is currently used and how the OUs are laid out. You do not have to redesign an already implemented OU structure in order to effectively deploy firewall and connection security policy, but an understanding of the structure helps you know what WMI or group filtering is required to apply each GPO to the correct devices.
+
+- **Existing IPsec policy**. Because this project culminates in the implementation of IPsec policy, you must understand how the network currently uses IPsec (if at all). Windows Firewall with Advanced Security connection security rules for versions of Windows prior to Windows Vista and Windows Server 2008 are not compatible with earlier versions of Windows. If you already have IPsec policies deployed to devices running Windows XP and Windows Server 2003 in your organization, you must ensure that the new IPsec policies you deploy enable devices using either the old or new IPsec policies to communicate with each other.
+
+**Next: **[Gathering Information about Your Devices](gathering-information-about-your-devices.md)
diff --git a/windows/keep-secure/gathering-information-about-your-current-network-infrastructure.md b/windows/keep-secure/gathering-information-about-your-current-network-infrastructure.md
new file mode 100644
index 0000000000..65555cc782
--- /dev/null
+++ b/windows/keep-secure/gathering-information-about-your-current-network-infrastructure.md
@@ -0,0 +1,113 @@
+---
+title: Gathering Information about Your Current Network Infrastructure (Windows 10)
+description: Gathering Information about Your Current Network Infrastructure
+ms.assetid: f98d2b17-e71d-4ffc-b076-118b4d4782f9
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Gathering Information about Your Current Network Infrastructure
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+Perhaps the most important aspect of planning for Windows Firewall with Advanced Security deployment is the network architecture, because IPsec is layered on the Internet Protocol itself. An incomplete or inaccurate understanding of the network can prevent any Windows Firewall with Advanced Security solution from being successful. Understanding subnet layout, IP addressing schemes, and traffic patterns are part of this effort, but accurately documenting the following components are important to completing the planning phase of this project:
+
+- **Network segmentation**. This includes IP addressing maps, showing how your routers separate each network segment. It includes information about how the routers are configured, and what security filters they impose on network traffic flowing through them.
+
+- Network address translation (NAT). NAT is a means of separating network segments by using a device that maps all of the IP addresses on one side of the device to a single IP address accessible on the other side.
+
+- Network infrastructure devices. This includes the routers, switches, hubs, and other network equipment that makes communications between the devices on the network possible.
+
+- **Current network traffic model.** This includes the quantity and the characteristics of the network traffic flowing through your network.
+
+- Intrusion Detection System (IDS) devices. You will need to identify if you have any IDS devices on your network that might be negatively impacted by any encryption introduced in an Encryption Zone.
+
+The goal is to have enough information to be able to identify an asset by its network location, in addition to its physical location.
+
+Do not use a complex and poorly documented network as a starting point for the design, because it can leave too many unidentified areas that are likely to cause problems during implementation.
+
+This guidance helps obtain the most relevant information for planning Windows Firewall with Advanced Security implementation, but it does not try to address other issues, such as TCP/IP addressing or virtual local area network (VLAN) segmentation.
+
+## Network segmentation
+
+
+If your organization does not have its current network architecture documented and available for reference, such documentation should be obtained as soon as possible before you continue with the design and deployment. If the documented information is not current or has not been validated recently, you have two options:
+
+- Accept that the lack of accurate information can cause risk to the project.
+
+- Undertake a discovery project, either through manual processes or with network analysis tools that can provide the information you need to document the current network topology.
+
+Although the required information can be presented in many different ways, a series of schematic diagrams is often the most effective method of illustrating and understanding the current network configuration. When creating network diagrams, do not include too much information. If necessary, use multiple diagrams that show different layers of detail. Use a top-level diagram that illustrates the major sites that make up your organization's network, and then break out each site into a more detailed diagram that captures a deeper level of detail. Continue until you reach the individual IP subnet level, and so have the means to identify the network location of every device in your organization.
+
+During this process, you might discover some network applications and services that are not compatible with IPsec. For example, IPsec breaks network-based prioritization and port/protocol-based traffic management. If traffic management or prioritization must be based on ports or protocol, the host itself must be able to perform any traffic management or prioritization.
+
+Other examples of incompatibility include:
+
+- Cisco NetFlow on routers cannot analyze packets between IPsec members based on protocol or port.
+
+- Router-based Quality of Service (QoS) cannot use ports or protocols to prioritize traffic. However, using firewall rules that specify IP addresses to prioritize traffic are not affected by this limitation of QoS. For example, a rule that says "From anyone to anyone using port 80 prioritize" does not work, but a rule that says "From anyone to 10.0.1.10 prioritize" works.
+
+- Weighted Fair Queuing and other flow-based router traffic priority methods might fail.
+
+- Devices that do not support or allow IP protocol 50, the port that is used by Encapsulating Security Payload (ESP).
+
+- Router access control lists (ACLs) cannot examine protocol and port fields in ESP-encrypted packets, and therefore the packets are dropped. ACLs based only on IP address are forwarded as usual. If the device cannot parse ESP, any ACLs that specify port or protocol rules will not be processed on the ESP packets. If the device has an ESP parser and uses encryption, ACLs that specify port or protocol rules will not be processed on the ESP packets.
+
+- Network monitoring tools might be unable to parse ESP packets that are not encrypted (ESP-Null).
+
+ >**Note:** Microsoft Message Analyzer can help in troubleshooting of unencrypted IPsec packets. The latest version of Message Analyzer is available on the [Microsoft Download Center](http://www.microsoft.com/download/details.aspx?id=44226).
+
+## Network address translation (NAT)
+
+IPsec NAT traversal (NAT-T) enables IPsec peers that are behind NATs to detect the presence of NATs, negotiate IPsec security associations (SAs), and send ESP-protected data even though the addresses in the IPsec-protected IPv4 packets change. IPsec NAT-T does not support the use of AH across NAT devices.
+
+## Network infrastructure devices
+
+The devices that make up the network infrastructure (routers, switches, load balancers, and firewalls) must be able communicate using IPsec after the solution is implemented. For this reason, you have to examine the following characteristics of these network devices to ensure that they can handle the technical and physical requirements of the design:
+
+- **Make/model**. You can use this information to determine the features that the device supports. In addition, check the BIOS version or software running on the device to ensure that IPsec is supported.
+
+- **Amount of RAM**. This information is useful when you are analyzing capacity or the impact of IPsec on the device.
+
+- **Traffic analysis**. Information, such as peak usage and daily orweekly trends, is helpful to have. The information helps provide a baseline snapshot of the device and how it is used over time. If problems occur after IPsec is implemented, the information can help determine whether the root cause is related to greater usage of the device.
+
+- **Router ACLs that affect IPsec directly**. ACLs directly affect the ability of specific protocols to function. For example, blocking the Kerberos V5 protocol (UDP and TCP port 88) or IP protocol 50 or 51 prevents IPsec from working. Devices must also be configured to allow IKE traffic (UDP port 500) if using NAT-T (UDP port 4500).
+
+- **Networks/subnets connected to device interfaces**. This information provides the best picture of what the internal network looks like. Defining the boundary of subnets based on an address range is straightforward and helps identify whether other addresses are either unmanaged or foreign to the internal network (such as IP addresses on the Internet).
+
+- **VLAN segmentation**. Determining how VLANs are implemented on the network can help you understand traffic patterns and security requirements, and then help to determine how IPsec might augment or interfere with these requirements.
+
+- **The maximum transmission unit (MTU) size on device interface(s)**. The MTU defines the largest datagram that can be transmitted on a particular interface without being divided into smaller pieces for transmission (a process also known as *fragmentation*). In IPsec communications, the MTU is necessary to anticipate when fragmentation occurs. Packet fragmentation must be tracked for Internet Security Association and Key Management Protocol (ISAKMP) by the router. IPsec configures the MTU size on the session to the minimum-discovered MTU size along the communication path being used, and then set the Don't Fragment bit (DF bit) to 1.
+
+ >**Note:** If Path MTU (PMTU) discovery is enabled and functioning correctly, you do not have to gather the MTU size on device interfaces. Although sources, such as the Windows Server 2003 Hardening Guide, recommend disabling PMTU discovery, it must be enabled for IPsec to function correctly.
+
+- **Intrusion detection system (IDS) in use**. Your IDS must have an IPsec-compatible parser to detect ESP packets. If the IDS does not have such a parser, it cannot determine if data in those packets is encrypted.
+
+After you obtain this information, you can quickly determine whether you must upgrade the devices to support the requirements of the project, change the ACLs, or take other measures to ensure that the devices can handle the loads needed.
+
+## Current network traffic model
+
+After gathering the addressing and network infrastructure information, the next step is to examine the communications flow. For example, if a department such as Human Resources (HR) spans several buildings, and you want to use server isolation with encryption to help protect information in that department, you must know how those buildings are connected to determine the level of "trust" to place in the connection. A highly secured building that is connected by an unprotected cable to another building that is not secured can be compromised by an eavesdropping or information replay attack. If such an attack is considered a threat, IPsec can help by providing strong mutual authentication and traffic encryption for trusted hosts. IPsec allows you to more securely communicate across untrusted links such as the Internet.
+
+When you examine traffic flow, look closely at how all managed and unmanaged devices interact. This includes non-Windows-based devices running Linux, UNIX, and Macintosh. Ask yourself such questions as:
+
+- Do specific communications occur at the port and protocol level, or are there many sessions between the same hosts across many protocols?
+
+- How do servers and clients communicate with each other?
+
+- Are there security devices or projects currently implemented or planned that could affect an isolation deployment? For example, if you use Windows Firewall on your devices to "lock down" specific ports, such as UDP 500, IKE negotiations fail.
+
+Some of the more common applications and protocols are as follows:
+
+- **NetBIOS over TCP/IP (NetBT) and server message block (SMB)**. On a LAN, it is common to have ports 137, 138, and 139 enabled for NetBT and port 445 enabled for SMB. These ports provide NetBIOS name resolution services and other features. Unfortunately, they also allow the creation of *null sessions*. A null session is a session that is established on a host that does not use the security context of a known user or entity. Frequently, these sessions are anonymous.
+
+- **Remote procedure call (RPC)**. RPC operates by listening on a port known as the *endpoint mapper*, TCP port 135. The response to a query on this port is an instruction to begin communication on another port in the ephemeral range (ports numbered over 1024). In a network that is segmented by firewalls, RPC communication presents a configuration challenge because it means opening the RPC listener port and all ports greater than 1024. Opening so many ports increases the attack surface of the whole network and reduces the effectiveness of the firewalls. Because many applications depend on RPC for basic functionality, any firewall and connection security policy must take RPC requirements into account.
+
+- **Other traffic**. Windows Firewall with Advanced Security can help secure transmissions between devices by providing authentication of the packets in addition to encrypting the data that they contain. The important thing to do is to identify what must be protected, and the threats that must be mitigated. Examine and model other traffic or traffic types that must be secured.
+
+**Next: **[Gathering Information about Your Active Directory Deployment](gathering-information-about-your-active-directory-deployment.md)
diff --git a/windows/keep-secure/gathering-information-about-your-devices.md b/windows/keep-secure/gathering-information-about-your-devices.md
new file mode 100644
index 0000000000..1f3b73fa21
--- /dev/null
+++ b/windows/keep-secure/gathering-information-about-your-devices.md
@@ -0,0 +1,54 @@
+---
+title: Gathering Information about Your Devices (Windows 10)
+description: Gathering Information about Your Devices
+ms.assetid: 7f7cd3b9-de8e-4fbf-89c6-3d1a47bc2beb
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Gathering Information about Your Devices
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+One of the most valuable benefits of conducting an asset discovery project is the large amount of data that is obtained about the client and server devices on the network. When you start designing and planning your isolation zones, you must make decisions that require accurate information about the state of all hosts to ensure that they can use IPsec as planned.
+
+Capture the following information from each device:
+
+- **Computer name**. This name is the device's NetBIOS or DNS name that identifies the device on the network. Because a device can have more than one media access control (MAC) or IP address, the device's name is one of the criteria that can be used to determine uniqueness on the network. Because device names can be duplicated under some circumstances, the uniqueness should not be considered absolute.
+
+- **IP address for each network adapter**. The IP address is the address that is used with the subnet mask to identify a host on the network. An IP address is not an effective way to identify an asset because it is often subject to change.
+
+- **Operating system, service pack, and hotfix versions**. The operating system version is a key factor in determining the ability of a host to communicate by using IPsec. It is also important to track the current state of service packs and updates that might be installed, because these are often used to determine that minimum security standards have been met.
+
+- **Domain membership**. This information is used to determine whether a device can obtain IPsec policy from Active Directory or whether it must use a local IPsec policy.
+
+- **Physical location**. This information is just the location of the device in your organization. It can be used to determine whether a device can participate in a specific isolation group based on its location or the location of the devices that it communicates with regularly.
+
+- **Hardware type or role**. Some tools that perform host discovery can provide this information by querying the hardware information and running applications to determine its type, such as server, workstation, or portable device. You can use this information to determine the appropriate IPsec policy to assign, whether a specific device can participate in isolation, and in which isolation group to include the device.
+
+After collecting all this information and consolidating it into a database, perform regular discovery efforts periodically to keep the information current. You need the most complete and up-to-date picture of the managed hosts on their networks to create a design that matches your organization's requirements.
+
+You can use various methods to gather data from the hosts on the network. These methods range from high-end, fully automated systems to completely manual data collection. Generally, the use of automated methods to gather data is preferred over manual methods for reasons of speed and accuracy.
+
+## Automated Discovery
+
+Using an automated auditing network management system provides valuable information about the current state of the IT infrastructure.
+
+
+## Manual Discovery
+
+
+The biggest difference between manual discovery methods and automated methods is time.
+
+You can use Windows PowerShell to create a script file that can collect the system configuration information. For more information, see [Windows PowerShell Scripting](http://go.microsoft.com/fwlink/?linkid=110413).
+
+Whether you use an automatic, manual, or hybrid option to gather the information, one of the biggest issues that can cause problems to the design is capturing the changes between the original inventory scan and the point at which the implementation is ready to start. After the first scan has been completed, make support staff aware that all additional changes must be recorded and the updates noted in the inventory.
+
+This inventory will be critical for planning and implementing your Windows Firewall with Advanced Security design.
+
+**Next: **[Gathering Other Relevant Information](gathering-other-relevant-information.md)
diff --git a/windows/keep-secure/gathering-other-relevant-information.md b/windows/keep-secure/gathering-other-relevant-information.md
new file mode 100644
index 0000000000..ca8d396fcb
--- /dev/null
+++ b/windows/keep-secure/gathering-other-relevant-information.md
@@ -0,0 +1,77 @@
+---
+title: Gathering Other Relevant Information (Windows 10)
+description: Gathering Other Relevant Information
+ms.assetid: 87ccca07-4346-496b-876d-cdde57d0ce17
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Gathering Other Relevant Information
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+This topic discusses several other things that you should examine to see whether they will cause any complications in your ability to deploy Windows Firewall with Advanced Security policies in your organization.
+
+## Capacity considerations
+
+Because IPsec uses mathematically intensive cryptographic techniques, it can consume significant overhead on a device. Areas to watch:
+
+- **Encryption.** You might use 256-bit Advanced Encryption Standard (AES-256) and 384-bit Secure Hash Algorithm (SHA-384) to check integrity in situations that require the strongest available encryption and key exchange protection. If you have NICs that support IPsec Task Offload, you can reduce the effect that encryption has on network throughput. For more information, see [IPsec Task Offload](http://technet.microsoft.com/network/dd277647.aspx).
+
+- **Security association (SA) negotiation.** You can use a shorter lifetime for the main mode SA, such as three hours, but then you might need to make tradeoffs. Because each main mode SA occupies approximately 5 KB of RAM, situations in which a server brokers tens of thousands of concurrent connections can lead to overutilization.
+
+- **NAT devices.** As discussed earlier, NAT does not allow Authentication Header (AH) conversations between hosts. If NAT devices exist on the internal network, ESP must be selected instead of AH.
+
+- **Switches and routers.** Proper capacity planning for the implementation of IPsec is more about thorough testing and expected traffic loads than exact calculations. You might have to upgrade or reconfigure switches or routers that currently exceed 75 percent usage to allow for increased traffic on the device and still provide some extra usage for bursts of traffic.
+
+- **Other factors.** These include CPU usage on network infrastructure servers, increased overhead on servers and workstations running IPsec (especially servers, because they usually contain more main mode SAs than clients), and increased network latency because of IPsec negotiation.
+
+ >**Note:** When Microsoft deployed its own domain isolation solution, it found a one to three percent increase in usage on the network as a direct result of IPsec.
+
+## Group Policy deployment groups and WMI filters
+
+You do not have to rearrange the organization unit (OU) hierarchy of your Active Directory domains to effectively deploy Windows Firewall with Advanced Security GPOs. Instead, you can link your GPOs at the domain level (or another high level container), and then use security group filtering or WMI filtering to ensure that only the appropriate devices or users can apply the GPO settings. We recommend that you use WMI filtering to dynamically ensure that GPOs apply only to devices that are running the correct operating system. It is not necessary to use this technique if your network consists of devices.
+
+## Different Active Directory trust environments
+
+When you design a domain isolation policy, consider any logical boundaries that might affect IPsec-secured communications. For example, the trust relationships between your domains and forests are critical in determining an appropriate IKE authentication method.
+
+Kerberos V5 authentication is recommended for use in a two-way (mutual) domain and forest trust environment. You can use Kerberos V5 for IKE authentication across domains that have two-way trusts established, if the domains are in the same forest or different forests. If the two domains are in different forests, you must configure two external trusts, one for each direction, between the domains. The external trusts must use the fully qualified domain name (FQDN) of the domains, and IPsec policy must allow an IKE initiator in one domain to communicate with any domain controller in the forest domain hierarchy, so that the initiator can obtain a Kerberos V5 ticket from a domain controller in the responder’s domain. If firewalls separate the domains then you must configure the firewall to allow Kerberos V5 traffic over UDP destination port 88, TCP destination port 88, and UDP destination port 389.
+
+If the use of Kerberos V5 authentication is not possible because two-way trusts across forests cannot be established as in some large enterprise environments, you can use a public key infrastructure (PKI) and digital certificates to establish IPsec-trusted communication.
+
+## Creating firewall rules to permit IKE, AH, and ESP traffic
+
+
+In some cases, IPsec-secured traffic might have to pass through a router, perimeter firewall, or other filtering device. In the case of a router, unless the router filters TCP and UDP traffic or other upper-level protocol headers, no special configuration is required to allow the IPsec traffic to be forwarded.
+
+In the case of a filtering router or a firewall, you must configure these devices to allow IPsec traffic to be forwarded. Configure the firewall to allow IPsec traffic on UDP source and destination port 500 (IKE), UDP source and destination port 4500 (IPsec NAT-T), and IP Protocol 50 (ESP). You might also have to configure the firewall to allow IPsec traffic on IP protocol 51 (AH) to allow troubleshooting by IPsec administrators and to allow the IPsec traffic to be inspected.
+
+For more info, see [How to Enable IPsec Traffic Through a Firewall](http://go.microsoft.com/fwlink/?LinkId=45085).
+
+## Network load balancing and server clusters
+
+There are challenges implementing connection security for network traffic going to and from network load balancing (NLB) clusters and server clusters. NLB enables multiple servers to be clustered together to provide high availability for a service by providing automatic failover to other nodes in the cluster. Because IPsec matches a security association to a specific device, it prevents different devices from handling the same client connection. If a different node in the cluster responds to an IPsec connection that was originally established by another node, the traffic will be dropped by the client device as untrusted.
+
+This means that NLB in "no affinity" mode is not supported by IPsec at all. If you must use "no affinity" mode in the cluster then consider including the servers that make up the cluster in your IPsec exemption group, and allowing clients to communicate with the servers without IPsec.
+
+When a TCP connection is dropped because of a cluster node failover, IPsec detects the TCP connection failure and removes the IPsec SAs for that connection. When the new TCP connection is established to another node, IPsec can negotiate new SAs immediately without having to wait for the obsolete SAs to time out.
+
+## Network inspection technologies
+
+Within a TCP/IP packet, IPsec without encryption changes the offsets for the destination ports and protocols. These changes can adversely affect applications that are running on network devices such as routers that monitor and manage traffic on the network. While some network applications have been updated to support IPsec, some are not yet compatible. Check with the vendor of your device to see whether the changes in the protocol and port fields caused by IPsec are compatible with the device.
+
+Any device designed to view network traffic, such as hardware protocol analyzers or Microsoft Network Monitor, cannot parse ESP-encrypted traffic. Only the destination device, with which the originating device negotiated the connection, can decrypt the traffic.
+
+In general, IPsec defeats network-based prioritization and port- or protocol-based traffic management. For encrypted packets, there is no workaround; the host itself must handle any traffic management functions. For unencrypted, authenticated-only packets, the devices and applications must be aware of how IPsec changes packets to be able to do anything with them other than route them to the correct host. If you cannot upgrade monitoring or management devices to support IPsec, it is important that you record this information and figure it into your domain or server isolation design.
+
+Network Monitor includes parsers for the ISAKMP (IKE), AH, and ESP protocols. Network Monitor parsers for ESP can parse inside the ESP packet only if ESP null-encryption is being used. Network Monitor cannot parse the encrypted parts of IPsec ESP traffic when encryption is performed in software. However, if encryption is performed by an IPsec hardware offload network adapter, the ESP packets can be decrypted when Network Monitor captures them on either the source or the destination and, therefore, they can be parsed. To diagnose ESP software-encrypted communication, you must disable ESP encryption and use ESP-null encryption by changing the IPsec policy or connection security rule on both devices.
+
+Message Analyzer is available on the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=44226).
+
+**Next: **[Determining the Trusted State of Your Devices](determining-the-trusted-state-of-your-devices.md)
diff --git a/windows/keep-secure/gathering-the-information-you-need.md b/windows/keep-secure/gathering-the-information-you-need.md
new file mode 100644
index 0000000000..3e8a62b0cc
--- /dev/null
+++ b/windows/keep-secure/gathering-the-information-you-need.md
@@ -0,0 +1,28 @@
+---
+title: Gathering the Information You Need (Windows 10)
+description: Gathering the Information You Need
+ms.assetid: 545fef02-5725-4b1e-b67a-a32d94c27d15
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Gathering the Information You Need
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+Before starting the planning process for a Windows Firewall with Advanced Security deployment, you must collect and analyze up-to-date information about the network, the directory services, and the devices that are already deployed in the organization. This information enables you to create a design that accounts for all possible elements of the existing infrastructure. If the gathered information is not accurate, problems can occur when devices and devices that were not considered during the planning phase are encountered during implementation.
+
+Review each of the following topics for guidance about the kinds of information that you must gather:
+
+- [Gathering Information about Your Current Network Infrastructure](gathering-information-about-your-current-network-infrastructure.md)
+
+- [Gathering Information about Your Active Directory Deployment](gathering-information-about-your-active-directory-deployment.md)
+
+- [Gathering Information about Your Devices](gathering-information-about-your-devices.md)
+
+- [Gathering Other Relevant Information](gathering-other-relevant-information.md)
diff --git a/windows/keep-secure/gpo-domiso-boundary.md b/windows/keep-secure/gpo-domiso-boundary.md
new file mode 100644
index 0000000000..22db5273b8
--- /dev/null
+++ b/windows/keep-secure/gpo-domiso-boundary.md
@@ -0,0 +1,43 @@
+---
+title: GPO\_DOMISO\_Boundary (Windows 10)
+description: GPO\_DOMISO\_Boundary
+ms.assetid: ead3a510-c329-4c2a-9ad2-46a3b4975cfd
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# GPO\_DOMISO\_Boundary
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+This GPO is authored by using the Windows Firewall with Advanced Security interface in the Group Policy editing tools. Woodgrove Bank began by copying and pasting the GPO for the Windows Server 2008 version of the isolated domain GPO, and then renamed the copy to reflect its new purpose.
+
+This GPO supports the ability for devices that are not part of the isolated domain to access specific servers that must be available to those untrusted devices. It is intended to only apply to server devices that are running at least Windows Server 2008.
+
+## IPsec settings
+
+The copied GPO includes and continues to use the IPsec settings that configure key exchange, main mode, and quick mode algorithms for the isolated domain when authentication can be used.
+
+## Connection security rules
+
+
+Rename the **Isolated Domain Rule** to **Boundary Zone Rule**. Change the authentication mode to **Request inbound and request outbound**. In this mode, the device uses authentication when it can, such as during communication with a member of the isolated domain. It also supports the "fall back to clear" ability of request mode when an untrusted device that is not part of the isolated domain connects.
+
+## Registry settings
+
+
+The boundary zone uses the same registry settings as the isolated domain to optimize IPsec operation. For more information, see the description of the registry settings in [Isolated Domain](isolated-domain.md).
+
+## Firewall rules
+
+
+Copy the firewall rules for the boundary zone from the GPO that contains the firewall rules for the isolated domain. Customize this copy, removing rules for services not needed on servers in this zone, and adding inbound rules to allow the network traffic for the services that are to be accessed by other devices. For example, Woodgrove Bank added a firewall rule to allow inbound network traffic to TCP port 80 for Web client requests.
+
+Make sure that the GPO that contains firewall rules for the isolated domain does not also apply to the boundary zone to prevent overlapping, and possibly conflicting rules.
+
+**Next: **[Encryption Zone GPOs](encryption-zone-gpos.md)
diff --git a/windows/keep-secure/gpo-domiso-encryption.md b/windows/keep-secure/gpo-domiso-encryption.md
new file mode 100644
index 0000000000..dac33f72d4
--- /dev/null
+++ b/windows/keep-secure/gpo-domiso-encryption.md
@@ -0,0 +1,50 @@
+---
+title: GPO\_DOMISO\_Encryption\_WS2008 (Windows 10)
+description: GPO\_DOMISO\_Encryption\_WS2008
+ms.assetid: 84375480-af6a-4c79-aafe-0a37115a7446
+author: brianlic-msft
+---
+
+# GPO\_DOMISO\_Encryption\_WS2008
+
+
+This GPO is authored by using the Windows Firewall with Advanced Security interface in the Group Policy editing tools. Woodgrove Bank began by copying and pasting the GPO for the Windows Server 2008 version of the isolated domain GPO, and then renamed the copy to reflect its new purpose.
+
+This GPO supports the ability for servers that contain sensitive data to require encryption for all connection requests. It is intended to only apply to server computers that are running Windows Server 2012, Windows Server 2008 R2 or Windows Server 2008.
+
+## IPsec settings
+
+
+The copied GPO includes and continues to use the IPsec settings that configure key exchange, main mode, and quick mode algorithms for the isolated domain The following changes are made to encryption zone copy of the GPO:
+
+The encryption zone servers require all connections to be encrypted. To do this, change the IPsec default settings for the GPO to enable the setting **Require encryption for all connection security rules that use these settings**. This disables all integrity-only algorithm combinations.
+
+## Connection security rules
+
+
+Rename the **Isolated Domain Rule** to **Encryption Zone Rule**. Leave the authentication mode setting on **Require inbound and request outbound**. In this mode, the computer forces authentication for all inbound network traffic, and uses it when it can on outbound traffic.
+
+## Registry settings
+
+
+The encryption zone uses the same registry settings as the isolated domain to optimize IPsec operation. For more information, see the description of the registry settings in [Isolated Domain](isolated-domain.md).
+
+## Firewall rules
+
+
+Copy the firewall rules for the encryption zone from the GPO that contains the firewall rules for the isolated domain. Customize this copy, removing rules for services not needed on servers in this zone, and adding inbound rules to allow the network traffic for the services that are to be accessed by other computers. For example, Woodgrove Bank added a firewall rule to allow inbound network traffic to TCP port 1433 for SQL Server client requests.
+
+Change the action for every inbound firewall rule from **Allow the connection** to **Allow only secure connections**, and then select **Require the connections to be encrypted**.
+
+Make sure that the GPO that contains firewall rules for the isolated domain does not also apply to the boundary zone to prevent overlapping, and possibly conflicting rules.
+
+**Next: **[Server Isolation GPOs](server-isolation-gpos.md)
+
+
+
+
+
+
+
+
+
diff --git a/windows/keep-secure/gpo-domiso-firewall.md b/windows/keep-secure/gpo-domiso-firewall.md
new file mode 100644
index 0000000000..226c9deac1
--- /dev/null
+++ b/windows/keep-secure/gpo-domiso-firewall.md
@@ -0,0 +1,64 @@
+---
+title: GPO\_DOMISO\_Firewall (Windows 10)
+description: GPO\_DOMISO\_Firewall
+ms.assetid: 318467d2-5698-4c5d-8000-7f56f5314c42
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# GPO\_DOMISO\_Firewall
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+This GPO is authored by using the Windows Firewall with Advanced Security interface in the Group Policy editing tools. The User Configuration section of the GPO is disabled. It is intended to only apply to devices that are running at least Windows 7 or Windows Server 2008.
+
+## Firewall settings
+
+This GPO provides the following settings:
+
+- Unless otherwise stated, the firewall rules and settings described here are applied to all profiles.
+
+- The firewall is enabled, with inbound, unsolicited connections blocked and outbound connections allowed.
+
+- Under the domain profile, the settings **Display notifications to the user**, **Apply local firewall rules**, and **Apply local connection security rules** are all set to **No**. These settings are applied only to the domain profile because the devices can only receive an exception rule for a required program from a GPO if they are connected to the domain. Under the public and private profiles, those settings are all set to **Yes**.
+
+ >**Note:** Enforcing these settings requires that you define any firewall exceptions for programs, because the user cannot manually permit a new program. You must deploy the exception rules by adding them to this GPO. We recommend that you do not enable these settings until you have tested all your applications and have tested the resulting rules in a test lab and then on pilot devices.
+
+## Firewall rules
+
+This GPO provides the following rules:
+
+- Built-in firewall rule groups are configured to support typically required network operation. The following rule groups are set to **Allow the connection**:
+
+ - Core Networking
+
+ - File and Printer Sharing
+
+ - Network Discovery
+
+ - Remote Administration
+
+ - Remote Desktop
+
+ - Remote Event Log Management
+
+ - Remote Scheduled Tasks Management
+
+ - Remote Service Management
+
+ - Remote Volume Management
+
+ - Windows Firewall Remote Management
+
+ - Windows Management Instrumentation (WMI)
+
+ - Windows Remote Management
+
+- A firewall exception rule to allow required network traffic for the WGBank dashboard program. This inbound rule allows network traffic for the program Dashboard.exe in the %ProgramFiles%\\WGBank folder. The rule is also filtered to only allow traffic on port 1551. This rule is applied only to the domain profile.
+
+**Next: **[Isolated Domain GPOs](isolated-domain-gpos.md)
diff --git a/windows/keep-secure/gpo-domiso-isolateddomain-clients.md b/windows/keep-secure/gpo-domiso-isolateddomain-clients.md
new file mode 100644
index 0000000000..0f2faadb9e
--- /dev/null
+++ b/windows/keep-secure/gpo-domiso-isolateddomain-clients.md
@@ -0,0 +1,83 @@
+---
+title: GPO\_DOMISO\_IsolatedDomain\_Clients (Windows 10)
+description: GPO\_DOMISO\_IsolatedDomain\_Clients
+ms.assetid: 73cd9e25-f2f1-4ef6-b0d1-d36209518cd9
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# GPO\_DOMISO\_IsolatedDomain\_Clients
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+This GPO is authored by using the Windows Firewall with Advanced Security interface in the Group Policy editing tools. The User Configuration section of the GPO is disabled. It is intended to only apply to client devices that are running Windows 8, Windows 7, or Windows Vista.
+
+Because client devices can sometimes be portable, the settings and rules for this GPO are applied to only the domain profile.
+
+## General settings
+
+This GPO provides the following settings:
+
+- No firewall settings are included in this GPO. Woodgrove Bank created separate GPOs for firewall settings (see the [Firewall GPOs](firewall-gpos.md) section) in order to share them with all clients in all isolation zones with minimum redundancy.
+
+- The ICMP protocol is exempted from authentication requirements to support easier network troubleshooting.
+
+- Diffie-Hellman Group 2 is specified as the key exchange algorithm. This is the strongest algorithm available that is supported by all the operating systems that are being used at Woodgrove Bank. After Woodgrove Bank has completed the upgrade to versions of Windows that support stronger algorithms, they can remove the weaker key exchange algorithms, and use only the stronger ones.
+
+- The registry settings shown in the following table. For more information, see the description of the registry settings in [Isolated Domain](isolated-domain.md).
+
+| Setting | Value |
+| - | - |
+| Enable PMTU Discovery | 1 |
+| IPsec Exemptions | 3 |
+
+- The main mode security method combinations in the order shown in the following table.
+
+| Integrity | Encryption |
+| - | - |
+| Secure Hash Algorithm (SHA-1) | Advanced Encryption Standard (AES-128) |
+| SHA-1 | 3DES |
+
+- The following quick mode security data integrity algorithms combinations in the order shown in the following table.
+
+| Protocol | Integrity | Key Lifetime (minutes/KB) |
+| - | - | - |
+| ESP | SHA-1 | 60/100,000 |
+
+- The quick mode security data integrity and encryption algorithm combinations in the order shown in the following table.
+
+| Protocol | Integrity | Encryption | Key Lifetime (minutes/KB) |
+| - | - | - | - |
+| ESP | SHA-1 | AES-128 | 60/100,000|
+| ESP | SHA-1 | 3DES | 60/100,000|
+
+>**Note:** Do not use the MD5 and DES algorithms in your GPOs. They are included only for compatibility with previous versions of Windows.
+
+## Connection Security Rules
+
+This GPO provides the following rules:
+
+- A connection security rule named **Isolated Domain Rule** with the following settings:
+
+ - From **Any IP address** to **Any IP address**.
+
+ - **Require inbound and request outbound** authentication requirements.
+
+ >**Important:** On this, and all other GPOs that require authentication, Woodgrove Bank first chose to only request authentication. After confirming that the devices were successfully communicating by using IPsec, they switched the GPOs to require authentication.
+
+ - For **First authentication methods**, select **Computer Kerberos v5** as the primary method. Add certificate-based authentication from **DC=com,DC=woodgrovebank,CN=CorporateCertServer** for devices that cannot run Windows or cannot join the domain, but must still participate in the isolated domain.
+
+ - For **Second authentication**, select **User Kerberos v5**, and then select the **Second authentication is optional** check box.
+
+- A connection security rule to exempt devices that are in the exemption list from the requirement to authenticate:
+
+ - The IP addresses of all devices on the exemption list must be added individually under **Endpoint 2**.
+
+ - Authentication mode is set to **Do not authenticate**.
+
+**Next: **[GPO\_DOMISO\_IsolatedDomain\_Servers](gpo-domiso-isolateddomain-servers.md)
diff --git a/windows/keep-secure/gpo-domiso-isolateddomain-servers.md b/windows/keep-secure/gpo-domiso-isolateddomain-servers.md
new file mode 100644
index 0000000000..fb984adf5f
--- /dev/null
+++ b/windows/keep-secure/gpo-domiso-isolateddomain-servers.md
@@ -0,0 +1,27 @@
+---
+title: GPO\_DOMISO\_IsolatedDomain\_Servers (Windows 10)
+description: GPO\_DOMISO\_IsolatedDomain\_Servers
+ms.assetid: 33aed8f3-fdc3-4f96-985c-e9d2720015d3
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# GPO\_DOMISO\_IsolatedDomain\_Servers
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+This GPO is authored by using the Windows Firewall with Advanced Security interface in the Group Policy editing tools. The User Configuration section of the GPO is disabled. It is intended to only apply to server devices that are running at least Windows Server 2008.
+
+Because so many of the settings and rules for this GPO are common to those in the GPO for at least Windows Vista, you can save time by exporting the Windows Firewall with Advanced Security piece of the GPO for at least Windows Vista, and importing it to the GPO for at least Windows Server 2008. After the import, change only the items specified here:
+
+- This GPO applies all its settings to all profiles: Domain, Private, and Public. Because a server is not expected to be mobile and changing networks, configuring the GPO in this way prevents a network failure or the addition of a new network adapter from unintentionally switching the device to the Public profile with a different set of rules (in the case of a server running Windows Server 2008).
+
+ >**Important:** Windows Vista and Windows Server 2008 support only one network location profile at a time. The profile for the least secure network type is applied to the device. If you attach a network adapter to a device that is not physically connected to a network, the public network location type is associated with the network adapter and applied to the device.
+
+**Next: **[Boundary Zone GPOs](boundary-zone-gpos.md)
+
diff --git a/windows/keep-secure/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md b/windows/keep-secure/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md
new file mode 100644
index 0000000000..b1adf33fd9
--- /dev/null
+++ b/windows/keep-secure/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md
@@ -0,0 +1,60 @@
+---
+title: Identifying Your Windows Firewall with Advanced Security Deployment Goals (Windows 10)
+description: Identifying Your Windows Firewall with Advanced Security Deployment Goals
+ms.assetid: 598cf45e-2e1c-4947-970f-361dfa264bba
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Identifying Your Windows Firewall with Advanced Security Deployment Goals
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+Correctly identifying your Windows Firewall with Advanced Security deployment goals is essential for the success of your Windows Firewall with Advanced Security design project. Form a project team that can clearly articulate deployment issues in a vision statement. When you write your vision statement, identify, clarify, and refine your deployment goals. Prioritize and, if possible, combine your deployment goals so that you can design and deploy Windows Firewall with Advanced Security by using an iterative approach. You can take advantage of the predefined Windows Firewall with Advanced Security deployment goals presented in this guide that are relevant to your scenarios.
+
+The following table lists the three main tasks for articulating, refining, and subsequently documenting your Windows Firewall with Advanced Security deployment goals.
+
+
+
+
+
+
+
+
+
+
+
+Evaluate predefined Windows Firewall with Advanced Security deployment goals that are provided in this section of the guide, and combine one or more goals to reach your organizational objectives. |
+Predefined deployment goals:
+
+[Protect Devices from Unwanted Network Traffic](protect-devices-from-unwanted-network-traffic.md)
+[Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md)
+[Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md)
+[Restrict Access to Sensitive Resources to Only Specified Users or Devices](restrict-access-to-only-specified-users-or-devices.md)
+ |
+
+
+Map one goal or a combination of the predefined deployment goals to an existing Windows Firewall with Advanced Security design. |
+ |
+
+
+Based on the status of your current infrastructure, document your deployment goals for your Windows Firewall with Advanced Security design into a deployment plan. |
+
+[Designing A Windows Firewall with Advanced Security Strategy](designing-a-windows-firewall-with-advanced-security-strategy.md)
+[Planning Your Windows Firewall with Advanced Security Design](planning-your-windows-firewall-with-advanced-security-design.md)
+ |
+
+
+
+
+**Next:** [Protect Devices from Unwanted Network Traffic](protect-devices-from-unwanted-network-traffic.md)
diff --git a/windows/keep-secure/images/15dd35b6-6cc6-421f-93f8-7109920e7144.gif b/windows/keep-secure/images/15dd35b6-6cc6-421f-93f8-7109920e7144.gif
new file mode 100644
index 0000000000..374b1fe60e
Binary files /dev/null and b/windows/keep-secure/images/15dd35b6-6cc6-421f-93f8-7109920e7144.gif differ
diff --git a/windows/keep-secure/images/2b05dce3-938f-4168-9b8f-1f4398cbdb9b.gif b/windows/keep-secure/images/2b05dce3-938f-4168-9b8f-1f4398cbdb9b.gif
new file mode 100644
index 0000000000..60246363c0
Binary files /dev/null and b/windows/keep-secure/images/2b05dce3-938f-4168-9b8f-1f4398cbdb9b.gif differ
diff --git a/windows/keep-secure/images/ad-sites-and-services.png b/windows/keep-secure/images/ad-sites-and-services.png
new file mode 100644
index 0000000000..74758aef69
Binary files /dev/null and b/windows/keep-secure/images/ad-sites-and-services.png differ
diff --git a/windows/keep-secure/images/adsi-edit.png b/windows/keep-secure/images/adsi-edit.png
new file mode 100644
index 0000000000..2d0c4d0af7
Binary files /dev/null and b/windows/keep-secure/images/adsi-edit.png differ
diff --git a/windows/keep-secure/images/advanced-sharing.png b/windows/keep-secure/images/advanced-sharing.png
new file mode 100644
index 0000000000..f72b7dd37b
Binary files /dev/null and b/windows/keep-secure/images/advanced-sharing.png differ
diff --git a/windows/keep-secure/images/auditpol-guid-list.png b/windows/keep-secure/images/auditpol-guid-list.png
new file mode 100644
index 0000000000..d69583ad89
Binary files /dev/null and b/windows/keep-secure/images/auditpol-guid-list.png differ
diff --git a/windows/keep-secure/images/auditpol-list-subcategory.png b/windows/keep-secure/images/auditpol-list-subcategory.png
new file mode 100644
index 0000000000..91f043fc24
Binary files /dev/null and b/windows/keep-secure/images/auditpol-list-subcategory.png differ
diff --git a/windows/keep-secure/images/auditpol-list-user.png b/windows/keep-secure/images/auditpol-list-user.png
new file mode 100644
index 0000000000..cabf86563d
Binary files /dev/null and b/windows/keep-secure/images/auditpol-list-user.png differ
diff --git a/windows/keep-secure/images/auditpol.png b/windows/keep-secure/images/auditpol.png
new file mode 100644
index 0000000000..cabf86563d
Binary files /dev/null and b/windows/keep-secure/images/auditpol.png differ
diff --git a/windows/keep-secure/images/bc6cea1a-1c6c-4124-8c8f-1df5adfe8c88.gif b/windows/keep-secure/images/bc6cea1a-1c6c-4124-8c8f-1df5adfe8c88.gif
new file mode 100644
index 0000000000..2d1bf229c3
Binary files /dev/null and b/windows/keep-secure/images/bc6cea1a-1c6c-4124-8c8f-1df5adfe8c88.gif differ
diff --git a/windows/keep-secure/images/branchcache-properties.png b/windows/keep-secure/images/branchcache-properties.png
new file mode 100644
index 0000000000..31f13be679
Binary files /dev/null and b/windows/keep-secure/images/branchcache-properties.png differ
diff --git a/windows/keep-secure/images/certutil-command.png b/windows/keep-secure/images/certutil-command.png
new file mode 100644
index 0000000000..ce60fa8034
Binary files /dev/null and b/windows/keep-secure/images/certutil-command.png differ
diff --git a/windows/keep-secure/images/computer-management.png b/windows/keep-secure/images/computer-management.png
new file mode 100644
index 0000000000..74548ab836
Binary files /dev/null and b/windows/keep-secure/images/computer-management.png differ
diff --git a/windows/keep-secure/images/corpnet.gif b/windows/keep-secure/images/corpnet.gif
new file mode 100644
index 0000000000..f76182ee25
Binary files /dev/null and b/windows/keep-secure/images/corpnet.gif differ
diff --git a/windows/keep-secure/images/createipsecrule.gif b/windows/keep-secure/images/createipsecrule.gif
new file mode 100644
index 0000000000..91016f03da
Binary files /dev/null and b/windows/keep-secure/images/createipsecrule.gif differ
diff --git a/windows/keep-secure/images/diskpart.png b/windows/keep-secure/images/diskpart.png
new file mode 100644
index 0000000000..f2ebf04b35
Binary files /dev/null and b/windows/keep-secure/images/diskpart.png differ
diff --git a/windows/keep-secure/images/event-1100.png b/windows/keep-secure/images/event-1100.png
new file mode 100644
index 0000000000..aea16fdfc2
Binary files /dev/null and b/windows/keep-secure/images/event-1100.png differ
diff --git a/windows/keep-secure/images/event-1102.png b/windows/keep-secure/images/event-1102.png
new file mode 100644
index 0000000000..3d342a51fa
Binary files /dev/null and b/windows/keep-secure/images/event-1102.png differ
diff --git a/windows/keep-secure/images/event-1104.png b/windows/keep-secure/images/event-1104.png
new file mode 100644
index 0000000000..b275530d7a
Binary files /dev/null and b/windows/keep-secure/images/event-1104.png differ
diff --git a/windows/keep-secure/images/event-1105.png b/windows/keep-secure/images/event-1105.png
new file mode 100644
index 0000000000..cedf9019f6
Binary files /dev/null and b/windows/keep-secure/images/event-1105.png differ
diff --git a/windows/keep-secure/images/event-1108.png b/windows/keep-secure/images/event-1108.png
new file mode 100644
index 0000000000..aa55df090d
Binary files /dev/null and b/windows/keep-secure/images/event-1108.png differ
diff --git a/windows/keep-secure/images/event-4608.png b/windows/keep-secure/images/event-4608.png
new file mode 100644
index 0000000000..256605977f
Binary files /dev/null and b/windows/keep-secure/images/event-4608.png differ
diff --git a/windows/keep-secure/images/event-4610.png b/windows/keep-secure/images/event-4610.png
new file mode 100644
index 0000000000..0046d6c73d
Binary files /dev/null and b/windows/keep-secure/images/event-4610.png differ
diff --git a/windows/keep-secure/images/event-4611.png b/windows/keep-secure/images/event-4611.png
new file mode 100644
index 0000000000..f0721a4860
Binary files /dev/null and b/windows/keep-secure/images/event-4611.png differ
diff --git a/windows/keep-secure/images/event-4614.png b/windows/keep-secure/images/event-4614.png
new file mode 100644
index 0000000000..aaa731eacb
Binary files /dev/null and b/windows/keep-secure/images/event-4614.png differ
diff --git a/windows/keep-secure/images/event-4616.png b/windows/keep-secure/images/event-4616.png
new file mode 100644
index 0000000000..f33eb34fef
Binary files /dev/null and b/windows/keep-secure/images/event-4616.png differ
diff --git a/windows/keep-secure/images/event-4618.png b/windows/keep-secure/images/event-4618.png
new file mode 100644
index 0000000000..7e98ebf7d0
Binary files /dev/null and b/windows/keep-secure/images/event-4618.png differ
diff --git a/windows/keep-secure/images/event-4622.png b/windows/keep-secure/images/event-4622.png
new file mode 100644
index 0000000000..4283128955
Binary files /dev/null and b/windows/keep-secure/images/event-4622.png differ
diff --git a/windows/keep-secure/images/event-4624.png b/windows/keep-secure/images/event-4624.png
new file mode 100644
index 0000000000..f12908f0b0
Binary files /dev/null and b/windows/keep-secure/images/event-4624.png differ
diff --git a/windows/keep-secure/images/event-4625.png b/windows/keep-secure/images/event-4625.png
new file mode 100644
index 0000000000..4ca8559f18
Binary files /dev/null and b/windows/keep-secure/images/event-4625.png differ
diff --git a/windows/keep-secure/images/event-4626.png b/windows/keep-secure/images/event-4626.png
new file mode 100644
index 0000000000..9d2aa55f16
Binary files /dev/null and b/windows/keep-secure/images/event-4626.png differ
diff --git a/windows/keep-secure/images/event-4627.png b/windows/keep-secure/images/event-4627.png
new file mode 100644
index 0000000000..53e75a4a88
Binary files /dev/null and b/windows/keep-secure/images/event-4627.png differ
diff --git a/windows/keep-secure/images/event-4634.png b/windows/keep-secure/images/event-4634.png
new file mode 100644
index 0000000000..e014592cc8
Binary files /dev/null and b/windows/keep-secure/images/event-4634.png differ
diff --git a/windows/keep-secure/images/event-4647.png b/windows/keep-secure/images/event-4647.png
new file mode 100644
index 0000000000..f11ddf8996
Binary files /dev/null and b/windows/keep-secure/images/event-4647.png differ
diff --git a/windows/keep-secure/images/event-4648.png b/windows/keep-secure/images/event-4648.png
new file mode 100644
index 0000000000..54721193e7
Binary files /dev/null and b/windows/keep-secure/images/event-4648.png differ
diff --git a/windows/keep-secure/images/event-4656.png b/windows/keep-secure/images/event-4656.png
new file mode 100644
index 0000000000..aba3b592a8
Binary files /dev/null and b/windows/keep-secure/images/event-4656.png differ
diff --git a/windows/keep-secure/images/event-4657.png b/windows/keep-secure/images/event-4657.png
new file mode 100644
index 0000000000..4b0ffbad21
Binary files /dev/null and b/windows/keep-secure/images/event-4657.png differ
diff --git a/windows/keep-secure/images/event-4658.png b/windows/keep-secure/images/event-4658.png
new file mode 100644
index 0000000000..7bf584e4f4
Binary files /dev/null and b/windows/keep-secure/images/event-4658.png differ
diff --git a/windows/keep-secure/images/event-4660.png b/windows/keep-secure/images/event-4660.png
new file mode 100644
index 0000000000..55c57de435
Binary files /dev/null and b/windows/keep-secure/images/event-4660.png differ
diff --git a/windows/keep-secure/images/event-4661.png b/windows/keep-secure/images/event-4661.png
new file mode 100644
index 0000000000..f2b6f57b5b
Binary files /dev/null and b/windows/keep-secure/images/event-4661.png differ
diff --git a/windows/keep-secure/images/event-4662.png b/windows/keep-secure/images/event-4662.png
new file mode 100644
index 0000000000..d2d50bda5a
Binary files /dev/null and b/windows/keep-secure/images/event-4662.png differ
diff --git a/windows/keep-secure/images/event-4663.png b/windows/keep-secure/images/event-4663.png
new file mode 100644
index 0000000000..13629253a0
Binary files /dev/null and b/windows/keep-secure/images/event-4663.png differ
diff --git a/windows/keep-secure/images/event-4664.png b/windows/keep-secure/images/event-4664.png
new file mode 100644
index 0000000000..07b9624fdf
Binary files /dev/null and b/windows/keep-secure/images/event-4664.png differ
diff --git a/windows/keep-secure/images/event-4670.png b/windows/keep-secure/images/event-4670.png
new file mode 100644
index 0000000000..664fdca981
Binary files /dev/null and b/windows/keep-secure/images/event-4670.png differ
diff --git a/windows/keep-secure/images/event-4672.png b/windows/keep-secure/images/event-4672.png
new file mode 100644
index 0000000000..12a54cb1a8
Binary files /dev/null and b/windows/keep-secure/images/event-4672.png differ
diff --git a/windows/keep-secure/images/event-4673.png b/windows/keep-secure/images/event-4673.png
new file mode 100644
index 0000000000..ac773069eb
Binary files /dev/null and b/windows/keep-secure/images/event-4673.png differ
diff --git a/windows/keep-secure/images/event-4674.png b/windows/keep-secure/images/event-4674.png
new file mode 100644
index 0000000000..a10eaaa6f7
Binary files /dev/null and b/windows/keep-secure/images/event-4674.png differ
diff --git a/windows/keep-secure/images/event-4688.png b/windows/keep-secure/images/event-4688.png
new file mode 100644
index 0000000000..5ce471eda2
Binary files /dev/null and b/windows/keep-secure/images/event-4688.png differ
diff --git a/windows/keep-secure/images/event-4689.png b/windows/keep-secure/images/event-4689.png
new file mode 100644
index 0000000000..1c80bf5428
Binary files /dev/null and b/windows/keep-secure/images/event-4689.png differ
diff --git a/windows/keep-secure/images/event-4690.png b/windows/keep-secure/images/event-4690.png
new file mode 100644
index 0000000000..400c1aa7df
Binary files /dev/null and b/windows/keep-secure/images/event-4690.png differ
diff --git a/windows/keep-secure/images/event-4691.png b/windows/keep-secure/images/event-4691.png
new file mode 100644
index 0000000000..8b5563f136
Binary files /dev/null and b/windows/keep-secure/images/event-4691.png differ
diff --git a/windows/keep-secure/images/event-4692.png b/windows/keep-secure/images/event-4692.png
new file mode 100644
index 0000000000..a26a483b4e
Binary files /dev/null and b/windows/keep-secure/images/event-4692.png differ
diff --git a/windows/keep-secure/images/event-4693.png b/windows/keep-secure/images/event-4693.png
new file mode 100644
index 0000000000..6180d34954
Binary files /dev/null and b/windows/keep-secure/images/event-4693.png differ
diff --git a/windows/keep-secure/images/event-4696.png b/windows/keep-secure/images/event-4696.png
new file mode 100644
index 0000000000..1169b0e437
Binary files /dev/null and b/windows/keep-secure/images/event-4696.png differ
diff --git a/windows/keep-secure/images/event-4697.png b/windows/keep-secure/images/event-4697.png
new file mode 100644
index 0000000000..4cafd71282
Binary files /dev/null and b/windows/keep-secure/images/event-4697.png differ
diff --git a/windows/keep-secure/images/event-4698.png b/windows/keep-secure/images/event-4698.png
new file mode 100644
index 0000000000..d8c35fc625
Binary files /dev/null and b/windows/keep-secure/images/event-4698.png differ
diff --git a/windows/keep-secure/images/event-4699.png b/windows/keep-secure/images/event-4699.png
new file mode 100644
index 0000000000..5e11312a32
Binary files /dev/null and b/windows/keep-secure/images/event-4699.png differ
diff --git a/windows/keep-secure/images/event-4700.png b/windows/keep-secure/images/event-4700.png
new file mode 100644
index 0000000000..922b70cbbb
Binary files /dev/null and b/windows/keep-secure/images/event-4700.png differ
diff --git a/windows/keep-secure/images/event-4701.png b/windows/keep-secure/images/event-4701.png
new file mode 100644
index 0000000000..71d9ba8d82
Binary files /dev/null and b/windows/keep-secure/images/event-4701.png differ
diff --git a/windows/keep-secure/images/event-4702.png b/windows/keep-secure/images/event-4702.png
new file mode 100644
index 0000000000..58b66921ff
Binary files /dev/null and b/windows/keep-secure/images/event-4702.png differ
diff --git a/windows/keep-secure/images/event-4703-partial.png b/windows/keep-secure/images/event-4703-partial.png
new file mode 100644
index 0000000000..61df0471f9
Binary files /dev/null and b/windows/keep-secure/images/event-4703-partial.png differ
diff --git a/windows/keep-secure/images/event-4703.png b/windows/keep-secure/images/event-4703.png
new file mode 100644
index 0000000000..2ddb6584cd
Binary files /dev/null and b/windows/keep-secure/images/event-4703.png differ
diff --git a/windows/keep-secure/images/event-4704.png b/windows/keep-secure/images/event-4704.png
new file mode 100644
index 0000000000..a12b3d0e8e
Binary files /dev/null and b/windows/keep-secure/images/event-4704.png differ
diff --git a/windows/keep-secure/images/event-4705.png b/windows/keep-secure/images/event-4705.png
new file mode 100644
index 0000000000..fbea053355
Binary files /dev/null and b/windows/keep-secure/images/event-4705.png differ
diff --git a/windows/keep-secure/images/event-4706.png b/windows/keep-secure/images/event-4706.png
new file mode 100644
index 0000000000..d692c6de11
Binary files /dev/null and b/windows/keep-secure/images/event-4706.png differ
diff --git a/windows/keep-secure/images/event-4707.png b/windows/keep-secure/images/event-4707.png
new file mode 100644
index 0000000000..455e4aea5c
Binary files /dev/null and b/windows/keep-secure/images/event-4707.png differ
diff --git a/windows/keep-secure/images/event-4713.png b/windows/keep-secure/images/event-4713.png
new file mode 100644
index 0000000000..a5577751f2
Binary files /dev/null and b/windows/keep-secure/images/event-4713.png differ
diff --git a/windows/keep-secure/images/event-4714.png b/windows/keep-secure/images/event-4714.png
new file mode 100644
index 0000000000..b7aba8b550
Binary files /dev/null and b/windows/keep-secure/images/event-4714.png differ
diff --git a/windows/keep-secure/images/event-4715.png b/windows/keep-secure/images/event-4715.png
new file mode 100644
index 0000000000..d61cdf4bee
Binary files /dev/null and b/windows/keep-secure/images/event-4715.png differ
diff --git a/windows/keep-secure/images/event-4716.png b/windows/keep-secure/images/event-4716.png
new file mode 100644
index 0000000000..34b7456f04
Binary files /dev/null and b/windows/keep-secure/images/event-4716.png differ
diff --git a/windows/keep-secure/images/event-4717.png b/windows/keep-secure/images/event-4717.png
new file mode 100644
index 0000000000..2ada59cc59
Binary files /dev/null and b/windows/keep-secure/images/event-4717.png differ
diff --git a/windows/keep-secure/images/event-4718.png b/windows/keep-secure/images/event-4718.png
new file mode 100644
index 0000000000..1cfddd3e3b
Binary files /dev/null and b/windows/keep-secure/images/event-4718.png differ
diff --git a/windows/keep-secure/images/event-4719.png b/windows/keep-secure/images/event-4719.png
new file mode 100644
index 0000000000..4cc7540a6c
Binary files /dev/null and b/windows/keep-secure/images/event-4719.png differ
diff --git a/windows/keep-secure/images/event-4720.png b/windows/keep-secure/images/event-4720.png
new file mode 100644
index 0000000000..d5c0d35986
Binary files /dev/null and b/windows/keep-secure/images/event-4720.png differ
diff --git a/windows/keep-secure/images/event-4722.png b/windows/keep-secure/images/event-4722.png
new file mode 100644
index 0000000000..0796375b65
Binary files /dev/null and b/windows/keep-secure/images/event-4722.png differ
diff --git a/windows/keep-secure/images/event-4723.png b/windows/keep-secure/images/event-4723.png
new file mode 100644
index 0000000000..e8f55a4cf3
Binary files /dev/null and b/windows/keep-secure/images/event-4723.png differ
diff --git a/windows/keep-secure/images/event-4724.png b/windows/keep-secure/images/event-4724.png
new file mode 100644
index 0000000000..d51ee410e3
Binary files /dev/null and b/windows/keep-secure/images/event-4724.png differ
diff --git a/windows/keep-secure/images/event-4725.png b/windows/keep-secure/images/event-4725.png
new file mode 100644
index 0000000000..961f810c35
Binary files /dev/null and b/windows/keep-secure/images/event-4725.png differ
diff --git a/windows/keep-secure/images/event-4726.png b/windows/keep-secure/images/event-4726.png
new file mode 100644
index 0000000000..6bcdae24fb
Binary files /dev/null and b/windows/keep-secure/images/event-4726.png differ
diff --git a/windows/keep-secure/images/event-4731.png b/windows/keep-secure/images/event-4731.png
new file mode 100644
index 0000000000..3547a1397c
Binary files /dev/null and b/windows/keep-secure/images/event-4731.png differ
diff --git a/windows/keep-secure/images/event-4732.png b/windows/keep-secure/images/event-4732.png
new file mode 100644
index 0000000000..62cdd84ef7
Binary files /dev/null and b/windows/keep-secure/images/event-4732.png differ
diff --git a/windows/keep-secure/images/event-4733.png b/windows/keep-secure/images/event-4733.png
new file mode 100644
index 0000000000..7ebc924898
Binary files /dev/null and b/windows/keep-secure/images/event-4733.png differ
diff --git a/windows/keep-secure/images/event-4734.png b/windows/keep-secure/images/event-4734.png
new file mode 100644
index 0000000000..4df94214f8
Binary files /dev/null and b/windows/keep-secure/images/event-4734.png differ
diff --git a/windows/keep-secure/images/event-4735.png b/windows/keep-secure/images/event-4735.png
new file mode 100644
index 0000000000..dc3fbe0f84
Binary files /dev/null and b/windows/keep-secure/images/event-4735.png differ
diff --git a/windows/keep-secure/images/event-4738.png b/windows/keep-secure/images/event-4738.png
new file mode 100644
index 0000000000..3b540b816e
Binary files /dev/null and b/windows/keep-secure/images/event-4738.png differ
diff --git a/windows/keep-secure/images/event-4739.png b/windows/keep-secure/images/event-4739.png
new file mode 100644
index 0000000000..5fb89bb560
Binary files /dev/null and b/windows/keep-secure/images/event-4739.png differ
diff --git a/windows/keep-secure/images/event-4740.png b/windows/keep-secure/images/event-4740.png
new file mode 100644
index 0000000000..19d652dac4
Binary files /dev/null and b/windows/keep-secure/images/event-4740.png differ
diff --git a/windows/keep-secure/images/event-4741.png b/windows/keep-secure/images/event-4741.png
new file mode 100644
index 0000000000..b06a01a83e
Binary files /dev/null and b/windows/keep-secure/images/event-4741.png differ
diff --git a/windows/keep-secure/images/event-4742.png b/windows/keep-secure/images/event-4742.png
new file mode 100644
index 0000000000..8922eb978b
Binary files /dev/null and b/windows/keep-secure/images/event-4742.png differ
diff --git a/windows/keep-secure/images/event-4743.png b/windows/keep-secure/images/event-4743.png
new file mode 100644
index 0000000000..1225c25c02
Binary files /dev/null and b/windows/keep-secure/images/event-4743.png differ
diff --git a/windows/keep-secure/images/event-4749.png b/windows/keep-secure/images/event-4749.png
new file mode 100644
index 0000000000..fad8e00ade
Binary files /dev/null and b/windows/keep-secure/images/event-4749.png differ
diff --git a/windows/keep-secure/images/event-4750.png b/windows/keep-secure/images/event-4750.png
new file mode 100644
index 0000000000..08d0b6c848
Binary files /dev/null and b/windows/keep-secure/images/event-4750.png differ
diff --git a/windows/keep-secure/images/event-4751.png b/windows/keep-secure/images/event-4751.png
new file mode 100644
index 0000000000..d9fd6c7928
Binary files /dev/null and b/windows/keep-secure/images/event-4751.png differ
diff --git a/windows/keep-secure/images/event-4752.png b/windows/keep-secure/images/event-4752.png
new file mode 100644
index 0000000000..3464cca5a3
Binary files /dev/null and b/windows/keep-secure/images/event-4752.png differ
diff --git a/windows/keep-secure/images/event-4753.png b/windows/keep-secure/images/event-4753.png
new file mode 100644
index 0000000000..41ee823086
Binary files /dev/null and b/windows/keep-secure/images/event-4753.png differ
diff --git a/windows/keep-secure/images/event-4764.png b/windows/keep-secure/images/event-4764.png
new file mode 100644
index 0000000000..5c376a7176
Binary files /dev/null and b/windows/keep-secure/images/event-4764.png differ
diff --git a/windows/keep-secure/images/event-4767.png b/windows/keep-secure/images/event-4767.png
new file mode 100644
index 0000000000..bb3c9a8524
Binary files /dev/null and b/windows/keep-secure/images/event-4767.png differ
diff --git a/windows/keep-secure/images/event-4768.png b/windows/keep-secure/images/event-4768.png
new file mode 100644
index 0000000000..6150806515
Binary files /dev/null and b/windows/keep-secure/images/event-4768.png differ
diff --git a/windows/keep-secure/images/event-4769.png b/windows/keep-secure/images/event-4769.png
new file mode 100644
index 0000000000..ad96b8df58
Binary files /dev/null and b/windows/keep-secure/images/event-4769.png differ
diff --git a/windows/keep-secure/images/event-4770.png b/windows/keep-secure/images/event-4770.png
new file mode 100644
index 0000000000..e780578ec3
Binary files /dev/null and b/windows/keep-secure/images/event-4770.png differ
diff --git a/windows/keep-secure/images/event-4771.png b/windows/keep-secure/images/event-4771.png
new file mode 100644
index 0000000000..b87ef7dc23
Binary files /dev/null and b/windows/keep-secure/images/event-4771.png differ
diff --git a/windows/keep-secure/images/event-4776.png b/windows/keep-secure/images/event-4776.png
new file mode 100644
index 0000000000..b0ffefdee9
Binary files /dev/null and b/windows/keep-secure/images/event-4776.png differ
diff --git a/windows/keep-secure/images/event-4778.png b/windows/keep-secure/images/event-4778.png
new file mode 100644
index 0000000000..0888c950de
Binary files /dev/null and b/windows/keep-secure/images/event-4778.png differ
diff --git a/windows/keep-secure/images/event-4779.png b/windows/keep-secure/images/event-4779.png
new file mode 100644
index 0000000000..f578cdd53f
Binary files /dev/null and b/windows/keep-secure/images/event-4779.png differ
diff --git a/windows/keep-secure/images/event-4781.png b/windows/keep-secure/images/event-4781.png
new file mode 100644
index 0000000000..f344879f9d
Binary files /dev/null and b/windows/keep-secure/images/event-4781.png differ
diff --git a/windows/keep-secure/images/event-4782.png b/windows/keep-secure/images/event-4782.png
new file mode 100644
index 0000000000..3f2822bf9c
Binary files /dev/null and b/windows/keep-secure/images/event-4782.png differ
diff --git a/windows/keep-secure/images/event-4793.png b/windows/keep-secure/images/event-4793.png
new file mode 100644
index 0000000000..2def52c754
Binary files /dev/null and b/windows/keep-secure/images/event-4793.png differ
diff --git a/windows/keep-secure/images/event-4794.png b/windows/keep-secure/images/event-4794.png
new file mode 100644
index 0000000000..08b15adb1e
Binary files /dev/null and b/windows/keep-secure/images/event-4794.png differ
diff --git a/windows/keep-secure/images/event-4798.png b/windows/keep-secure/images/event-4798.png
new file mode 100644
index 0000000000..727cf0ce90
Binary files /dev/null and b/windows/keep-secure/images/event-4798.png differ
diff --git a/windows/keep-secure/images/event-4799.png b/windows/keep-secure/images/event-4799.png
new file mode 100644
index 0000000000..2bbb69f812
Binary files /dev/null and b/windows/keep-secure/images/event-4799.png differ
diff --git a/windows/keep-secure/images/event-4800.png b/windows/keep-secure/images/event-4800.png
new file mode 100644
index 0000000000..e7354b3995
Binary files /dev/null and b/windows/keep-secure/images/event-4800.png differ
diff --git a/windows/keep-secure/images/event-4801.png b/windows/keep-secure/images/event-4801.png
new file mode 100644
index 0000000000..695e124a94
Binary files /dev/null and b/windows/keep-secure/images/event-4801.png differ
diff --git a/windows/keep-secure/images/event-4802.png b/windows/keep-secure/images/event-4802.png
new file mode 100644
index 0000000000..1225e2c79f
Binary files /dev/null and b/windows/keep-secure/images/event-4802.png differ
diff --git a/windows/keep-secure/images/event-4803.png b/windows/keep-secure/images/event-4803.png
new file mode 100644
index 0000000000..677663e56a
Binary files /dev/null and b/windows/keep-secure/images/event-4803.png differ
diff --git a/windows/keep-secure/images/event-4817.png b/windows/keep-secure/images/event-4817.png
new file mode 100644
index 0000000000..4d71e12ad1
Binary files /dev/null and b/windows/keep-secure/images/event-4817.png differ
diff --git a/windows/keep-secure/images/event-4818.png b/windows/keep-secure/images/event-4818.png
new file mode 100644
index 0000000000..65c049a552
Binary files /dev/null and b/windows/keep-secure/images/event-4818.png differ
diff --git a/windows/keep-secure/images/event-4819.png b/windows/keep-secure/images/event-4819.png
new file mode 100644
index 0000000000..7f56089668
Binary files /dev/null and b/windows/keep-secure/images/event-4819.png differ
diff --git a/windows/keep-secure/images/event-4826.png b/windows/keep-secure/images/event-4826.png
new file mode 100644
index 0000000000..326f7a2a02
Binary files /dev/null and b/windows/keep-secure/images/event-4826.png differ
diff --git a/windows/keep-secure/images/event-4865.png b/windows/keep-secure/images/event-4865.png
new file mode 100644
index 0000000000..ddbe9a6034
Binary files /dev/null and b/windows/keep-secure/images/event-4865.png differ
diff --git a/windows/keep-secure/images/event-4866.png b/windows/keep-secure/images/event-4866.png
new file mode 100644
index 0000000000..2015250a48
Binary files /dev/null and b/windows/keep-secure/images/event-4866.png differ
diff --git a/windows/keep-secure/images/event-4867.png b/windows/keep-secure/images/event-4867.png
new file mode 100644
index 0000000000..0f0b6c0662
Binary files /dev/null and b/windows/keep-secure/images/event-4867.png differ
diff --git a/windows/keep-secure/images/event-4902.png b/windows/keep-secure/images/event-4902.png
new file mode 100644
index 0000000000..9df8c87ecd
Binary files /dev/null and b/windows/keep-secure/images/event-4902.png differ
diff --git a/windows/keep-secure/images/event-4904.png b/windows/keep-secure/images/event-4904.png
new file mode 100644
index 0000000000..016ebf2d95
Binary files /dev/null and b/windows/keep-secure/images/event-4904.png differ
diff --git a/windows/keep-secure/images/event-4905.png b/windows/keep-secure/images/event-4905.png
new file mode 100644
index 0000000000..1366e366ef
Binary files /dev/null and b/windows/keep-secure/images/event-4905.png differ
diff --git a/windows/keep-secure/images/event-4906.png b/windows/keep-secure/images/event-4906.png
new file mode 100644
index 0000000000..043d6827aa
Binary files /dev/null and b/windows/keep-secure/images/event-4906.png differ
diff --git a/windows/keep-secure/images/event-4907.png b/windows/keep-secure/images/event-4907.png
new file mode 100644
index 0000000000..d29b170401
Binary files /dev/null and b/windows/keep-secure/images/event-4907.png differ
diff --git a/windows/keep-secure/images/event-4908.png b/windows/keep-secure/images/event-4908.png
new file mode 100644
index 0000000000..523cb84a9b
Binary files /dev/null and b/windows/keep-secure/images/event-4908.png differ
diff --git a/windows/keep-secure/images/event-4911.png b/windows/keep-secure/images/event-4911.png
new file mode 100644
index 0000000000..bfc3830df3
Binary files /dev/null and b/windows/keep-secure/images/event-4911.png differ
diff --git a/windows/keep-secure/images/event-4912.png b/windows/keep-secure/images/event-4912.png
new file mode 100644
index 0000000000..9a01e1273e
Binary files /dev/null and b/windows/keep-secure/images/event-4912.png differ
diff --git a/windows/keep-secure/images/event-4913.png b/windows/keep-secure/images/event-4913.png
new file mode 100644
index 0000000000..a2657ec645
Binary files /dev/null and b/windows/keep-secure/images/event-4913.png differ
diff --git a/windows/keep-secure/images/event-4928.png b/windows/keep-secure/images/event-4928.png
new file mode 100644
index 0000000000..8c0ad8368a
Binary files /dev/null and b/windows/keep-secure/images/event-4928.png differ
diff --git a/windows/keep-secure/images/event-4929.png b/windows/keep-secure/images/event-4929.png
new file mode 100644
index 0000000000..380b52aaee
Binary files /dev/null and b/windows/keep-secure/images/event-4929.png differ
diff --git a/windows/keep-secure/images/event-4930.png b/windows/keep-secure/images/event-4930.png
new file mode 100644
index 0000000000..9c28a8f677
Binary files /dev/null and b/windows/keep-secure/images/event-4930.png differ
diff --git a/windows/keep-secure/images/event-4931.png b/windows/keep-secure/images/event-4931.png
new file mode 100644
index 0000000000..fb7add47fc
Binary files /dev/null and b/windows/keep-secure/images/event-4931.png differ
diff --git a/windows/keep-secure/images/event-4932.png b/windows/keep-secure/images/event-4932.png
new file mode 100644
index 0000000000..5086bed8e7
Binary files /dev/null and b/windows/keep-secure/images/event-4932.png differ
diff --git a/windows/keep-secure/images/event-4933.png b/windows/keep-secure/images/event-4933.png
new file mode 100644
index 0000000000..49456d0e08
Binary files /dev/null and b/windows/keep-secure/images/event-4933.png differ
diff --git a/windows/keep-secure/images/event-4935.png b/windows/keep-secure/images/event-4935.png
new file mode 100644
index 0000000000..7a1c8a85ab
Binary files /dev/null and b/windows/keep-secure/images/event-4935.png differ
diff --git a/windows/keep-secure/images/event-4944.png b/windows/keep-secure/images/event-4944.png
new file mode 100644
index 0000000000..8c05133463
Binary files /dev/null and b/windows/keep-secure/images/event-4944.png differ
diff --git a/windows/keep-secure/images/event-4945.png b/windows/keep-secure/images/event-4945.png
new file mode 100644
index 0000000000..a3828ba271
Binary files /dev/null and b/windows/keep-secure/images/event-4945.png differ
diff --git a/windows/keep-secure/images/event-4946.png b/windows/keep-secure/images/event-4946.png
new file mode 100644
index 0000000000..d06ba42b67
Binary files /dev/null and b/windows/keep-secure/images/event-4946.png differ
diff --git a/windows/keep-secure/images/event-4947.png b/windows/keep-secure/images/event-4947.png
new file mode 100644
index 0000000000..ba67a44c7c
Binary files /dev/null and b/windows/keep-secure/images/event-4947.png differ
diff --git a/windows/keep-secure/images/event-4948.png b/windows/keep-secure/images/event-4948.png
new file mode 100644
index 0000000000..b956769c0a
Binary files /dev/null and b/windows/keep-secure/images/event-4948.png differ
diff --git a/windows/keep-secure/images/event-4949.png b/windows/keep-secure/images/event-4949.png
new file mode 100644
index 0000000000..c60530df7f
Binary files /dev/null and b/windows/keep-secure/images/event-4949.png differ
diff --git a/windows/keep-secure/images/event-4950.png b/windows/keep-secure/images/event-4950.png
new file mode 100644
index 0000000000..fcf6504a6b
Binary files /dev/null and b/windows/keep-secure/images/event-4950.png differ
diff --git a/windows/keep-secure/images/event-4951.png b/windows/keep-secure/images/event-4951.png
new file mode 100644
index 0000000000..164e6bc717
Binary files /dev/null and b/windows/keep-secure/images/event-4951.png differ
diff --git a/windows/keep-secure/images/event-4953.png b/windows/keep-secure/images/event-4953.png
new file mode 100644
index 0000000000..438e9bf324
Binary files /dev/null and b/windows/keep-secure/images/event-4953.png differ
diff --git a/windows/keep-secure/images/event-4954.png b/windows/keep-secure/images/event-4954.png
new file mode 100644
index 0000000000..33f6da3866
Binary files /dev/null and b/windows/keep-secure/images/event-4954.png differ
diff --git a/windows/keep-secure/images/event-4956.png b/windows/keep-secure/images/event-4956.png
new file mode 100644
index 0000000000..fad74aef48
Binary files /dev/null and b/windows/keep-secure/images/event-4956.png differ
diff --git a/windows/keep-secure/images/event-4957.png b/windows/keep-secure/images/event-4957.png
new file mode 100644
index 0000000000..8805c6964b
Binary files /dev/null and b/windows/keep-secure/images/event-4957.png differ
diff --git a/windows/keep-secure/images/event-4964.png b/windows/keep-secure/images/event-4964.png
new file mode 100644
index 0000000000..13dd095a3f
Binary files /dev/null and b/windows/keep-secure/images/event-4964.png differ
diff --git a/windows/keep-secure/images/event-4985.png b/windows/keep-secure/images/event-4985.png
new file mode 100644
index 0000000000..f182c22d48
Binary files /dev/null and b/windows/keep-secure/images/event-4985.png differ
diff --git a/windows/keep-secure/images/event-5024.png b/windows/keep-secure/images/event-5024.png
new file mode 100644
index 0000000000..900efa51c7
Binary files /dev/null and b/windows/keep-secure/images/event-5024.png differ
diff --git a/windows/keep-secure/images/event-5025.png b/windows/keep-secure/images/event-5025.png
new file mode 100644
index 0000000000..1af6e5594c
Binary files /dev/null and b/windows/keep-secure/images/event-5025.png differ
diff --git a/windows/keep-secure/images/event-5027.png b/windows/keep-secure/images/event-5027.png
new file mode 100644
index 0000000000..30f8e9887e
Binary files /dev/null and b/windows/keep-secure/images/event-5027.png differ
diff --git a/windows/keep-secure/images/event-5028.png b/windows/keep-secure/images/event-5028.png
new file mode 100644
index 0000000000..c4fffb4a49
Binary files /dev/null and b/windows/keep-secure/images/event-5028.png differ
diff --git a/windows/keep-secure/images/event-5031.png b/windows/keep-secure/images/event-5031.png
new file mode 100644
index 0000000000..854c827ce8
Binary files /dev/null and b/windows/keep-secure/images/event-5031.png differ
diff --git a/windows/keep-secure/images/event-5033.png b/windows/keep-secure/images/event-5033.png
new file mode 100644
index 0000000000..d8eaad7cef
Binary files /dev/null and b/windows/keep-secure/images/event-5033.png differ
diff --git a/windows/keep-secure/images/event-5034.png b/windows/keep-secure/images/event-5034.png
new file mode 100644
index 0000000000..2b3d8464da
Binary files /dev/null and b/windows/keep-secure/images/event-5034.png differ
diff --git a/windows/keep-secure/images/event-5058.png b/windows/keep-secure/images/event-5058.png
new file mode 100644
index 0000000000..9cc4569845
Binary files /dev/null and b/windows/keep-secure/images/event-5058.png differ
diff --git a/windows/keep-secure/images/event-5059.png b/windows/keep-secure/images/event-5059.png
new file mode 100644
index 0000000000..5896afdaa5
Binary files /dev/null and b/windows/keep-secure/images/event-5059.png differ
diff --git a/windows/keep-secure/images/event-5061.png b/windows/keep-secure/images/event-5061.png
new file mode 100644
index 0000000000..dd953b85be
Binary files /dev/null and b/windows/keep-secure/images/event-5061.png differ
diff --git a/windows/keep-secure/images/event-5136.png b/windows/keep-secure/images/event-5136.png
new file mode 100644
index 0000000000..e1b8a249fd
Binary files /dev/null and b/windows/keep-secure/images/event-5136.png differ
diff --git a/windows/keep-secure/images/event-5137.png b/windows/keep-secure/images/event-5137.png
new file mode 100644
index 0000000000..423a9e4e9c
Binary files /dev/null and b/windows/keep-secure/images/event-5137.png differ
diff --git a/windows/keep-secure/images/event-5138.png b/windows/keep-secure/images/event-5138.png
new file mode 100644
index 0000000000..fee3c30140
Binary files /dev/null and b/windows/keep-secure/images/event-5138.png differ
diff --git a/windows/keep-secure/images/event-5139.png b/windows/keep-secure/images/event-5139.png
new file mode 100644
index 0000000000..f4966fa100
Binary files /dev/null and b/windows/keep-secure/images/event-5139.png differ
diff --git a/windows/keep-secure/images/event-5140.png b/windows/keep-secure/images/event-5140.png
new file mode 100644
index 0000000000..927285b3cb
Binary files /dev/null and b/windows/keep-secure/images/event-5140.png differ
diff --git a/windows/keep-secure/images/event-5141.png b/windows/keep-secure/images/event-5141.png
new file mode 100644
index 0000000000..350ca4e5bf
Binary files /dev/null and b/windows/keep-secure/images/event-5141.png differ
diff --git a/windows/keep-secure/images/event-5142.png b/windows/keep-secure/images/event-5142.png
new file mode 100644
index 0000000000..c2fffdf288
Binary files /dev/null and b/windows/keep-secure/images/event-5142.png differ
diff --git a/windows/keep-secure/images/event-5143.png b/windows/keep-secure/images/event-5143.png
new file mode 100644
index 0000000000..c301bde59d
Binary files /dev/null and b/windows/keep-secure/images/event-5143.png differ
diff --git a/windows/keep-secure/images/event-5144.png b/windows/keep-secure/images/event-5144.png
new file mode 100644
index 0000000000..96a6176367
Binary files /dev/null and b/windows/keep-secure/images/event-5144.png differ
diff --git a/windows/keep-secure/images/event-5145.png b/windows/keep-secure/images/event-5145.png
new file mode 100644
index 0000000000..73c1364328
Binary files /dev/null and b/windows/keep-secure/images/event-5145.png differ
diff --git a/windows/keep-secure/images/event-5152.png b/windows/keep-secure/images/event-5152.png
new file mode 100644
index 0000000000..2f06bab5b4
Binary files /dev/null and b/windows/keep-secure/images/event-5152.png differ
diff --git a/windows/keep-secure/images/event-5154.png b/windows/keep-secure/images/event-5154.png
new file mode 100644
index 0000000000..1ee4716063
Binary files /dev/null and b/windows/keep-secure/images/event-5154.png differ
diff --git a/windows/keep-secure/images/event-5156.png b/windows/keep-secure/images/event-5156.png
new file mode 100644
index 0000000000..93ac25973a
Binary files /dev/null and b/windows/keep-secure/images/event-5156.png differ
diff --git a/windows/keep-secure/images/event-5157.png b/windows/keep-secure/images/event-5157.png
new file mode 100644
index 0000000000..d44c2b5188
Binary files /dev/null and b/windows/keep-secure/images/event-5157.png differ
diff --git a/windows/keep-secure/images/event-5158.png b/windows/keep-secure/images/event-5158.png
new file mode 100644
index 0000000000..65b65085d3
Binary files /dev/null and b/windows/keep-secure/images/event-5158.png differ
diff --git a/windows/keep-secure/images/event-5168.png b/windows/keep-secure/images/event-5168.png
new file mode 100644
index 0000000000..509000797f
Binary files /dev/null and b/windows/keep-secure/images/event-5168.png differ
diff --git a/windows/keep-secure/images/event-5376.png b/windows/keep-secure/images/event-5376.png
new file mode 100644
index 0000000000..b439b4ee5b
Binary files /dev/null and b/windows/keep-secure/images/event-5376.png differ
diff --git a/windows/keep-secure/images/event-5377.png b/windows/keep-secure/images/event-5377.png
new file mode 100644
index 0000000000..061f81ce3c
Binary files /dev/null and b/windows/keep-secure/images/event-5377.png differ
diff --git a/windows/keep-secure/images/event-5378.png b/windows/keep-secure/images/event-5378.png
new file mode 100644
index 0000000000..d89a1a40dd
Binary files /dev/null and b/windows/keep-secure/images/event-5378.png differ
diff --git a/windows/keep-secure/images/event-5447.png b/windows/keep-secure/images/event-5447.png
new file mode 100644
index 0000000000..97b8fd61a6
Binary files /dev/null and b/windows/keep-secure/images/event-5447.png differ
diff --git a/windows/keep-secure/images/event-5632.png b/windows/keep-secure/images/event-5632.png
new file mode 100644
index 0000000000..2d732bd578
Binary files /dev/null and b/windows/keep-secure/images/event-5632.png differ
diff --git a/windows/keep-secure/images/event-5633.png b/windows/keep-secure/images/event-5633.png
new file mode 100644
index 0000000000..a6a378c5f7
Binary files /dev/null and b/windows/keep-secure/images/event-5633.png differ
diff --git a/windows/keep-secure/images/event-5888.png b/windows/keep-secure/images/event-5888.png
new file mode 100644
index 0000000000..028ee2be06
Binary files /dev/null and b/windows/keep-secure/images/event-5888.png differ
diff --git a/windows/keep-secure/images/event-5889.png b/windows/keep-secure/images/event-5889.png
new file mode 100644
index 0000000000..2e1164bb69
Binary files /dev/null and b/windows/keep-secure/images/event-5889.png differ
diff --git a/windows/keep-secure/images/event-5890.png b/windows/keep-secure/images/event-5890.png
new file mode 100644
index 0000000000..46b9cc8e30
Binary files /dev/null and b/windows/keep-secure/images/event-5890.png differ
diff --git a/windows/keep-secure/images/event-6144.png b/windows/keep-secure/images/event-6144.png
new file mode 100644
index 0000000000..b13fba0760
Binary files /dev/null and b/windows/keep-secure/images/event-6144.png differ
diff --git a/windows/keep-secure/images/event-6145.png b/windows/keep-secure/images/event-6145.png
new file mode 100644
index 0000000000..31cca8d59e
Binary files /dev/null and b/windows/keep-secure/images/event-6145.png differ
diff --git a/windows/keep-secure/images/event-6416.png b/windows/keep-secure/images/event-6416.png
new file mode 100644
index 0000000000..d4ba5077b2
Binary files /dev/null and b/windows/keep-secure/images/event-6416.png differ
diff --git a/windows/keep-secure/images/event-6419.png b/windows/keep-secure/images/event-6419.png
new file mode 100644
index 0000000000..c1a5604016
Binary files /dev/null and b/windows/keep-secure/images/event-6419.png differ
diff --git a/windows/keep-secure/images/event-6420.png b/windows/keep-secure/images/event-6420.png
new file mode 100644
index 0000000000..546589127c
Binary files /dev/null and b/windows/keep-secure/images/event-6420.png differ
diff --git a/windows/keep-secure/images/event-6421.png b/windows/keep-secure/images/event-6421.png
new file mode 100644
index 0000000000..a3cbe78e3c
Binary files /dev/null and b/windows/keep-secure/images/event-6421.png differ
diff --git a/windows/keep-secure/images/event-6422.png b/windows/keep-secure/images/event-6422.png
new file mode 100644
index 0000000000..74b1575dae
Binary files /dev/null and b/windows/keep-secure/images/event-6422.png differ
diff --git a/windows/keep-secure/images/event-6423.png b/windows/keep-secure/images/event-6423.png
new file mode 100644
index 0000000000..dc383d254e
Binary files /dev/null and b/windows/keep-secure/images/event-6423.png differ
diff --git a/windows/keep-secure/images/faa393df-4856-4431-9eda-4f4e5be72a90.gif b/windows/keep-secure/images/faa393df-4856-4431-9eda-4f4e5be72a90.gif
new file mode 100644
index 0000000000..d3c8021646
Binary files /dev/null and b/windows/keep-secure/images/faa393df-4856-4431-9eda-4f4e5be72a90.gif differ
diff --git a/windows/keep-secure/images/filters-xml-file.png b/windows/keep-secure/images/filters-xml-file.png
new file mode 100644
index 0000000000..9a35082fd7
Binary files /dev/null and b/windows/keep-secure/images/filters-xml-file.png differ
diff --git a/windows/keep-secure/images/firewall-settings-public-profile.png b/windows/keep-secure/images/firewall-settings-public-profile.png
new file mode 100644
index 0000000000..fc4ac0b4c6
Binary files /dev/null and b/windows/keep-secure/images/firewall-settings-public-profile.png differ
diff --git a/windows/keep-secure/images/group-policy-editor.png b/windows/keep-secure/images/group-policy-editor.png
new file mode 100644
index 0000000000..361e4c3943
Binary files /dev/null and b/windows/keep-secure/images/group-policy-editor.png differ
diff --git a/windows/keep-secure/images/group-policy.png b/windows/keep-secure/images/group-policy.png
new file mode 100644
index 0000000000..aa4dd8b838
Binary files /dev/null and b/windows/keep-secure/images/group-policy.png differ
diff --git a/windows/keep-secure/images/impact-property.png b/windows/keep-secure/images/impact-property.png
new file mode 100644
index 0000000000..b65b204b68
Binary files /dev/null and b/windows/keep-secure/images/impact-property.png differ
diff --git a/windows/keep-secure/images/ipconfig-command.png b/windows/keep-secure/images/ipconfig-command.png
new file mode 100644
index 0000000000..abebb23207
Binary files /dev/null and b/windows/keep-secure/images/ipconfig-command.png differ
diff --git a/windows/keep-secure/images/logging-settings-public-profile.png b/windows/keep-secure/images/logging-settings-public-profile.png
new file mode 100644
index 0000000000..32aceb9fee
Binary files /dev/null and b/windows/keep-secure/images/logging-settings-public-profile.png differ
diff --git a/windows/keep-secure/images/msb.png b/windows/keep-secure/images/msb.png
new file mode 100644
index 0000000000..fb546a41c4
Binary files /dev/null and b/windows/keep-secure/images/msb.png differ
diff --git a/windows/keep-secure/images/net-helpmsg-58.png b/windows/keep-secure/images/net-helpmsg-58.png
new file mode 100644
index 0000000000..53f96107ea
Binary files /dev/null and b/windows/keep-secure/images/net-helpmsg-58.png differ
diff --git a/windows/keep-secure/images/netsh-advfirewall-command.png b/windows/keep-secure/images/netsh-advfirewall-command.png
new file mode 100644
index 0000000000..56d7caa0c4
Binary files /dev/null and b/windows/keep-secure/images/netsh-advfirewall-command.png differ
diff --git a/windows/keep-secure/images/netsh-command.png b/windows/keep-secure/images/netsh-command.png
new file mode 100644
index 0000000000..56d7caa0c4
Binary files /dev/null and b/windows/keep-secure/images/netsh-command.png differ
diff --git a/windows/keep-secure/images/netsh-lan-command.png b/windows/keep-secure/images/netsh-lan-command.png
new file mode 100644
index 0000000000..776bbd1bd3
Binary files /dev/null and b/windows/keep-secure/images/netsh-lan-command.png differ
diff --git a/windows/keep-secure/images/offline-settings.png b/windows/keep-secure/images/offline-settings.png
new file mode 100644
index 0000000000..f9596725c1
Binary files /dev/null and b/windows/keep-secure/images/offline-settings.png differ
diff --git a/windows/keep-secure/images/powershelllogosmall.gif b/windows/keep-secure/images/powershelllogosmall.gif
new file mode 100644
index 0000000000..a27d8b9d9e
Binary files /dev/null and b/windows/keep-secure/images/powershelllogosmall.gif differ
diff --git a/windows/keep-secure/images/qmcryptoset.gif b/windows/keep-secure/images/qmcryptoset.gif
new file mode 100644
index 0000000000..4ba626b3ff
Binary files /dev/null and b/windows/keep-secure/images/qmcryptoset.gif differ
diff --git a/windows/keep-secure/images/query-session.png b/windows/keep-secure/images/query-session.png
new file mode 100644
index 0000000000..7e7a29e4fc
Binary files /dev/null and b/windows/keep-secure/images/query-session.png differ
diff --git a/windows/keep-secure/images/registry-editor-audit.png b/windows/keep-secure/images/registry-editor-audit.png
new file mode 100644
index 0000000000..055863b04b
Binary files /dev/null and b/windows/keep-secure/images/registry-editor-audit.png differ
diff --git a/windows/keep-secure/images/registry-editor-firewallrules.png b/windows/keep-secure/images/registry-editor-firewallrules.png
new file mode 100644
index 0000000000..5b3c291a9a
Binary files /dev/null and b/windows/keep-secure/images/registry-editor-firewallrules.png differ
diff --git a/windows/keep-secure/images/registry-editor.png b/windows/keep-secure/images/registry-editor.png
new file mode 100644
index 0000000000..5b3c291a9a
Binary files /dev/null and b/windows/keep-secure/images/registry-editor.png differ
diff --git a/windows/keep-secure/images/schema-search.png b/windows/keep-secure/images/schema-search.png
new file mode 100644
index 0000000000..6028e60fa1
Binary files /dev/null and b/windows/keep-secure/images/schema-search.png differ
diff --git a/windows/keep-secure/images/subkeys-under-security-key.png b/windows/keep-secure/images/subkeys-under-security-key.png
new file mode 100644
index 0000000000..fdef5ec55d
Binary files /dev/null and b/windows/keep-secure/images/subkeys-under-security-key.png differ
diff --git a/windows/keep-secure/images/subtree-deletion.png b/windows/keep-secure/images/subtree-deletion.png
new file mode 100644
index 0000000000..588960f260
Binary files /dev/null and b/windows/keep-secure/images/subtree-deletion.png differ
diff --git a/windows/keep-secure/images/synaptics.png b/windows/keep-secure/images/synaptics.png
new file mode 100644
index 0000000000..2ffc025437
Binary files /dev/null and b/windows/keep-secure/images/synaptics.png differ
diff --git a/windows/keep-secure/images/synaptics1.png b/windows/keep-secure/images/synaptics1.png
new file mode 100644
index 0000000000..81716c5ad1
Binary files /dev/null and b/windows/keep-secure/images/synaptics1.png differ
diff --git a/windows/keep-secure/images/synaptics2.png b/windows/keep-secure/images/synaptics2.png
new file mode 100644
index 0000000000..2fc2d10737
Binary files /dev/null and b/windows/keep-secure/images/synaptics2.png differ
diff --git a/windows/keep-secure/images/synaptics3.png b/windows/keep-secure/images/synaptics3.png
new file mode 100644
index 0000000000..cbcb7c466a
Binary files /dev/null and b/windows/keep-secure/images/synaptics3.png differ
diff --git a/windows/keep-secure/images/synaptics4.png b/windows/keep-secure/images/synaptics4.png
new file mode 100644
index 0000000000..67bfc1f857
Binary files /dev/null and b/windows/keep-secure/images/synaptics4.png differ
diff --git a/windows/keep-secure/images/synaptics5.png b/windows/keep-secure/images/synaptics5.png
new file mode 100644
index 0000000000..4e8285a462
Binary files /dev/null and b/windows/keep-secure/images/synaptics5.png differ
diff --git a/windows/keep-secure/images/synaptics6.png b/windows/keep-secure/images/synaptics6.png
new file mode 100644
index 0000000000..79c9b3a1a2
Binary files /dev/null and b/windows/keep-secure/images/synaptics6.png differ
diff --git a/windows/keep-secure/images/synaptics7.png b/windows/keep-secure/images/synaptics7.png
new file mode 100644
index 0000000000..2ffc025437
Binary files /dev/null and b/windows/keep-secure/images/synaptics7.png differ
diff --git a/windows/keep-secure/images/task-manager.png b/windows/keep-secure/images/task-manager.png
new file mode 100644
index 0000000000..47aa593f98
Binary files /dev/null and b/windows/keep-secure/images/task-manager.png differ
diff --git a/windows/keep-secure/images/wfas-design2example1.gif b/windows/keep-secure/images/wfas-design2example1.gif
new file mode 100644
index 0000000000..3d44049fa2
Binary files /dev/null and b/windows/keep-secure/images/wfas-design2example1.gif differ
diff --git a/windows/keep-secure/images/wfas-design3example1.gif b/windows/keep-secure/images/wfas-design3example1.gif
new file mode 100644
index 0000000000..cd11758ff4
Binary files /dev/null and b/windows/keep-secure/images/wfas-design3example1.gif differ
diff --git a/windows/keep-secure/images/wfas-designexample1.gif b/windows/keep-secure/images/wfas-designexample1.gif
new file mode 100644
index 0000000000..f2f730c70f
Binary files /dev/null and b/windows/keep-secure/images/wfas-designexample1.gif differ
diff --git a/windows/keep-secure/images/wfas-designflowchart1.gif b/windows/keep-secure/images/wfas-designflowchart1.gif
new file mode 100644
index 0000000000..369d0de563
Binary files /dev/null and b/windows/keep-secure/images/wfas-designflowchart1.gif differ
diff --git a/windows/keep-secure/images/wfas-domainiso.gif b/windows/keep-secure/images/wfas-domainiso.gif
new file mode 100644
index 0000000000..dd3040653f
Binary files /dev/null and b/windows/keep-secure/images/wfas-domainiso.gif differ
diff --git a/windows/keep-secure/images/wfas-domainisoencrypt.gif b/windows/keep-secure/images/wfas-domainisoencrypt.gif
new file mode 100644
index 0000000000..3ba2beae45
Binary files /dev/null and b/windows/keep-secure/images/wfas-domainisoencrypt.gif differ
diff --git a/windows/keep-secure/images/wfas-domainisohighsec.gif b/windows/keep-secure/images/wfas-domainisohighsec.gif
new file mode 100644
index 0000000000..49fae4ab6b
Binary files /dev/null and b/windows/keep-secure/images/wfas-domainisohighsec.gif differ
diff --git a/windows/keep-secure/images/wfas-domainnag.gif b/windows/keep-secure/images/wfas-domainnag.gif
new file mode 100644
index 0000000000..9e35fbc193
Binary files /dev/null and b/windows/keep-secure/images/wfas-domainnag.gif differ
diff --git a/windows/keep-secure/images/wfas-icon-checkbox.gif b/windows/keep-secure/images/wfas-icon-checkbox.gif
new file mode 100644
index 0000000000..5c7dfb0ebc
Binary files /dev/null and b/windows/keep-secure/images/wfas-icon-checkbox.gif differ
diff --git a/windows/keep-secure/images/wfas-implement.gif b/windows/keep-secure/images/wfas-implement.gif
new file mode 100644
index 0000000000..5a90b2fb97
Binary files /dev/null and b/windows/keep-secure/images/wfas-implement.gif differ
diff --git a/windows/keep-secure/images/wfasdomainisoboundary.gif b/windows/keep-secure/images/wfasdomainisoboundary.gif
new file mode 100644
index 0000000000..3c4c855649
Binary files /dev/null and b/windows/keep-secure/images/wfasdomainisoboundary.gif differ
diff --git a/windows/keep-secure/images/wfpstate-xml.png b/windows/keep-secure/images/wfpstate-xml.png
new file mode 100644
index 0000000000..88695f63ed
Binary files /dev/null and b/windows/keep-secure/images/wfpstate-xml.png differ
diff --git a/windows/keep-secure/images/whoami-privilege-list.png b/windows/keep-secure/images/whoami-privilege-list.png
new file mode 100644
index 0000000000..4c335aa7b5
Binary files /dev/null and b/windows/keep-secure/images/whoami-privilege-list.png differ
diff --git a/windows/keep-secure/images/windows-firewall-state-off.png b/windows/keep-secure/images/windows-firewall-state-off.png
new file mode 100644
index 0000000000..3be52d38ac
Binary files /dev/null and b/windows/keep-secure/images/windows-firewall-state-off.png differ
diff --git a/windows/keep-secure/images/windows-firewall-with-advanced-security.png b/windows/keep-secure/images/windows-firewall-with-advanced-security.png
new file mode 100644
index 0000000000..c6b59d896e
Binary files /dev/null and b/windows/keep-secure/images/windows-firewall-with-advanced-security.png differ
diff --git a/windows/keep-secure/images/windows-powershell-get-gpo.png b/windows/keep-secure/images/windows-powershell-get-gpo.png
new file mode 100644
index 0000000000..b6a818703c
Binary files /dev/null and b/windows/keep-secure/images/windows-powershell-get-gpo.png differ
diff --git a/windows/keep-secure/implementing-your-windows-firewall-with-advanced-security-design-plan.md b/windows/keep-secure/implementing-your-windows-firewall-with-advanced-security-design-plan.md
new file mode 100644
index 0000000000..25f0fba560
--- /dev/null
+++ b/windows/keep-secure/implementing-your-windows-firewall-with-advanced-security-design-plan.md
@@ -0,0 +1,47 @@
+---
+title: Implementing Your Windows Firewall with Advanced Security Design Plan (Windows 10)
+description: Implementing Your Windows Firewall with Advanced Security Design Plan
+ms.assetid: 15f609d5-5e4e-4a71-9eff-493a2e3e40f9
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Implementing Your Windows Firewall with Advanced Security Design Plan
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+The following are important factors in the implementation of your Windows Firewall with Advanced Security design plan:
+
+- **Group Policy**. The Windows Firewall with Advanced Security designs make extensive use of Group Policy deployed by Active Directory Domain Services (AD DS). A sound Group Policy infrastructure is required to successfully deploy the firewall and IPsec settings and rules to the devices on your network.
+
+- **Perimeter firewall**. Most organizations use a perimeter firewall to help protect the devices on the network from potentially malicious network traffic from outside of the organization's network boundaries. If you plan a deployment that includes a boundary zone to enable external devices to connect to devices in that zone, then you must allow that traffic through the perimeter firewall to the devices in the boundary zone.
+
+- **Devices running operating systems other than Windows**. If your network includes devices that are not running the Windows operating system, then you must make sure that required communication with those devices is not blocked by the restrictions put in place by your design. You must do one of the following:
+
+ - Include those devices in the isolated domain or zone by adding certificate-based authentication to your design. Many other operating systems can participate in an isolated domain or isolated server scenario, as long as certificate-based authentication is used.
+
+ - Include the device in the authentication exemption list included in your design. You can choose this option if for any reason the device cannot participate in the isolated domain design.
+
+## How to implement your Windows Firewall with Advanced Security design using this guide
+
+
+The next step in implementing your design is to determine in what order each of the deployment steps must be performed. This guide uses checklists to help you accomplish the various deployment tasks that are required to implement your design plan. As the following diagram shows, checklists and subchecklists are used as necessary to provide the end-to-end procedure for deploying a design.
+
+
+
+Use the following parent checklists in this section of the guide to become familiar with the deployment tasks for implementing your organization's Windows Firewall with Advanced Security design.
+
+- [Checklist: Implementing a Basic Firewall Policy Design](checklist-implementing-a-basic-firewall-policy-design.md)
+
+- [Checklist: Implementing a Domain Isolation Policy Design](checklist-implementing-a-domain-isolation-policy-design.md)
+
+- [Checklist: Implementing a Domain Isolation Policy Design](checklist-implementing-a-domain-isolation-policy-design.md)
+
+- [Checklist: Implementing a Certificate-based Isolation Policy Design](checklist-implementing-a-certificate-based-isolation-policy-design.md)
+
+The procedures in these checklists use the Group Policy MMC snap-in interfaces to configure firewall and connection security rules in GPOs, but you can also use Windows PowerShell. For more information, see [Windows Firewall with Advanced Security Administration with Windows PowerShell](windows-firewall-with-advanced-security-administration-with-windows-powershell.md). This guide recommends using GPOs in a specific way to deploy the rules and settings for your design. For information about deploying your GPOs, see [Planning Group Policy Deployment for Your Isolation Zones](planning-group-policy-deployment-for-your-isolation-zones.md) and the checklist [Checklist: Creating Group Policy Objects](checklist-creating-group-policy-objects.md).
diff --git a/windows/keep-secure/isolated-domain-gpos.md b/windows/keep-secure/isolated-domain-gpos.md
new file mode 100644
index 0000000000..b7f6c3b921
--- /dev/null
+++ b/windows/keep-secure/isolated-domain-gpos.md
@@ -0,0 +1,26 @@
+---
+title: Isolated Domain GPOs (Windows 10)
+description: Isolated Domain GPOs
+ms.assetid: e254ce4a-18c6-4868-8179-4078d9de215f
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Isolated Domain GPOs
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+All of the devices in the isolated domain are added to the group CG\_DOMISO\_IsolatedDomain. You must create multiple GPOs to align with this group, one for each Windows operating system that must have different rules or settings to implement the basic isolated domain functionality that you have in your isolated domain. This group is granted Read and Apply Group Policy permissions on all the GPOs described in this section.
+
+Each GPO has a security group filter that prevents the GPO from applying to members of the group GP\_DOMISO\_No\_IPsec. A WMI filter is attached to each GPO to ensure that the GPO is applied to only the specified version of Windows. For more information, see the [Planning GPO Deployment](planning-gpo-deployment.md) section.
+
+The GPOs created for the Woodgrove Bank isolated domain include the following:
+
+- [GPO\_DOMISO\_IsolatedDomain\_Clients](gpo-domiso-isolateddomain-clients.md)
+
+- [GPO\_DOMISO\_IsolatedDomain\_Servers](gpo-domiso-isolateddomain-servers.md)
diff --git a/windows/keep-secure/isolated-domain.md b/windows/keep-secure/isolated-domain.md
new file mode 100644
index 0000000000..3d23484bf9
--- /dev/null
+++ b/windows/keep-secure/isolated-domain.md
@@ -0,0 +1,59 @@
+---
+title: Isolated Domain (Windows 10)
+description: Isolated Domain
+ms.assetid: d6fa8d67-0078-49f6-9bcc-db1f24816c5e
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Isolated Domain
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+The isolated domain is the primary zone for trusted devices. The devices in this zone use connection security and firewall rules to control the communications that can be sent between devices in the zone.
+
+The term *domain* in this context means a boundary of communications trust instead of an Active Directory domain. In this solution the two constructs are very similar because Active Directory domain authentication (Kerberos V5) is required for accepting inbound connections from trusted devices. However, many Active Directory domains (or forests) can be linked with trust relationships to provide a single, logical, isolated domain. In addition, devices that authenticate by using certificates can also be included in an isolated domain without joining the Active Directory domain.
+
+For most implementations, an isolated domain will contain the largest number of devices. Other isolation zones can be created for the solution if their communication requirements differ from those of the isolated domain. Examples of these differences are what result in the boundary and encryption zones described in this guide. Conceptually, the isolated domain is just the largest isolation zone, and a superset to the other zones.
+
+You must create a group in Active Directory to contain members of the isolated domain. You then apply one of several GPOs that contain connection security and firewall rules to the group so that authentication on all inbound network connections is enforced. Creation of the group and how to link the GPOs that apply the rules to its members are discussed in the [Planning Group Policy Deployment for Your Isolation Zones](planning-group-policy-deployment-for-your-isolation-zones.md) section.
+
+The GPOs for the isolated domain should contain the following connection security rules and settings.
+
+## GPO settings for isolated domain members running at least Windows Vista and Windows Server 2008
+
+
+GPOs for devices running at least Windows Vista and Windows Server 2008 should include the following:
+
+- IPsec default settings that specify the following options:
+
+ 1. Exempt all ICMP traffic from IPsec.
+
+ 2. Key exchange (main mode) security methods and algorithm. We recommend that you use at least DH4, AES and SHA2 in your settings. Use the strongest algorithm combinations that are common to all your supported operating systems.
+
+ 3. Data protection (quick mode) algorithm combinations. We recommend that you do not include DES, or MD5 in any setting. They are included only for compatibility with previous versions of Windows. Use the strongest algorithm combinations that are common to all your supported operating systems.
+
+ If any NAT devices are present on your networks, use ESP encapsulation. If isolated domain members must communicate with hosts in the encryption zone, ensure that you include algorithms that are compatible with the requirements of the encryption mode policies.
+
+ 4. Authentication methods. Include at least device-based Kerberos V5 authentication. If you want to use user-based access to isolated servers, then also include user-based Kerberos V5 as an optional authentication method. Likewise, if any of your isolated domain members cannot use Kerberos V5 authentication, then include certificate-based authentication as an optional authentication method.
+
+- The following connection security rules:
+
+ - A connection security rule that exempts all devices on the exemption list from authentication. Be sure to include all your Active Directory domain controllers on this list. Enter subnet addresses, where possible, instead of discrete addresses, if applicable in your environment.
+
+ - A connection security rule, from any IP address to any, that requires inbound and requests outbound authentication by using Kerberos V5 authentication.
+
+ >**Important:** Be sure to begin operations by using request in and request out behavior until you are sure that all the devices in your IPsec environment are communicating successfully by using IPsec. After confirming that IPsec is operating as expected, you can change the policy to require in, request out.
+
+- A registry policy that includes the following values:
+
+ - Enable PMTU discovery. Enabling this setting allows TCP/IP to dynamically determine the largest packet size supported across a connection. The value is found at HKLM\\System\\CurrentControlSet\\Services\\TCPIP\\Parameters\\EnablePMTUDiscovery (dword). The sample GPO preferences XML file in [Appendix A: Sample GPO Template Files for Settings Used in this Guide](appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md) sets the value to **1**.
+
+ >**Note:** For a sample template for these registry settings, see [Appendix A: Sample GPO Template Files for Settings Used in this Guide](appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md).
+
+**Next: **[Boundary Zone](boundary-zone.md)
diff --git a/windows/keep-secure/isolating-apps-on-your-network.md b/windows/keep-secure/isolating-apps-on-your-network.md
new file mode 100644
index 0000000000..09367196c5
--- /dev/null
+++ b/windows/keep-secure/isolating-apps-on-your-network.md
@@ -0,0 +1,249 @@
+---
+title: Isolating Windows Store Apps on Your Network (Windows 10)
+description: Isolating Windows Store Apps on Your Network
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Isolating Windows Store Apps on Your Network
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+When you add new devices to your network, you may want to customize your Windows Firewall configuration to isolate the network access of the new Windows Store apps that run on them. Developers who build Windows Store apps can declare certain app capabilities that enable different classes of network access. A developer can decide what kind of network access the app requires and configure this capability for the app. When the app is installed on a device, appropriate firewall rules are automatically created to enable access. You can then customize the firewall configuration to further fine-tune this access if they desire more control over the network access for the app.
+
+For example, a developer can decide that their app should only connect to trusted local networks (such as at home or work), and not to the Internet. In this way, developers can define the scope of network access for their app. This network isolation prevents an app from accessing a network and a connection type (inbound or outbound) if the connection has not been configured for the app. Then the network administrator can customize the firewall to further restrict the resources that the app can access.
+
+The ability to set and enforce these network boundaries ensures that apps that get compromised can only access networks where they have been explicitly granted access. This significantly reduces the scope of their impact on other apps, the device, and the network. In addition, apps can be isolated and protected from malicious access from the network.
+
+When creating new Windows Store apps, a developer can define the following network capabilities for their app:
+
+- **Home\\Work Networking**
+
+ Provides inbound and outbound access to intranet networks that the user has designated as a home or a work network, or if the network has an authenticated domain controller.
+
+- **Internet (Client)**
+
+ Provides outbound access to the Internet and untrusted networks, such as airports and coffee shops (for example, intranet networks where the user has designated the network as Public). Most apps that require Internet access should use this capability.
+
+- **Internet (Client and Server)**
+
+ Provides inbound and outbound access to the Internet and untrusted networks, such as airports and coffee shops. This capability is a superset of the **Internet (Client)** capability, and **Internet (Client)** does not need to be enabled if this capability is enabled.
+
+- **Proximity**
+
+ Provides near-field communication (NFC) with devices that are in close proximity to the device. Proximity may be used to send files or connect with an application on a proximate device.
+
+**In this topic**
+
+To isolate Windows Store apps on your network, you need to use Group Policy to define your network isolation settings and create custom Windows Store app firewall rules.
+
+- [Prerequisites](#prerequisites)
+
+- [Step 1: Define your network](#step-1-Define-your-network)
+
+- [Step 2: Create custom firewall rules](#step-2-create-custom-firewall-rules)
+
+## Prerequisites
+
+- A domain controller is installed on your network, and your devices are joined to the Windows domain.
+
+- Your Windows Store app is installed on the client device.
+
+- The Remote Server Administration Tools (RSAT) are installed on your client device. When you perform the following steps from your client device, you can select your Windows Store app when you create Windows Firewall rules.
+
+ >**Note:** You can install the RSAT on your device running Windows 10 from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=45520).
+
+
+## Step 1: Define your network
+
+The **Home\\Work Networking** capability enables access to intranet resources. Administrators can use Group Policy settings to define the scope of the intranet. This ensures that Windows Store apps can access intranet resources appropriately.
+
+A network endpoint is considered part of the **Home\\Work Network** if:
+
+- It is part of the local subnet of a trusted network.
+
+ For example, home users generally flag their network as Trusted. Local devices will be designated as such.
+
+- A device is on a network, and it is authenticated to a domain controller.
+
+ - Endpoints within the intranet address space are considered private.
+
+ - Endpoints within the local subnet are considered private.
+
+- The device is configured for DirectAccess, and the endpoint is part of the intranet address space.
+
+The intranet address space is composed of configured Active Directory sites and subnets, and it is configured for Windows network isolation specifically by using Group Policy. You can disable the usage of Active Directory sites and subnets by using Group Policy by declaring that your subnet definitions are authoritative.
+
+Any proxies that you configure or that are automatically configured with proxy autoconfiguration (by using Web Proxy Auto-Discovery (WPAD) protocol) are exempt from the intranet zone. You can add proxy addresses by using Group Policy.
+
+All other endpoints that do not meet the previously stated criteria are considered endpoints on the Internet.
+
+**To configure a GPO that defines your intranet address space**
+
+1. Open the Group Policy Management snap-in (gpmc.msc) and edit the Default Domain Policy.
+
+2. From the Group Policy Management Editor, expand **Computer Configuration**, expand **Policies**, expand **Administrative Templates**, expand **Network**, and click **Network Isolation**.
+
+3. In the right pane, double-click **Private network ranges for apps**.
+
+4. In the **Private network ranges for apps** dialog box, click **Enabled**. In the **Private subnets** text box, type the private subnets for your intranet, separated by commas if necessary.
+
+ For example, if the Contoso intranet is defined as 10.0.0.0 with a subnet mask of 255.255.255.0, you would type 10.0.0.0/24 in the **Private subnets** text box.
+
+5. Double-click **Subnet definitions are authoritative**.
+
+ If you want the subnet definitions that you previously created to be the single source for your subnet definition, click **Enabled**. Otherwise, leave the **Not Configured** default so that you can add additional subnets by using local settings or network isolation heuristics.
+
+**To configure the proxy addresses for the intranet and Internet**
+
+1. Double-click **Internet proxy servers for apps**. Click **Enabled**, and then in the **Domain Proxies** text box, type the IP addresses of your Internet proxy servers, separated by semicolons.
+
+2. Double-click **Intranet proxy servers for apps**. Click **Enabled**, and then in the IP address text box, type the IP addresses of your intranet proxy servers, separated by semicolons.
+
+3. Double-click **Proxy definitions are authoritative**.
+
+ If you want the proxy definitions that you previously created to be the single source for your proxy definition, click **Enabled**. Otherwise, leave the **Not Configured** default so that you can add additional proxies by using local settings or network isolation heuristics.
+
+## Step 2: Create custom firewall rules
+
+Windows Store apps can declare many capabilities in addition to the network capabilities discussed previously. For example, apps can declare capabilities to access user identity, the local file system, and certain hardware devices.
+
+The following table provides a complete list of the possible app capabilities.
+
+| Capability | Name | Description |
+| - | - | - |
+| **Internet (Client)** | internetClient | Your outgoing Internet connection.|
+| **Internet (Client & Server)** | internetClientServer| Your Internet connection, including incoming unsolicited connections from the Internet The app can send information to or from your device through a firewall. You do not need to declare **internetClient** if this capability is declared.
+| **Home\Work Networking** |privateNetworkClientServer| A home or work network. The app can send information to or from your device and other devices on the same network.|
+| **Document Library Access**| documentsLibrary| Your Documents library, including the capability to add, change, or delete files. The package can only access file types that are declared in the manifest.|
+| **Picture Library Access**| picturesLibrary| Your Pictures library, including the capability to add, change, or delete files.|
+| **Video Library Access**| videosLibrary| Your Videos library, including the capability to add, change, or delete files.|
+| **Music Library Access**| musicLibrary|Your Music library, including the capability to add, change, or delete files.|
+| **Default Windows Credentials**| defaultWindowsCredentials| Your Windows credentials for access to a corporate intranet. This application can impersonate you on the network.|
+| **Removable Storage** | removableStorage| A removable storage device, such as an external hard disk, USB flash drive, or MTP portable device, including the capability to add, change, or delete specific files. This package can only access file types that are declared in the manifest.|
+| **Shared User Certificates**| sharedUserCertificates| Software and hardware certificates or a smart card, which the app uses to identify you. This capability can be used by an employer, a bank, or government services to identify you.|
+| **Location**| location| Provides access to the user's current location.|
+| **Microphone** | microphone| Provides access to the microphone's audio feed.|
+| **Near-field Proximity** | proximity| Required for near-field communication (NFC) between devices in close proximity. NFC can be used to send files or connect with an app on a proximate device.|
+| **Text Messaging** | sms| Provides access to text messaging functionality.|
+| **Webcam** | webcam| Provides access to the webcam's video feed.|
+| **Other devices (represented by GUIDs)** | <GUID>| Includes specialized devices and Windows Portable Devices.|
+
+You can create a Windows Firewall policy that is scoped to a set of apps that use a specified capability or scoped to a specific Windows Store app.
+
+For example, you could create a Windows Firewall policy to block Internet access for any apps on your network that have the Documents Library capability.
+
+**To block Internet access for any apps on your network that have the Documents Library capability**
+
+1. Open the Group Policy Management snap-in (gpmc.msc).
+
+2. In the left pane, right-click your domain name and click **Create a GPO in this domain, and link it here**.
+
+3. Type a name for the GPO in the **Name** text box, and then click **OK**.
+
+4. Right-click the new GPO, and then click **Edit**.
+
+5. In the Group Policy Management Editor, expand **Computer Configuration**, expand **Policies**, expand **Windows Settings**, expand **Security Settings**, expand **Windows Firewall with Advanced Security**, and click **Windows Firewall with Advanced Security – LDAP://…**
+
+6. Right-click **Outbound Rules**, and then click **New Rule**.
+
+7. Click **Custom**, and then click **Next**.
+
+8. Click **Next** on the **Program** page, the **Protocols and Ports** page, and the **Scope** page.
+
+9. On the **Action** page, ensure that **Block the Connection** is selected, and then click **Next**.
+
+10. On the **Profile** page, click **Next**.
+
+11. On the **Name** page, type a name for your rule, and then click **Finish**.
+
+12. In the right pane, right-click your new rule and click **Properties**.
+
+13. Click the **Local Principals** tab, select the **Only allow connections from these users** check box, and then click **Add**.
+
+14. Click **Application Package Properties**, and then click **OK**.
+
+15. In the **Choose Capabilities** dialog box, click **APPLICATION PACKAGE AUTHORITY\\Your documents library**, and then click **OK**.
+
+16. Click the **Scope** tab under **Remote IP addresses**, and then click **Add**.
+
+17. Click **Predefined set of computers**, select **Internet**, and click **OK**.
+
+ This scopes the rule to block traffic to Internet devices.
+
+18. Click the **Programs and Services** tab, and in the **Application Packages** area, click **Settings**.
+
+19. Click **Apply to application packages only**, and then click **OK**.
+
+ >**Important:** You must do this to ensure that the rule applies only to Windows Store apps and not to other apps. Desktop apps declare all capabilities by default, and this rule would apply to them if you do not configure it this way.
+
+20. Click **OK** to close the **Properties** dialog box.
+
+21. Close the Group Policy Management Editor.
+
+22. In the Group Policy Management snap-in, ensure that your new GPO is selected, and in the right pane under **Security Filtering**, select **Authenticated Users**. Click **Remove**, and then click **OK**.
+
+23. Under **Security Filtering**, click **Add**.
+
+24. Type **domain computers** in the text box, and then click **OK**.
+
+25. Close the Group Policy Management snap-in.
+
+Use the following procedure if you want to block intranet access for a specific media sharing app on your network.
+
+**To block intranet access for a specific media sharing app on your network**
+
+1. Open the Group Policy Management snap-in (gpmc.msc).
+
+2. In the left pane, right-click your domain name, and then click **Create a GPO in this domain, and link it here**.
+
+3. Type a name for your GPO in the **Name** text box, and then click **OK**.
+
+4. Right-click your new GPO, and then click **Edit**.
+
+5. From the Group Policy Management Editor, expand **Computer Configuration**, expand **Policies**, expand **Windows Settings**, expand **Security Settings**, expand **Windows Firewall with Advanced Security**, and then click **Windows Firewall with Advanced Security – LDAP://**…
+
+6. Right-click **Outbound Rules**, and then click **New Rule**.
+
+7. Click **Custom**, and then click **Next**.
+
+8. Click **Next** on the **Program** page, the **Protocols and Ports** page, and the **Scope** page.
+
+9. On the **Action** page, ensure **Block the Connection** is selected, and then click **Next**.
+
+10. On the **Profile** page, click **Next**.
+
+11. On the **Name** page, type a name for your rule, and then click **Finish**.
+
+12. In the right pane, right-click your new rule, and then click **Properties**.
+
+13. Click the **Local Principals** tab, select the **Only allow connections from these users** check box, and then click **Add**.
+
+14. Click **Application Package Properties**, and then click **OK**.
+
+15. In the **Choose Capabilities** dialog box, click **APPLICATION PACKAGE AUTHORITY\\A home or work network**, and then click **OK**.
+
+16. Click the **Programs and Services** tab under **Application Packages**, and then click **Settings**.
+
+17. Click **Apply to this application package**, select the app in the text box, and then click **OK**.
+
+18. Click **OK** to close the **Properties** dialog box.
+
+19. Close the Group Policy Management Editor.
+
+20. In Group Policy Management, ensure that your new GPO is selected, and in the right pane under **Security Filtering**, select **Authenticated Users**, click **Remove**, and then click **OK**.
+
+21. Under **Security Filtering**, click **Add**.
+
+22. Type **domain computers** in the text box and click **OK**.
+
+23. Close Group Policy Management.
+
+## See also
+
+- [Windows Firewall with Advanced Security Overview](windows-firewall-with-advanced-security.md)
diff --git a/windows/keep-secure/link-the-gpo-to-the-domain.md b/windows/keep-secure/link-the-gpo-to-the-domain.md
new file mode 100644
index 0000000000..ab224211e6
--- /dev/null
+++ b/windows/keep-secure/link-the-gpo-to-the-domain.md
@@ -0,0 +1,38 @@
+---
+title: Link the GPO to the Domain (Windows 10)
+description: Link the GPO to the Domain
+ms.assetid: 746d4553-b1a6-4954-9770-a948926b1165
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Link the GPO to the Domain
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+After you create the GPO and configure it with security group filters and WMI filters, you must link the GPO to the container in Active Directory that contains all of the target devices.
+
+If the filters comprehensively control the application of the GPO to only the correct devices, then you can link the GPO to the domain container. Alternatively, you can link the GPO to a site container or organizational unit if you want to limit application of the GPO to that subset of devices.
+
+**Administrative credentials**
+
+To complete this procedure, you must be a member of the Domain Admins group, or otherwise be delegated permissions to modify the GPOs.
+
+To link the GPO to the domain container in Active Directory
+
+1. Open the Group Policy Management console.
+
+2. In the navigation pane, expand **Forest:** *YourForestName*, expand **Domains**, and then expand *YourDomainName*.
+
+3. Right-click *YourDomainName*, and then click **Link an Existing GPO**.
+
+4. In the **Select GPO** dialog box, select the GPO that you want to deploy, and then click **OK**.
+
+5. The GPO appears in the **Linked Group Policy Objects** tab in the details pane and as a linked item under the domain container in the navigation pane.
+
+6. You can adjust the order of the linked GPOs to ensure that the higher priority GPOs are processed last. Select a GPO and click the up or down arrows to move it. The GPOs are processed by the client device from the highest link order number to the lowest.
diff --git a/windows/keep-secure/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md b/windows/keep-secure/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md
new file mode 100644
index 0000000000..3187e17371
--- /dev/null
+++ b/windows/keep-secure/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md
@@ -0,0 +1,33 @@
+---
+title: Mapping Your Deployment Goals to a Windows Firewall with Advanced Security Design (Windows 10)
+description: Mapping Your Deployment Goals to a Windows Firewall with Advanced Security Design
+ms.assetid: 7e68c59e-ba40-49c4-8e47-5de5d6b5eb22
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Mapping Your Deployment Goals to a Windows Firewall with Advanced Security Design
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+After you finish reviewing the existing Windows Firewall with Advanced Security deployment goals and you determine which goals are important to your specific deployment, you can map those goals to a specific Windows Firewall with Advanced Security design.
+
+>**Important:** The first three designs presented in this guide build on each other to progress from simpler to more complex. Therefore during deployment, consider implementing them in the order presented. Each deployed design also provides a stable position from which to evaluate your progress, and to make sure that your goals are being met before you continue to the next design.
+
+Use the following table to determine which Windows Firewall with Advanced Security design maps to the appropriate combination of Windows Firewall with Advanced Security deployment goals for your organization. This table refers only to the Windows Firewall with Advanced Security designs as described in this guide. However, you can create a hybrid or custom Windows Firewall with Advanced Security design by using any combination of the Windows Firewall with Advanced Security deployment goals to meet the needs of your organization.
+
+| Deployment Goals | Basic Firewall Policy Design | Domain Isolation Policy Design | Server Isolation Policy Design | Certificate-based Isolation Policy Design |
+| - |- | - | - | - |
+| [Protect Devices from Unwanted Network Traffic](protect-devices-from-unwanted-network-traffic.md)| Yes| Yes| Yes| Yes|
+| [Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md) | -| Yes| Yes| Yes|
+| [Restrict Access to Only Specified Users or Devices](restrict-access-to-only-specified-users-or-devices.md)| -| -| Yes| Yes|
+| [Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md)| -| Optional| Optional| Optional|
+
+To examine details for a specific design, click the design title at the top of the column in the preceding table.
+
+**Next: **[Basic Firewall Policy Design](basic-firewall-policy-design.md)
diff --git a/windows/keep-secure/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md b/windows/keep-secure/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md
new file mode 100644
index 0000000000..95ab7cda01
--- /dev/null
+++ b/windows/keep-secure/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md
@@ -0,0 +1,74 @@
+---
+title: Modify GPO Filters to Apply to a Different Zone or Version of Windows (Windows 10)
+description: Modify GPO Filters to Apply to a Different Zone or Version of Windows
+ms.assetid: 24ede9ca-a501-4025-9020-1129e2cdde80
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Modify GPO Filters to Apply to a Different Zone or Version of Windows
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+You must reconfigure your copied GPO so that it contains the correct security group and WMI filters for its new role. If you are creating the GPO for the isolated domain, use the [Block members of a group from applying a GPO](#to-block-members-of-a-group-from-applying-a-gpo) procedure to prevent members of the boundary and encryption zones from incorrectly applying the GPOs for the main isolated domain.
+
+**Administrative credentials**
+
+To complete these procedures, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the GPOs.
+
+In this topic:
+
+- [Change the security group filter for a GPO](#to-change-the-security-group-filter-for-a-gpo)
+
+- [Block members of a group from applying a GPO](#to-block-members-of-a-group-from-applying-a-gpo)
+
+- [Remove a block for members of a group from applying a GPO](#to-remove-a-block-for-members-of-group-from-applying-a-gpo)
+
+## To change the security group filter for a GPO
+
+1. Open the Group Policy Management console.
+
+2. In the navigation pane, find and then click the GPO that you want to modify.
+
+3. In the details pane, under **Security Filtering**, click the currently assigned security group, and then click **Remove**.
+
+4. Now you can add the appropriate security group to this GPO. Under **Security Filtering**, click **Add**.
+
+5. In the **Select User, Computer, or Group** dialog box, type the name of the group whose members are to apply the GPO, and then click **OK**. If you do not know the name, you can click **Advanced** to browse the list of groups available in the domain.
+
+## To block members of a group from applying a GPO
+
+1. Open the Group Policy Management console.
+
+2. In the navigation pane, find and then click the GPO that you want to modify.
+
+3. In the details pane, click the **Delegation** tab.
+
+4. Click **Advanced**.
+
+5. Under the **Group or user names** list, click **Add**.
+
+6. In the **Select User, Computer, or Group** dialog box, type the name of the group whose members are to be prevented from applying the GPO, and then click **OK**. If you do not know the name, you can click **Advanced** to browse the list of groups available in the domain.
+
+7. Select the group in the **Group or user names** list, and then select the boxes in the **Deny** column for both **Read** and **Apply group policy**.
+
+8. Click **OK**, and then in the **Windows Security** dialog box, click **Yes**.
+
+9. The group appears in the list with custom permissions.
+
+## To remove a block for members of group from applying a GPO
+
+1. Open the Group Policy Management console.
+
+2. In the navigation pane, find and then click the GPO that you want to modify.
+
+3. In the details pane, click the **Delegation** tab.
+
+4. In the **Groups and users** list, select the group that should no longer be blocked, and then click **Remove**.
+
+5. In the message box, click **OK**.
diff --git a/windows/keep-secure/open-the-group-policy-management-console-to-ip-security-policies.md b/windows/keep-secure/open-the-group-policy-management-console-to-ip-security-policies.md
new file mode 100644
index 0000000000..f29f5afbb7
--- /dev/null
+++ b/windows/keep-secure/open-the-group-policy-management-console-to-ip-security-policies.md
@@ -0,0 +1,26 @@
+---
+title: Open the Group Policy Management Console to IP Security Policies (Windows 10)
+description: Open the Group Policy Management Console to IP Security Policies
+ms.assetid: 235f73e4-37b7-40f4-a35e-3e7238bbef43
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Open the Group Policy Management Console to IP Security Policies
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+Procedures in this guide that refer to GPOs for earlier versions of the Windows operating system instruct you to work with the IP Security Policy section in the Group Policy Management Console (GPMC).
+
+**To open a GPO to the IP Security Policies section**
+
+1. Open the Group Policy Management console.
+
+2. In the navigation pane, expand **Forest:** *YourForestName*, expand **Domains**, expand *YourDomainName*, expand **Group Policy Objects**, right-click the GPO you want to modify, and then click **Edit**.
+
+3. In the navigation pane of the Group Policy Management Editor, expand **Computer Configuration**, expand **Policies**, expand **Windows Settings**, expand **Security Settings**, and then click **IP Security Policies on Active Directory (***YourDomainName***)**.
\ No newline at end of file
diff --git a/windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md b/windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md
new file mode 100644
index 0000000000..e179647bac
--- /dev/null
+++ b/windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md
@@ -0,0 +1,26 @@
+---
+title: Open the Group Policy Management Console to Windows Firewall with Advanced Security (Windows 10)
+description: Open the Group Policy Management Console to Windows Firewall with Advanced Security
+ms.assetid: 28afab36-8768-4938-9ff2-9d6dab702e98
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Open the Group Policy Management Console to Windows Firewall with Advanced Security
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+Most of the procedures in this guide instruct you to use Group Policy settings for Windows Firewall with Advanced Security.
+
+To open a GPO to Windows Firewall with Advanced Security
+
+1. Open the Group Policy Management console.
+
+2. In the navigation pane, expand **Forest:** *YourForestName*, expand **Domains**, expand *YourDomainName*, expand **Group Policy Objects**, right-click the GPO you want to modify, and then click **Edit**.
+
+3. In the navigation pane of the Group Policy Management Editor, navigate to **Computer Configuration** > **Policies** > **Windows Settings** > **Security Settings** > **Windows Firewall with Advanced Security** > **Windows Firewall with Advanced Security - LDAP://cn={***GUID***},cn=…**.
diff --git a/windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall.md b/windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall.md
new file mode 100644
index 0000000000..2d848ec539
--- /dev/null
+++ b/windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall.md
@@ -0,0 +1,26 @@
+---
+title: Open the Group Policy Management Console to Windows Firewall (Windows 10)
+description: Open the Group Policy Management Console to Windows Firewall
+ms.assetid: 5090b2c8-e038-4905-b238-19ecf8227760
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Open the Group Policy Management Console to Windows Firewall
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+To open a GPO to Windows Firewall
+
+1. Open the Active Directory Users and Computers console.
+
+2. In the navigation pane, expand *YourDomainName*, right-click the container that your GPO is linked to, and then click **Properties**.
+
+3. Click the **Group Policy** tab, select your GPO, and then click **Edit**.
+
+4. In the navigation pane of the Group Policy Object Editor, navigate to **Computer Configuration** > **Administrative Templates** > **Network** > **Network Connections** > **Windows Firewall**.
diff --git a/windows/keep-secure/open-windows-firewall-with-advanced-security.md b/windows/keep-secure/open-windows-firewall-with-advanced-security.md
new file mode 100644
index 0000000000..cda993d4ad
--- /dev/null
+++ b/windows/keep-secure/open-windows-firewall-with-advanced-security.md
@@ -0,0 +1,46 @@
+---
+title: Open Windows Firewall with Advanced Security (Windows 10)
+description: Open Windows Firewall with Advanced Security
+ms.assetid: 788faff2-0f50-4e43-91f2-3e2595c0b6a1
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Open Windows Firewall with Advanced Security
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+This procedure shows you how to open the Windows Firewall with Advanced Security console.
+
+**Administrative credentials**
+
+To complete this procedure, you must be a member of the Administrators group. For more information, see Additional considerations.
+
+## Opening Windows Firewall with Advanced Security
+
+- [Using the Windows interface](#to-open-windows-firewall-with-advanced-security-using-the-ui)
+
+- [Using a command line](#to-open-windows-firewall-with-advanced-security-from-a-command-prompt)
+
+## To open Windows Firewall with Advanced Security using the UI
+
+Click Start, type **Windows Firewall with Advanced Security**, and the press ENTER.
+
+## To open Windows Firewall with Advanced Security from a command prompt
+
+1. Open a command prompt window.
+
+2. At the command prompt, type:
+
+ ``` syntax
+ wf.msc
+ ```
+
+**Additional considerations**
+
+Although standard users can start the Windows Firewall with Advanced Security MMC snap-in, to change most settings the user must be a member of a group with the permissions to modify those settings, such as Administrators.
diff --git a/windows/keep-secure/other-events.md b/windows/keep-secure/other-events.md
new file mode 100644
index 0000000000..6a5cf852d1
--- /dev/null
+++ b/windows/keep-secure/other-events.md
@@ -0,0 +1,31 @@
+---
+title: Other Events (Windows 10)
+description: Describes the Other Events auditing subcategory.
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+author: Mir0sh
+---
+
+# Other Events
+
+**Applies to**
+- Windows 10
+- Windows Server 2016
+
+
+Events in this section generate automatically and are enabled by default.
+
+**Events List:**
+
+- [1100](event-1100.md)(S): The event logging service has shut down.
+
+- [1102](event-1102.md)(S): The audit log was cleared.
+
+- [1104](event-1104.md)(S): The security log is now full.
+
+- [1105](event-1105.md)(S): Event log automatic backup.
+
+- [1108](event-1108.md)(S): The event logging service encountered an error while processing an incoming event published from %1
+
diff --git a/windows/keep-secure/planning-certificate-based-authentication.md b/windows/keep-secure/planning-certificate-based-authentication.md
new file mode 100644
index 0000000000..69e599b812
--- /dev/null
+++ b/windows/keep-secure/planning-certificate-based-authentication.md
@@ -0,0 +1,54 @@
+---
+title: Planning Certificate-based Authentication (Windows 10)
+description: Planning Certificate-based Authentication
+ms.assetid: a55344e6-d0df-4ad5-a6f5-67ccb6397dec
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Planning Certificate-based Authentication
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+Sometimes a device cannot join an Active Directory domain, and therefore cannot use Kerberos V5 authentication with domain credentials. However, the device can still participate in the isolated domain by using certificate-based authentication.
+
+The non-domain member server, and the clients that must be able to communicate with it, must be configured to use cryptographic certificates based on the X.509 standard. These certificates can be used as an alternate set of credentials. During IKE negotiation, each device sends a copy of its certificate to the other device. Each device examines the received certificate, and then validates its authenticity. To be considered authentic, the received certificate must be validated by a certification authority certificate in the recipient's Trusted Root Certification Authorities store on the local device.
+
+Certificates can be acquired from commercial firms, or by an internal certificate server set up as part of the organization's public key infrastructure (PKI). Microsoft provides a complete PKI and certification authority solution with Windows Server 2012, Windows Server 2008 R2, and Windows Server 2008 Active Directory Certificate Services (AD CS).
+
+## Deploying certificates
+
+No matter how you acquire your certificates, you must deploy them to clients and servers that require them in order to communicate.
+
+### Using Active Directory Certificate Services
+
+If you use AD CS to create your own user and device certificates in-house, then the servers designated as certification authorities (CAs) create the certificates based on administrator-designed templates. AD CS then uses Group Policy to deploy the certificates to domain member devices. Device certificates are deployed when a domain member device starts. User certificates are deployed when a user logs on.
+
+If you want non-domain member devices to be part of a server isolation zone that requires access by only authorized users, make sure to include certificate mapping to associate the certificates with specific user accounts. When certificate mapping is enabled, the certificate issued to each device or user includes enough identification information to enable IPsec to match the certificate to both user and device accounts.
+
+AD CS automatically ensures that certificates issued by the CAs are trusted by the client devices by putting the CA certificates in the correct store on each domain member device.
+
+### Using a commercially purchased certificate for devices running Windows
+
+You can import the certificates manually onto each device if the number of devices is relatively small. For a deployment to more than a handful of devices, use Group Policy.
+
+You must first download the vendor's root CA certificate, and then import it to a GPO that deploys it to the Local Computer\\Trusted Root Certification Authorities store on each device that applies the GPO.
+
+You must also import the purchased certificate into a GPO that deploys it to the Local Computer\\Personal store on each device that applies the GPO.
+
+### Using a commercially purchased certificate for devices running a non-Windows operating system
+
+If you are installing the certificates on an operating system other than Windows, see the documentation for that operating system.
+
+## Configuring IPsec to use the certificates
+
+When the clients and servers have the certificates available, you can configure the IPsec and connection security rules to include those certificates as a valid authentication method. The authentication method requires the subject name of the certificate, for example: **DC=com,DC=woodgrovebank,CN=CorporateCertServer**. Optionally, select **Enable certificate to account mapping** to support using these credentials for restricting access to users or devices that are members of authorized groups in a server isolation solution.
+
+Starting in Windows Server 2012,you can configure certificate selection criteria so the desired certificate is selected and/or validated. Enhanced Key Usage (EKU) criteria can be configured, as well as name restrictions and certificate thumbprints. This is configured using the **Advanced** button when choosing certificates for the authentication method in the user interface, or through Windows PowerShell.
+
+**Next: **[Documenting the Zones](documenting-the-zones.md)
diff --git a/windows/keep-secure/planning-domain-isolation-zones.md b/windows/keep-secure/planning-domain-isolation-zones.md
new file mode 100644
index 0000000000..208265eefb
--- /dev/null
+++ b/windows/keep-secure/planning-domain-isolation-zones.md
@@ -0,0 +1,30 @@
+---
+title: Planning Domain Isolation Zones (Windows 10)
+description: Planning Domain Isolation Zones
+ms.assetid: 70bc7c52-91f0-4a0d-a64a-69d3ea1c6d05
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Planning Domain Isolation Zones
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+After you have the required information about your network, Active Directory, and client and server devices, you can use that information to make decisions about the isolation zones you want to use in your environment.
+
+The bulk of the work in planning server and domain isolation is determining which devices to assign to each isolation zone. Correctly choosing the zone for each device is important to providing the correct level of security without compromising performance or the ability for a device to send or receive required network traffic.
+
+The zones described in this guide include the following:
+
+- [Exemption List](exemption-list.md)
+
+- [Isolated Domain](isolated-domain.md)
+
+- [Boundary Zone](boundary-zone.md)
+
+- [Encryption Zone](encryption-zone.md)
diff --git a/windows/keep-secure/planning-gpo-deployment.md b/windows/keep-secure/planning-gpo-deployment.md
new file mode 100644
index 0000000000..050a5550f7
--- /dev/null
+++ b/windows/keep-secure/planning-gpo-deployment.md
@@ -0,0 +1,116 @@
+---
+title: Planning GPO Deployment (Windows 10)
+description: Planning GPO Deployment
+ms.assetid: b38adfb1-1371-4227-a887-e6d118809de1
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Planning GPO Deployment
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+You can control which GPOs are applied to devices in Active Directory in a combination of three ways:
+
+- **Active Directory organizational unit hierarchy**. This involves linking the GPO to a specific OU in the Active Directory OU hierarchy. All devices in the OU and its subordinate containers receive and apply the GPO.
+
+ Controlling GPO application through linking to OUs is typically used when you can organize the OU hierarchy according to your domain isolation zone requirements. GPOs can apply settings to devices based on their location within Active Directory. If a device is moved from one OU to another, the policy linked to the second OU will eventually take effect when Group Policy detects the change during polling.
+
+- **Security group filtering**. This involves linking the GPOs to the domain level (or other parent OU) in the OU hierarchy, and then selecting which devices receive the GPO by using permissions that only allow correct group members to apply the GPO.
+
+ The security group filters are attached to the GPOs themselves. A group is added to the security group filter of the GPO in Active Directory, and then assigned Read and Apply Group Policy permissions. Other groups can be explicitly denied Read and Apply Group Policy permissions. Only those devices whose group membership are granted Read and Apply Group Policy permissions without any explicit deny permissions can apply the GPO.
+
+- **WMI filtering**. A WMI filter is a query that is run dynamically when the GPO is evaluated. If a device is a member of the result set when the WMI filter query runs, the GPO is applied to the device.
+
+ A WMI filter consists of one or more conditions that are evaluated against the local device. You can check almost any characteristic of the device, its operating system, and its installed programs. If all of the specified conditions are true for the device, the GPO is applied; otherwise the GPO is ignored.
+
+This guide uses a combination of security group filtering and WMI filtering to provide the most flexible options. If you follow this guidance, even though there might be five different GPOs linked to a specific group because of operating system version differences, only the correct GPO is applied.
+
+## General considerations
+
+- Deploy your GPOs before you add any device accounts to the groups that receive the GPOs. That way you can add your devices to the groups in a controlled manner. Be sure to add only a few test devices at first. Before adding many group members, examine the results on the test devices and verify that the configured firewall and connection security rules have the effect that you want. See the following sections for some suggestions on what to test before you continue.
+
+## Test your deployed groups and GPOs
+
+After you have deployed your GPOs and added some test devices to the groups, confirm the following before you continue with more group members:
+
+- Examine the GPOs that are both assigned to and filtered from the device. Run the **gpresult** tool at a command prompt.
+
+- Examine the rules deployed to the device. Open the Windows Firewall with Advanced Security MMC snap-in, expand the **Monitoring** node, and then expand the **Firewall** and **Connection Security** nodes.
+
+- Verify that communications are authenticated. Open the Windows Firewall with Advanced Security MMC snap-in, expand the **Monitoring** node, expand the **Security Associations** node, and then click **Main Mode**.
+
+- Verify that communications are encrypted when the devices require it. Open the Windows Firewall with Advanced Security MMC snap-in, expand the **Monitoring** node, expand the **Security Associations** node, and then select **Quick Mode**. Encrypted connections display a value other than **None** in the **ESP Confidentiality** column.
+
+- Verify that your programs are unaffected. Run them and confirm that they still work as expected.
+
+After you have confirmed that the GPOs have been correctly applied, and that the devices are now communicating by using IPsec network traffic in request mode, you can begin to add more devices to the group accounts, in manageable numbers at a time. Continue to monitor and confirm the correct application of the GPOs to the devices.
+
+## Do not enable require mode until deployment is complete
+
+If you deploy a GPO that requires authentication to a device before the other devices have a GPO deployed, communication between them might not be possible. Wait until you have all the zones and their GPOs deployed in request mode and confirm (as described in the previous section) that the devices are successfully communicating by using IPsec.
+
+If there are problems with GPO deployment, or errors in configuration of one or more of the IPsec GPOs, devices can continue to operate, because request mode enables any device to fall back to clear communications.
+
+Only after you have added all of the devices to their zones, and you have confirmed that communications are working as expected, you can start changing the request mode rules to require mode rules where it is required in the zones. We recommend that you enable require mode in the zones one zone at a time, pausing to confirm that they are functioning properly before you continue. Turn the required mode setting on for the server isolation zones first, then the encryption zone, and then the isolated domain.
+
+Do not change the boundary zone GPO, because it must stay in request mode for both inbound and outbound connections.
+
+If you create other zones that require either inbound or outbound require mode, make the setting change in a manner that applies the setting in stages from the smaller groups of devices to the larger groups.
+
+## Example Woodgrove Bank deployment plans
+
+Woodgrove Bank links all its GPOs to the domain level container in the Active Directory OU hierarchy. It then uses the following WMI filters and security group filters to control the application of the GPOs to the correct subset of devices. All of the GPOs have the User Configuration section disabled to improve performance.
+
+### GPO\_DOMISO\_Firewall
+
+- **WMI filter**. The WMI filter allows this GPO to apply only to devices that match the following WMI query:
+
+ `select * from Win32_OperatingSystem where Version like "6.%" and ProductType <> "2"`
+
+ >**Note:** This excludes domain controllers (which report a ProductType value of 2). Do not include domain controllers in the isolated domain if there are devices running versions of Windows earlier than Windows Vista and Windows Server 2008.
+
+- **Security filter**. This GPO grants Read and Apply Group Policy permissions only to devices that are members of the group CG\_DOMISO\_IsolatedDomain. The GPO also explicitly denies Read and Apply Group Policy permissions to members of the CG\_DOMISO\_NO\_IPSEC.
+
+### GPO\_DOMISO\_IsolatedDomain\_Clients
+
+- **WMI filter**. The WMI filter allows this GPO to apply only to devices that match the following WMI query:
+
+ `select * from Win32_OperatingSystem where Version like "6.%" and ProductType = "1"`
+
+- **Security filter**. This GPO grants Read and Apply Group Policy permissions only to devices that are members of the group CG\_DOMISO\_IsolatedDomain. The GPO also explicitly denies Read and Apply Group Policy permissions to members of the group CG\_DOMISO\_NO\_IPSEC.
+
+### GPO\_DOMISO\_IsolatedDomain\_Servers
+
+- **WMI filter**. The WMI filter allows this GPO to apply only to devices that match the following WMI query:
+
+ `select * from Win32_OperatingSystem where Version like "6.%" and ProductType = "3"`
+
+ >**Note:** This excludes domain controllers (which report a ProductType value of 2). Do not include domain controllers in the isolated domain if there are devices that are running versions of Windows earlier than Windows Vista and Windows Server 2008.
+
+- **Security filter**. This GPO grants Read and Apply Group Policy permissions only to devices that are members of the group CG\_DOMISO\_IsolatedDomain. The GPO also explicitly denies Read and Apply Group Policy permissions to members of the group CG\_DOMISO\_NO\_IPSEC.
+
+### GPO\_DOMISO\_Boundary
+
+- **WMI filter**. The WMI filter allows this GPO to apply only to devices that match the following WMI query:
+
+ `select * from Win32_OperatingSystem where Version like "6.%" and ProductType = "3"`
+
+ >**Note:** This excludes domain controllers (which report a ProductType value of 2). Do not include domain controllers in the isolated domain if there are devices that are running versions of Windows earlier than Windows Vista and Windows Server 2008.
+
+- **Security filter**. This GPO grants Read and Apply Group Policy permissions only to devices that are members of the group CG\_DOMISO\_Boundary. The GPO also explicitly denies Read and Apply Group Policy permissions to members of the group CG\_DOMISO\_NO\_IPSEC.
+
+### GPO\_DOMISO\_Encryption
+
+- **WMI filter**. The WMI filter allows this GPO to apply only to devices that match the following WMI query:
+
+ `select * from Win32_OperatingSystem where Version like "6.%" and ProductType = "3"`
+
+ >**Note:** This excludes domain controllers (which report a ProductType value of 2). Do not include domain controllers in the isolated domain if there are devices that are running versions of Windows earlier than Windows Vista and Windows Server 2008.
+
+- **Security filter**. This GPO grants Read and Apply permissions in Group Policy only to devices that are members of the group CG\_DOMISO\_Encryption. The GPO also explicitly denies Read and Apply permissions in Group Policy to members of the group CG\_DOMISO\_NO\_IPSEC.
diff --git a/windows/keep-secure/planning-group-policy-deployment-for-your-isolation-zones.md b/windows/keep-secure/planning-group-policy-deployment-for-your-isolation-zones.md
new file mode 100644
index 0000000000..fff34a12c7
--- /dev/null
+++ b/windows/keep-secure/planning-group-policy-deployment-for-your-isolation-zones.md
@@ -0,0 +1,28 @@
+---
+title: Planning Group Policy Deployment for Your Isolation Zones (Windows 10)
+description: Planning Group Policy Deployment for Your Isolation Zones
+ms.assetid: ea7c0acd-af28-4347-9d4a-4801b470557c
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Planning Group Policy Deployment for Your Isolation Zones
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+After you have decided on the best logical design of your isolation environment for the network and device security requirements, you can start the implementation plan.
+
+You have a list of isolation zones with the security requirements of each. For implementation, you must plan the groups that will hold the device accounts in each zone, the network access groups that will be used to determine who can access an isolated server, and the GPOs with the connection security and firewall rules to apply to corresponding groups. Finally you must determine how you will ensure that the policies will only apply to the correct devices within each group.
+
+- [Planning Isolation Groups for the Zones](planning-isolation-groups-for-the-zones.md)
+
+- [Planning Network Access Groups](planning-network-access-groups.md)
+
+- [Planning the GPOs](planning-the-gpos.md)
+
+- [Planning GPO Deployment](planning-gpo-deployment.md)
diff --git a/windows/keep-secure/planning-isolation-groups-for-the-zones.md b/windows/keep-secure/planning-isolation-groups-for-the-zones.md
new file mode 100644
index 0000000000..b4f667a50b
--- /dev/null
+++ b/windows/keep-secure/planning-isolation-groups-for-the-zones.md
@@ -0,0 +1,39 @@
+---
+title: Planning Isolation Groups for the Zones (Windows 10)
+description: Planning Isolation Groups for the Zones
+ms.assetid: be4b662d-c1ce-441e-b462-b140469a5695
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Planning Isolation Groups for the Zones
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+Isolation groups in Active Directory are how you implement the various domain and server isolation zones. A device is assigned to a zone by adding its device account to the group which represents that zone.
+
+>**Caution:** Do not add devices to your groups yet. If a device is in a group when the GPO is activated then that GPO is applied to the device. If the GPO is one that requires authentication, and the other devices have not yet received their GPOs, the device that uses the new GPO might not be able to communicate with the others.
+
+Universal groups are the best option to use for GPO assignment because they apply to the whole forest and reduce the number of groups that must be managed. However, if universal groups are unavailable, you can use domain global groups instead.
+
+The following table lists typical groups that can be used to manage the domain isolation zones discussed in the Woodgrove Bank example in this guide:
+
+| Group name | Description |
+| - | - |
+| CG_DOMISO_No_IPsec | A universal group of device accounts that do not participate in the IPsec environment. Typically consists of infrastructure device accounts that will also be included in exemption lists.
This group is used in security group filters to ensure that GPOs with IPsec rules are not applied to group members.|
+| CG_DOMISO_IsolatedDomain | A universal group of device accounts that contains the members of the isolated domain.
During the early days of testing, this group might contain only a very small number of devices. During production, it might contain the built-in **Domain Computers** group to ensure that every device in the domain participates.
Members of this group receive the domain isolation GPO that requires authentication for inbound connections.|
+| CG_DOMISO_Boundary | A universal group of device accounts that contains the members of the boundary zone.
Members of this group receive a GPO that specifies that authentication is requested, but not required.|
+| CG_DOMISO_Encryption | A universal group of device accounts that contains the members of the encryption zone.
Members of this group receive a GPO that specifies that both authentication and encryption are required for all inbound connections.
+| CG_SRVISO_*ServerRole* | A universal group of device accounts that contains the members of the server isolation group.
Members of this group receive the server isolation GPO that requires membership in a network access group in order to connect.
There will be one group for each set of servers that have different user and device restriction requirements. |
+
+Multiple GPOs might be delivered to each group. Which one actually becomes applied depends on the security group filters assigned to the GPOs in addition to the results of any WMI filtering assigned to the GPOs. Details of the GPO layout are discussed in the section [Planning the GPOs](planning-the-gpos.md).
+
+If multiple GPOs are assigned to a group, and similar rules are applied, the rule that most specifically matches the network traffic is the one that is used by the device. For example, if one IPsec rule says to request authentication for all IP traffic, and a second rule from a different GPO says to require authentication for IP traffic to and from a specific IP address, then the second rule takes precedence because it is more specific.
+
+**Next: **[Planning Network Access Groups](planning-network-access-groups.md)
+
diff --git a/windows/keep-secure/planning-network-access-groups.md b/windows/keep-secure/planning-network-access-groups.md
new file mode 100644
index 0000000000..4d9b002e7c
--- /dev/null
+++ b/windows/keep-secure/planning-network-access-groups.md
@@ -0,0 +1,33 @@
+---
+title: Planning Network Access Groups (Windows 10)
+description: Planning Network Access Groups
+ms.assetid: 56ea1717-1731-4a5d-b277-5a73eb86feb0
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Planning Network Access Groups
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+A network access group (NAG) is used to identify users and devices that have permission to access an isolated server. The server is configured with firewall rules that allow only network connections that are authenticated as originating from a device, and optionally a user, whose accounts are members of its NAG. A member of the isolated domain can belong to as many NAGs as required.
+
+Minimize the number of NAGs to limit the complexity of the solution. You need one NAG for each server isolation group to restrict the devices or users that are granted access. You can optionally split the NAG into two different groups: one for authorized devices and one for authorized users.
+
+The NAGs that you create and populate become active by referencing them in the **Users and Computers** tab of the firewall rules in the GPO assigned to the isolated servers. The GPO must also contain connection security rules that require authentication to supply the credentials checked for NAG membership.
+
+For the Woodgrove Bank scenario, access to the devices running SQL Server that support the WGBank application are restricted to the WGBank front-end servers and to approved administrative users logged on to specific authorized administrative devices. They are also only accessed by the approved admin users and the service account that is used to the run the WGBank front end service.
+
+| NAG Name | NAG Member Users, Computers, or Groups | Description |
+| - | - | - |
+| CG_NAG_*ServerRole*_Users| Svr1AdminA
Svr1AdminB
Group_AppUsers
AppSvcAccount| This group is for all users who are authorized to make inbound IPsec connections to the isolated servers in this zone.|
+| CG_NAG_*ServerRole*_Computers| Desktop1
Desktop2
AdminDT1
AppAdminDT1| This group contains all devices that are authorized to make inbound IPsec connections to the isolated servers in this zone.|
+
+>**Note:** Membership in a NAG does not control the level of IPsec traffic protection. The IKE negotiation is only aware of whether the device or user passed or failed the Kerberos V5 authentication process. The connection security rules in the applied GPO control the security methods that are used for protecting traffic and are independent of the identity being authenticated by Kerberos V5.
+
+**Next: **[Planning the GPOs](planning-the-gpos.md)
diff --git a/windows/keep-secure/planning-server-isolation-zones.md b/windows/keep-secure/planning-server-isolation-zones.md
new file mode 100644
index 0000000000..12688b93c9
--- /dev/null
+++ b/windows/keep-secure/planning-server-isolation-zones.md
@@ -0,0 +1,74 @@
+---
+title: Planning Server Isolation Zones (Windows 10)
+description: Planning Server Isolation Zones
+ms.assetid: 5f63c929-589e-4b64-82ea-515d62765b7b
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Planning Server Isolation Zones
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+Sometimes a server hosts data that is sensitive. If your servers host data that must not be compromised, you have several options to help protect that data. One was already addressed: adding the server to the encryption zone. Membership in that zone prevents the server from being accessed by any devices that are outside the isolated domain, and encrypts all network connections to server.
+
+The second option is to additionally restrict access to the server, not just to members of the isolated domain, but to only those users or devices who have business reasons to access the resources on the server. You can specify only approved users, or you can additionally specify that the approved users can only access the server from approved devices.
+
+To grant access, you add the approved user and device accounts to network access groups (NAGs) that are referenced in a firewall rule on this server. When the user sends a request to the server, the standard domain isolation rules are invoked. This causes IKE to use Kerberos V5 to exchange credentials with the server. The additional firewall rule on the server causes Windows to check the provided device and user accounts for group membership in the NAGs. If either the user or device is not a member of a required NAG then the network connection is refused.
+
+## Isolated domains and isolated servers
+
+If you are using an isolated domain, the client devices already have the IPsec rules to enable them to authenticate traffic when the server requires it. If you add an isolated server, it must have a GPO applied to its group with the appropriate connection security and firewall rules. The rules enforce authentication and restrict access to only connections that are authenticated as coming from an authorized device or user.
+
+If you are not using an isolated domain, but still want to isolate a server that uses IPsec, you must configure the client devices that you want to access the server to use the appropriate IPsec rules. If the client devices are members of an Active Directory domain, you can still use Group Policy to configure the clients. Instead of applying the GPO to the whole domain, you apply the GPO to only members of the NAG.
+
+## Creating multiple isolated server zones
+
+Each set of servers that must be accessed by different sets of users should be set up in its own isolated server zone. After one set of GPOs for one isolated server zone has been successfully created and verified, you can copy the GPOs to a new set. You must change the GPO names to reflect the new zone, the name and membership of the isolated server zone group to which the GPOs are applied, and the names and membership of the NAG groups that determine which clients can access the servers in the isolated server zone.
+
+## Creating the GPOs
+
+Creation of the groups and how to link them to the GPOs that apply the rules to members of the groups are discussed in the [Planning Group Policy Deployment for Your Isolation Zones](planning-group-policy-deployment-for-your-isolation-zones.md) section.
+
+An isolated server is often a member of the encryption zone. Therefore, copying that GPO set serves as a good starting point. You then modify the rules to additionally restrict access to only NAG members.
+
+### GPO settings for isolated servers running at least Windows Server 2008
+
+GPOs for devices running at least Windows Server 2008 should include the following:
+
+>**Note:** The connection security rules described here are identical to the ones for the encryption zone. If you do not want to encrypt access and also restrict access to NAG members, you can use connection security rules identical to the main isolated domain. You must still add the firewall rule described at the end of this list to change it into an isolated server zone.
+
+- IPsec default settings that specify the following options:
+
+ 1. Exempt all ICMP traffic from IPsec.
+
+ 2. Key exchange (main mode) security methods and algorithm. We recommend that you do not include Diffie-Hellman Group 1, DES, or MD5 in any setting. They are included only for compatibility with previous versions of Windows. Use the strongest algorithm combinations that are common to all your supported operating systems.
+
+ 3. Data protection (quick mode) algorithm combinations. Check **Require encryption for all connection security rules that use these settings**, and then specify one or more integrity and encryption combinations. We recommend that you do not include DES or MD5 in any setting. They are included only for compatibility with previous versions of Windows. Use the strongest algorithm combinations that are common to all your supported operating systems.
+
+ If any NAT devices are present on your networks, do not use AH because it cannot traverse NAT devices. If isolated servers must communicate with hosts in the encryption zone, include an algorithm that is compatible with the requirements of the encryption zone GPOs.
+
+ 4. Authentication methods. Include at least device-based Kerberos V5 authentication for compatibility with the rest of the isolated domain. If you want to restrict access to specific user accounts, also include user-based Kerberos V5 authentication as an optional authentication method. Do not make the user-based authentication method mandatory, or else devices that cannot use AuthIP instead of IKE, including Windows XP and Windows Server 2003, cannot communicate. Likewise, if any of your domain isolation members cannot use Kerberos V5, include certificate-based authentication as an optional authentication method.
+
+- The following connection security and firewall rules:
+
+ - A connection security rule that exempts all devices on the exemption list from authentication. Be sure to include all your Active Directory domain controllers on this list. Enter subnet addresses, if applicable in your environment.
+
+ - A connection security rule, from **Any IP address** to **Any IP address**, that requires inbound and requests outbound authentication by using Kerberos V5 authentication.
+
+ >**Important:** Be sure to begin operations by using request in and request out behavior until you are sure that all the devices in your IPsec environment are communicating successfully by using IPsec. After confirming that IPsec is operating as expected, you can change the GPO to require in, request out.
+
+ - A firewall rule that specifies **Allow only secure connections**, **Require encryption**, and on the **Users and Computers** tab includes references to both device and user network access groups.
+
+- A registry policy that includes the following values:
+
+ - Enable PMTU discovery. Enabling this setting allows TCP/IP to dynamically determine the largest packet size supported across a connection. The value is found at HKLM\\System\\CurrentControlSet\\Services\\TCPIP\\Parameters\\EnablePMTUDiscovery (dword). The sample GPO preferences XML file in [Appendix A: Sample GPO Template Files for Settings Used in this Guide](appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md) sets the value to **1**.
+
+ >**Note:** For a sample template for these registry settings, see [Appendix A: Sample GPO Template Files for Settings Used in this Guide](appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md).
+
+**Next: **[Planning Certificate-based Authentication](planning-certificate-based-authentication.md)
diff --git a/windows/keep-secure/planning-settings-for-a-basic-firewall-policy.md b/windows/keep-secure/planning-settings-for-a-basic-firewall-policy.md
new file mode 100644
index 0000000000..4fcbd977dc
--- /dev/null
+++ b/windows/keep-secure/planning-settings-for-a-basic-firewall-policy.md
@@ -0,0 +1,50 @@
+---
+title: Planning Settings for a Basic Firewall Policy (Windows 10)
+description: Planning Settings for a Basic Firewall Policy
+ms.assetid: 4c90df5a-3cbc-4b85-924b-537c2422d735
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Planning Settings for a Basic Firewall Policy
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+After you have identified your requirements, and have the information about the network layout and devices available, you can begin to design the GPO settings and rules that will enable you to enforce your requirements on the devices.
+
+The following is a list of the firewall settings that you might consider for inclusion in a basic firewall design, together with recommendations to serve as a starting point for your analysis:
+
+- **Profile selection**. The firewall rules can be configured for any of the network location profiles that you see in the Network and Sharing Center: **Domain**, **Public**, and **Private**. Most settings are enforced in the Domain profile, without an option for the user to change them. However, you might want to leave the profile settings configurable by the user on devices that can be taken from the organization's physical network and joined to a public or home network. If you lock down the public and private profiles, you might prevent a user from accessing a required network program or service. Because they are not on the organization's network, you cannot fix a connectivity problem by deploying rule changes in a GPO. For each section that follows, consider each profile and apply the rules to those profiles that make sense for your organization.
+
+ >**Important:** We recommend that on server devices that you set all rules for all profiles to prevent any unexpected profile switch from disrupting network connectivity. You might consider a similar practice for your desktop devices, and only support different profiles on portable devices.
+
+- **Firewall state: On**. We recommend that you prevent the user from turning it off.
+
+- **Default behavior for Inbound connections: Block**. We recommend that you enforce the default behavior of blocking unsolicited inbound connections. To allow network traffic for a specific program, create an inbound rule that serves as an exception to this default behavior.
+
+- **Default behavior for Outbound connections: Allow**. We recommend that you enforce the default behavior of allowing outbound connections.
+
+- **Allow unicast response: Yes**. We recommend that you use the default setting of **Yes** unless you have specific requirements to do otherwise.
+
+- **Apply local firewall rules: Yes**. We recommend that you allow users to create and use local firewall rules. If you set this to **No**, then when a user clicks **Allow** on the notification message to allow traffic for a new program, Windows does not create a new firewall rule and the traffic remains blocked.
+
+ If you and the IT staff can create and maintain the list of firewall rules for all permitted applications and deploy them by using GPOs then you can set this value to **No**.
+
+- **Apply local connection security rules: No**. We recommend that you prevent users from creating and using their own connection security rules. Connection failures caused by conflicting rules can be difficult to troubleshoot.
+
+- **Logging**. We recommend that you enable logging to a file on the local hard disk. Be sure to limit the size, such as 4096 KB, to avoid causing performance problems by filling the user's hard disk. Be sure to specify a folder to which the Windows Firewall service account has write permissions.
+
+- **Inbound rules**. Create inbound rules for programs that must be able to receive unsolicited inbound network packets from another device on the network. Make the rules as specific as possible to reduce the risk of malicious programs exploiting the rules. For example, specify both program and port numbers. Specifying a program ensures that the rule is only active when the program is actually running, and specifying the port number ensures that the program cannot receive unexpected traffic on a different port.
+
+ Inbound rules are common on servers, because they host services to which client devices connect. When you install programs and services on a server, the installation program typically creates and enables the rules for you. Examine the rules to ensure that they do not open up more ports than are required.
+
+ >**Important:** If you create inbound rules that permit RPC network traffic by using the **RPC Endpoint Mapper** and **Dynamic RPC** rule options, then all inbound RPC network traffic is permitted because the firewall cannot filter network traffic based on the UUID of the destination application.
+
+- **Outbound rules**. Only create outbound rules to block network traffic that must be prevented in all cases. If your organization prohibits the use of certain network programs, you can support that policy by blocking the known network traffic used by the program. Be sure to test the restrictions before you deploy them to avoid interfering with traffic for needed and authorized programs.
+
+**Next: **[Planning Domain Isolation Zones](planning-domain-isolation-zones.md)
diff --git a/windows/keep-secure/planning-the-gpos.md b/windows/keep-secure/planning-the-gpos.md
new file mode 100644
index 0000000000..b22f0497cd
--- /dev/null
+++ b/windows/keep-secure/planning-the-gpos.md
@@ -0,0 +1,55 @@
+---
+title: Planning the GPOs (Windows 10)
+description: Planning the GPOs
+ms.assetid: 11949ca3-a11c-4a16-b297-0862432eb5b4
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Planning the GPOs
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+When you plan the GPOs for your different isolation zones, you must complete the layout of the required zones and their mappings to the groups that link the devices to the zones.
+
+## General considerations
+
+A few things to consider as you plan the GPOs:
+
+- Do not allow a device to be a member of more than one isolation zone. A device in more than one zone receives multiple and possibly contradictory GPOs. This can result in unexpected, and difficult to troubleshoot behavior.
+
+ The examples in this guide show GPOs that are designed to prevent the requirement to belong to multiple zones.
+
+- Ensure that the IPsec algorithms you specify in your GPOs are compatible across all the versions of Windows. The same principle applies to the data integrity and encryption algorithms. We recommend that you include the more advanced algorithms when you have the option of selecting several in an ordered list. The devices will negotiate down from the top of their lists, selecting one that is configured on both devices.
+
+- The primary difference in your domain isolation GPOs is whether the rules request or require authentication.
+
+ >**Caution:** It is **critical** that you begin with all your GPOs set to request authentication instead of requiring it. Since the GPOs are delivered to the devices over time, applying a require policy to one device breaks its ability to communicate with another device that has not yet received its policy. Using request mode at the beginning enables devices to continue communicating by using plaintext connections if required. After you confirm that your devices are using IPsec where expected, you can schedule a conversion of the rules in the GPOs from requesting to requiring authentication, as required by each zone.
+
+- Windows Firewall with Advanced Security in Windows Vista and Windows Server 2008 only support one network location profile at a time. If you add a second network adapter that is connected to a different network, or not connected at all, you could unintentionally change the profile that is currently active on the device. If your GPO specifies different firewall and connection security rules based on the current network location profile, the behavior of how the device handles network traffic will change accordingly. We recommend for stationary devices, such as desktops and servers, that you assign any rule for the device to all profiles. Apply GPOs that change rules per network location to devices that must move between networks, such as your portable devices. Consider creating a separate domain isolation GPO for your servers that uses the same settings as the GPO for the clients, except that the server GPO specifies the same rules for all network location profiles.
+
+ >**Note:** Devices running Windows 7, Windows Server 2008 R2, and later support different network location types, and therefore profiles, for each network adapter at the same time. Each network adapter is assigned the network location appropriate for the network to which it is connected. Windows Firewall then enforces only those rules that apply to that network type’s profile. So certain types of traffic are blocked when coming from a network adapter connected to a public network, but those same types might be permitted when coming from a private or domain network.
+
+After considering these issues, document each GPO that you require, and the details about the connection security and firewall rules that it needs.
+
+## Woodgrove Bank example GPOs
+
+
+The Woodgrove Bank example uses the following set of GPOs to support its domain isolation requirements. This section only discusses the rules and settings for server and domain isolation. GPO settings that affect which devices receive the GPO, such as security group filtering and WMI filtering, are discussed in the [Planning GPO Deployment](planning-gpo-deployment.md) section.
+
+In this section you can find information about the following:
+
+- [Firewall GPOs](firewall-gpos.md)
+
+- [Isolated Domain GPOs](isolated-domain-gpos.md)
+
+- [Boundary Zone GPOs](boundary-zone-gpos.md)
+
+- [Encryption Zone GPOs](encryption-zone-gpos.md)
+
+- [Server Isolation GPOs](server-isolation-gpos.md)
diff --git a/windows/keep-secure/planning-to-deploy-windows-firewall-with-advanced-security.md b/windows/keep-secure/planning-to-deploy-windows-firewall-with-advanced-security.md
new file mode 100644
index 0000000000..1801d2a86a
--- /dev/null
+++ b/windows/keep-secure/planning-to-deploy-windows-firewall-with-advanced-security.md
@@ -0,0 +1,48 @@
+---
+title: Planning to Deploy Windows Firewall with Advanced Security (Windows 10)
+description: Planning to Deploy Windows Firewall with Advanced Security
+ms.assetid: 891a30c9-dbf5-4a88-a279-00662b9da48e
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Planning to Deploy Windows Firewall with Advanced Security
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+After you collect information about your environment and decide on a design by following the guidance in the [Windows Firewall with Advanced Security Design Guide](windows-firewall-with-advanced-security-design-guide.md), you can begin to plan the deployment of your design. With the completed design and the information in this topic, you can determine which tasks to perform to deploy Windows Firewall with Advanced Security in your organization.
+
+## Reviewing your Windows Firewall with Advanced Security Design
+
+If the design team that created the Windows Firewall with Advanced Security design for your organization is different from the deployment team that will implement it, make sure that the deployment team reviews the final design with the design team. Review the following points:
+
+- The design team's strategy for determining how WMI and security group filters attached to the GPOs will determine which devices apply to which GPO. The deployment team can refer to the following topics in the Windows Firewall with Advanced Security Design Guide:
+
+ - [Planning Isolation Groups for the Zones](planning-isolation-groups-for-the-zones.md)
+
+ - [Planning the GPOs](planning-the-gpos.md)
+
+ - [Planning GPO Deployment](planning-gpo-deployment.md)
+
+- The communication to be allowed between members of each of the zones in the isolated domain and devices that are not part of the isolated domain or members of the isolated domain's exemption list.
+
+- The recommendation that domain controllers are exempted from IPsec authentication requirements. If they are not exempt and authentication fails, then domain clients might not be able to receive Group Policy updates to the IPsec connection security rules from the domain controllers.
+
+- The rationale for configuring all IPsec authentication rules to request, not require, authentication until the successful negotiation of IPsec has been confirmed. If the rules are set to require authentication before confirming that authentication is working correctly, then communications between devices might fail. If the rules are set to request authentication only, then an IPsec authentication failure results in fall-back-to-clear behavior, so communications can continue while the authentication failures are investigated.
+
+- The requirement that all devices that must communicate with each other share a common set of:
+
+ - Authentication methods
+
+ - Main mode key exchange algorithms
+
+ - Quick mode data integrity algorithms
+
+ If at least one set of each does not match between two devices, then the devices cannot successfully communicate.
+
+After the design and deployment teams agree on these issues, they can proceed with the deployment of the Windows Firewall with Advanced Security design. For more information, see [Implementing Your Windows Firewall with Advanced Security Design Plan](implementing-your-windows-firewall-with-advanced-security-design-plan.md).
diff --git a/windows/keep-secure/planning-your-windows-firewall-with-advanced-security-design.md b/windows/keep-secure/planning-your-windows-firewall-with-advanced-security-design.md
new file mode 100644
index 0000000000..c800eca94d
--- /dev/null
+++ b/windows/keep-secure/planning-your-windows-firewall-with-advanced-security-design.md
@@ -0,0 +1,91 @@
+---
+title: Planning Your Windows Firewall with Advanced Security Design (Windows 10)
+description: Planning Your Windows Firewall with Advanced Security Design
+ms.assetid: f3ac3d49-ef4c-4f3c-a16c-e107284e169f
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Planning Your Windows Firewall with Advanced Security Design
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+After you have gathered the relevant information in the previous sections, and understand the basics of the designs as described earlier in this guide, you can select the design (or combination of designs) that meet your needs.
+
+## Basic firewall design
+
+We recommend that you deploy at least the basic firewall design. As discussed in the [Protect Devices from Unwanted Network Traffic](protect-devices-from-unwanted-network-traffic.md) section, host-based firewalls are an important element in a defense-in-depth strategy and complement most other security measures you put in place in your organization.
+
+When you are ready to examine the options for firewall policy settings, see the [Planning Settings for a Basic Firewall Policy](planning-settings-for-a-basic-firewall-policy.md) section.
+
+## Algorithm and method support and selection
+
+To create a domain isolation or server isolation design, you must understand the algorithms available in each version of Windows, as well as their relative strengths.
+
+## IPsec performance considerations
+
+Although IPsec is critically important in securing network traffic going to and from your devices, there are costs associated with its use. The mathematically intensive cryptographic algorithms require a significant amount of computing power, which can prevent your device from making use of all of the available bandwidth. For example, an IPsec-enabled device using the AES encryption protocols on a 10 gigabits per second (Gbps) network link might see a throughput of 4.5 Gbps. This is due to the demands placed on the CPU to perform the cryptographic functions required by the IPsec integrity and encryption algorithms.
+
+IPsec task offload is a Windows technology that supports network adapters equipped with dedicated cryptographic processors to perform the computationally intensive work required by IPsec. This frees up a device’s CPU and can dramatically increase network throughput. For the same network link as above, the throughput with IPsec task offload enabled improves to about 9.2 Gbps.
+
+## Domain isolation design
+
+
+Include this design in your plans:
+
+- If you have an Active Directory domain of which most of the devices are members.
+
+- If you want to prevent the devices in your organization from accepting any unsolicited network traffic from devices that are not part of the domain.
+
+If you plan on including the basic firewall design as part of your deployment, we recommend that you deploy the firewall policies first to confirm that they work properly. Also plan to enable your connection security rules in request mode at first, instead of the more restrictive require mode, until you are sure that the devices are all correctly protecting network traffic with IPsec. If something is wrong, request mode still allows communications to continue while you are troubleshooting.
+
+When you are ready to examine the options for creating an isolated domain, see the [Planning Domain Isolation Zones](planning-domain-isolation-zones.md) section.
+
+## Server isolation design
+
+
+Include this design in your plans:
+
+- If you have an isolated domain and you want to additionally restrict access to specific servers to only authorized users and devices.
+
+- You are not deploying an isolated domain, but want to take advantage of similar benefits for a few specific servers. You can restrict access to the isolated servers to only authorized users and devices.
+
+If you plan to include domain isolation in your deployment, we recommend that you complete that layer and confirm its correct operation before you implement the additional server isolation elements.
+
+When you are ready to examine the options for isolating servers, see the [Planning Server Isolation Zones](planning-server-isolation-zones.md) section.
+
+## Certificate-based authentication design
+
+
+Include this design in your plans:
+
+- If you want to implement some of the elements of domain or server isolation on devices that are not joined to an Active Directory domain, or do not want to use domain membership as an authentication mechanism.
+
+- You have an isolated domain and want to include a server that is not a member of the Active Directory domain because the device is not running Windows, or for any other reason.
+
+- You must enable external devices that are not managed by your organization to access information on one of your servers, and want to do this in a secure way.
+
+If you plan to include domain or server isolation in your deployment, we recommend that you complete those elements and confirm their correct operation before you add certificate-based authentication to the devices that require it.
+
+When you are ready to examine the options for using certificate-based authentication, see the [Planning Certificate-based Authentication](planning-certificate-based-authentication.md) section.
+
+## Documenting your design
+
+
+After you finish selecting the designs that you will use, you must assign each of your devices to the appropriate isolation zone and document the assignment for use by the deployment team.
+
+- [Documenting the Zones](documenting-the-zones.md)
+
+## Designing groups and GPOs
+
+
+After you have selected a design and assigned your devices to zones, you can begin laying out the isolation groups for each zone, the network access groups for isolated server access, and the GPOs that you will use to apply the settings and rules to your devices.
+
+When you are ready to examine the options for the groups, filters, and GPOs, see the [Planning Group Policy Deployment for Your Isolation Zones](planning-group-policy-deployment-for-your-isolation-zones.md) section.
+
+**Next: **[Planning Settings for a Basic Firewall Policy](planning-settings-for-a-basic-firewall-policy.md)
diff --git a/windows/keep-secure/procedures-used-in-this-guide.md b/windows/keep-secure/procedures-used-in-this-guide.md
new file mode 100644
index 0000000000..d19699b94b
--- /dev/null
+++ b/windows/keep-secure/procedures-used-in-this-guide.md
@@ -0,0 +1,92 @@
+---
+title: Procedures Used in This Guide (Windows 10)
+description: Procedures Used in This Guide
+ms.assetid: 45c0f549-e4d8-45a3-a600-63e2a449e178
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Procedures Used in This Guide
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+The procedures in this section appear in the checklists found earlier in this document. They should be used only in the context of the checklists in which they appear. They are presented here in alphabetical order.
+
+- [Add Production Devices to the Membership Group for a Zone](add-production-devices-to-the-membership-group-for-a-zone.md)
+
+- [Add Test Devices to the Membership Group for a Zone](add-test-devices-to-the-membership-group-for-a-zone.md)
+
+- [Assign Security Group Filters to the GPO](assign-security-group-filters-to-the-gpo.md)
+
+- [Change Rules from Request to Require Mode](change-rules-from-request-to-require-mode.md)
+
+- [Configure Authentication Methods](configure-authentication-methods.md)
+
+- [Configure Data Protection (Quick Mode) Settings](configure-data-protection-quick-mode-settings.md)
+
+- [Configure Group Policy to Autoenroll and Deploy Certificates](configure-group-policy-to-autoenroll-and-deploy-certificates.md)
+
+- [Configure Key Exchange (Main Mode) Settings](configure-key-exchange-main-mode-settings.md)
+
+- [Configure the Rules to Require Encryption](configure-the-rules-to-require-encryption.md)
+
+- [Configure the Windows Firewall Log](configure-the-windows-firewall-log.md)
+
+- [Configure the Workstation Authentication Certificate Template](configure-the-workstation-authentication-certificate-template.md)
+
+- [Configure Windows Firewall to Suppress Notifications When a Program Is Blocked](configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md)
+
+- [Confirm That Certificates Are Deployed Correctly](confirm-that-certificates-are-deployed-correctly.md)
+
+- [Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md)
+
+- [Create a Group Account in Active Directory](create-a-group-account-in-active-directory.md)
+
+- [Create a Group Policy Object](create-a-group-policy-object.md)
+
+- [Create an Authentication Exemption List Rule](create-an-authentication-exemption-list-rule.md)
+
+- [Create an Authentication Request Rule](create-an-authentication-request-rule.md)
+
+- [Create an Inbound ICMP Rule](create-an-inbound-icmp-rule.md)
+
+- [Create an Inbound Port Rule](create-an-inbound-port-rule.md)
+
+- [Create an Inbound Program or Service Rule](create-an-inbound-program-or-service-rule.md)
+
+- [Create an Outbound Port Rule](create-an-outbound-port-rule.md)
+
+- [Create an Outbound Program or Service Rule](create-an-outbound-program-or-service-rule.md)
+
+- [Create Inbound Rules to Support RPC](create-inbound-rules-to-support-rpc.md)
+
+- [Create WMI Filters for the GPO](create-wmi-filters-for-the-gpo.md)
+
+- [Enable Predefined Inbound Rules](enable-predefined-inbound-rules.md)
+
+- [Enable Predefined Outbound Rules](enable-predefined-outbound-rules.md)
+
+- [Exempt ICMP from Authentication](exempt-icmp-from-authentication.md)
+
+- [Link the GPO to the Domain](link-the-gpo-to-the-domain.md)
+
+- [Modify GPO Filters to Apply to a Different Zone or Version of Windows](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md)
+
+- [Open the Group Policy Management Console to IP Security Policies](open-the-group-policy-management-console-to-ip-security-policies.md)
+
+- [Open the Group Policy Management Console to Windows Firewall](open-the-group-policy-management-console-to-windows-firewall.md)
+
+- [Open the Group Policy Management Console to Windows Firewall with Advanced Security](open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md)
+
+- [Open Windows Firewall with Advanced Security](open-windows-firewall-with-advanced-security.md)
+
+- [Restrict Server Access to Members of a Group Only](restrict-server-access-to-members-of-a-group-only.md)
+
+- [Turn on Windows Firewall and Configure Default Behavior](turn-on-windows-firewall-and-configure-default-behavior.md)
+
+- [Verify That Network Traffic Is Authenticated](verify-that-network-traffic-is-authenticated.md)
diff --git a/windows/keep-secure/protect-devices-from-unwanted-network-traffic.md b/windows/keep-secure/protect-devices-from-unwanted-network-traffic.md
new file mode 100644
index 0000000000..a24379dacf
--- /dev/null
+++ b/windows/keep-secure/protect-devices-from-unwanted-network-traffic.md
@@ -0,0 +1,42 @@
+---
+title: Protect Devices from Unwanted Network Traffic (Windows 10)
+description: Protect Devices from Unwanted Network Traffic
+ms.assetid: 307d2b38-e8c4-4358-ae16-f2143af965dc
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Protect Devices from Unwanted Network Traffic
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+Although network perimeter firewalls provide important protection to network resources from external threats, there are network threats that a perimeter firewall cannot protect against. Some attacks might successfully penetrate the perimeter firewall, and at that point what can stop it? Other attacks might originate from inside the network, such as malware that is brought in on portable media and run on a trusted device. Portable device are often taken outside the network and connected directly to the Internet, without adequate protection between the device and security threats.
+
+Reports of targeted attacks against organizations, governments, and individuals have become more widespread in recent years. For a general overview of these threats, also known as advanced persistent threats (APT), see the [Microsoft Security Intelligence Report](http://www.microsoft.com/security/sir/default.aspx).
+
+Running a host-based firewall on every device that your organization manages is an important layer in a "defense-in-depth" security strategy. A host-based firewall can help protect against attacks that originate from inside the network and also provide additional protection against attacks from outside the network that manage to penetrate the perimeter firewall. It also travels with a portable device to provide protection when it is away from the organization's network.
+
+A host-based firewall helps secure a device by dropping all network traffic that does not match the administrator-designed rule set for permitted network traffic. This design, which corresponds to [Basic Firewall Policy Design](basic-firewall-policy-design.md), provides the following benefits:
+
+- Network traffic that is a reply to a request from the local device is permitted into the device from the network.
+
+- Network traffic that is unsolicited, but that matches a rule for allowed network traffic, is permitted into the device from the network.
+
+ For example, Woodgrove Bank wants a device that is running SQL Server to be able to receive the SQL queries sent to it by client devices. The firewall policy deployed to the device that is running SQL Server includes firewall rules that specifically allow inbound network traffic for the SQL Server program.
+
+- Outbound network traffic that is not specifically blocked is allowed on the network.
+
+ For example, Woodgrove Bank has a corporate policy that prohibits the use of certain peer-to-peer file sharing programs. The firewall policy deployed to the computers on the network includes firewall rules that block both inbound and outbound network traffic for the prohibited programs. All other outbound traffic is permitted.
+
+The following component is recommended for this deployment goal:
+
+- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more Group Policy objects (GPOs) that can be automatically applied to all relevant computers in the domain.
+
+Other means of deploying a firewall policy are available, such as creating scripts that use the netsh command-line tool, and then running those scripts on each computer in the organization. This guide uses Active Directory as a recommended means of deployment because of its ability to scale to very large organizations.
+
+**Next: **[Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md)
diff --git a/windows/keep-secure/require-encryption-when-accessing-sensitive-network-resources.md b/windows/keep-secure/require-encryption-when-accessing-sensitive-network-resources.md
new file mode 100644
index 0000000000..890eaf1d99
--- /dev/null
+++ b/windows/keep-secure/require-encryption-when-accessing-sensitive-network-resources.md
@@ -0,0 +1,40 @@
+---
+title: Require Encryption When Accessing Sensitive Network Resources (Windows 10)
+description: Require Encryption When Accessing Sensitive Network Resources
+ms.assetid: da980d30-a68b-4e2a-ba63-94726355ce6f
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Require Encryption When Accessing Sensitive Network Resources
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+The use of authentication in the previously described goal ([Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md)) enables a device in the isolated domain to block traffic from untrusted devices. However, it does not prevent an untrusted device from eavesdropping on the network traffic shared between two trusted devices, because by default network packets are not encrypted.
+
+For devices that share sensitive information over the network, Windows Firewall with Advanced Security allows you to require that all such network traffic be encrypted. Using encryption can help you comply with regulatory and legislative requirements such as those found in the Federal Information Security Management Act of 2002 (FISMA), the Sarbanes-Oxley Act of 2002, the Health Insurance Portability and Accountability Act of 1996 (HIPAA), and other government and industry regulations. By creating connection security rules that apply to devices that host and exchange sensitive data, you can help protect the confidentiality of that data by encrypting it.
+
+The following illustration shows an encryption zone in an isolated domain. The rules that implement both the isolated domain and the different zones are deployed by using Group Policy and Active Directory.
+
+
+
+This goal provides the following benefits:
+
+- Devices in the encryption zone require authentication to communicate with other devices. This works no differently from the domain isolation goal and design. For more info, see [Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md).
+
+- Devices in the encryption zone require that all inbound and outbound network traffic be encrypted.
+
+ For example, Woodgrove Bank processes sensitive customer data on a device that must be protected from eavesdropping by devices on the network. Connection security rules specify that all traffic must be encrypted by a sufficiently complex encryption algorithm to help protect the data.
+
+- Devices in the encryption zone are often good candidates for server isolation, where access is limited to only computer accounts and user accounts that are members of an authorized access group. In many organizations, the encryption zone and the server isolation zone are one and the same. For more info, see [Restrict Access to Only Specified Users or Devices](restrict-access-to-only-specified-users-or-devices.md).
+
+The following components are required for this deployment goal:
+
+- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain.
+
+**Next: **[Restrict Access to Only Specified Users or Devices](restrict-access-to-only-specified-users-or-devices.md)
diff --git a/windows/keep-secure/restrict-access-to-only-specified-users-or-devices.md b/windows/keep-secure/restrict-access-to-only-specified-users-or-devices.md
new file mode 100644
index 0000000000..049625343b
--- /dev/null
+++ b/windows/keep-secure/restrict-access-to-only-specified-users-or-devices.md
@@ -0,0 +1,44 @@
+---
+title: Restrict Access to Only Specified Users or Devices (Windows 10)
+description: Restrict Access to Only Specified Users or Devices
+ms.assetid: a6106a07-f9e5-430f-8dbd-06d3bf7406df
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Restrict Access to Only Specified Users or Computers
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+Domain isolation (as described in the previous goal [Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md)) prevents devices that are members of the isolated domain from accepting network traffic from untrusted devices. However, some devices on the network might host sensitive data that must be additionally restricted to only those users and computers that have a business requirement to access the data.
+
+Windows Firewall with Advanced Security enables you to restrict access to devices and users that are members of domain groups authorized to access that device. These groups are called *network access groups (NAGs)*. When a device authenticates to a server, the server checks the group membership of the computer account and the user account, and grants access only if membership in the NAG is confirmed. Adding this check creates a virtual "secure zone" within the domain isolation zone. You can have multiple devices in a single secure zone, and it is likely that you will create a separate zone for each set of servers that have specific security access needs. Devices that are part of this server isolation zone are often also part of the encryption zone (see [Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md)).
+
+Restricting access to only users and devices that have a business requirement can help you comply with regulatory and legislative requirements, such as those found in the Federal Information Security Management Act of 2002 (FISMA), the Sarbanes-Oxley Act of 2002, the Health Insurance Portability and Accountability Act of 1996 (HIPAA), and other government and industry regulations.
+
+You can restrict access by specifying either computer or user credentials.
+
+The following illustration shows an isolated server, and examples of devices that can and cannot communicate with it. Devices that are outside the Woodgrove corporate network, or computers that are in the isolated domain but are not members of the required NAG, cannot communicate with the isolated server.
+
+
+
+This goal, which corresponds to [Server Isolation Policy Design](server-isolation-policy-design.md), provides the following features:
+
+- Isolated servers accept unsolicited inbound network traffic only from devices or users that are members of the NAG.
+
+- Isolated servers can be implemented as part of an isolated domain, and treated as another zone. Members of the zone group receive a GPO with rules that require authentication, and that specify that only network traffic authenticated as coming from a member of the NAG is allowed.
+
+- Server isolation can also be configured independently of an isolated domain. To do so, configure only the devices that must communicate with the isolated server with connection security rules to implement authentication and check NAG membership.
+
+- A server isolation zone can be simultaneously configured as an encryption zone. To do this, configure the GPO with rules that force encryption in addition to requiring authentication and restricting access to NAG members. For more information, see [Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md).
+
+The following components are required for this deployment goal:
+
+- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain.
+
+**Next: **[Mapping Your Deployment Goals to a Windows Firewall with Advanced Security Design](mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md)
diff --git a/windows/keep-secure/restrict-access-to-only-trusted-devices.md b/windows/keep-secure/restrict-access-to-only-trusted-devices.md
new file mode 100644
index 0000000000..d2b47a2dbe
--- /dev/null
+++ b/windows/keep-secure/restrict-access-to-only-trusted-devices.md
@@ -0,0 +1,54 @@
+---
+title: Restrict Access to Only Trusted Devices (Windows 10)
+description: Restrict Access to Only Trusted Devices
+ms.assetid: bc1f49a4-7d54-4857-8af9-b7c79f47273b
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Restrict Access to Only Trusted Devices
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+Your organizational network likely has a connection to the Internet. You also likely have partners, vendors, or contractors who attach devices that are not owned by your organization to your network. Because you do not manage those devices, you cannot trust them to be free of malicious software, maintained with the latest security updates, or in any way in compliance with your organization's security policies. These untrustworthy devices both on and outside of your physical network must not be permitted to access your organization's devices except where it is truly required.
+
+To mitigate this risk, you must be able to isolate the devices you trust, and restrict their ability to receive unsolicited network traffic from untrusted devices. By using connection security and firewall rules available in Windows Firewall with Advanced Security, you can logically isolate the devices that you trust by requiring that all unsolicited inbound network traffic be authenticated. Authentication ensures that each device or user can positively identify itself by using credentials that are trusted by the other device. Connection security rules can be configured to use IPsec with the Kerberos V5 protocol available in Active Directory, or certificates issued by a trusted certification authority as the authentication method.
+
+>**Note:** Because the primary authentication method recommended for devices that are running Windows is to use the Kerberos V5 protocol with membership in an Active Directory domain, this guide refers to this logical separation of computers as *domain isolation*, even when certificates are used to extend the protection to devices that are not part of an Active Directory domain.
+
+The protection provided by domain isolation can help you comply with regulatory and legislative requirements, such as those found in the Federal Information Security Management Act of 2002 (FISMA), the Sarbanes-Oxley Act of 2002, the Health Insurance Portability and Accountability Act of 1996 (HIPAA), and other government and industry regulations.
+
+The following illustration shows an isolated domain, with one of the zones that are optionally part of the design. The rules that implement both the isolated domain and the different zones are deployed by using Group Policy and Active Directory.
+
+
+
+These goals, which correspond to [Domain Isolation Policy Design](domain-isolation-policy-design.md) and [Certificate-based Isolation Policy Design](certificate-based-isolation-policy-design.md), provide the following benefits:
+
+- Devices in the isolated domain accept unsolicited inbound network traffic only when it can be authenticated as coming from another device in the isolated domain. Exemption rules can be defined to allow inbound traffic from trusted computers that for some reason cannot perform IPsec authentication.
+
+ For example, Woodgrove Bank wants all of its devices to block all unsolicited inbound network traffic from any device that it does not manage. The connection security rules deployed to domain member devices require authentication as a domain member or by using a certificate before an unsolicited inbound network packet is accepted.
+
+- Devices in the isolated domain can still send outbound network traffic to untrusted devices and receive the responses to the outbound requests.
+
+ For example, Woodgrove Bank wants its users at client devices to be able to access Web sites on the Internet. The default Windows Firewall with Advanced Security settings for outbound network traffic allow this. No additional rules are required.
+
+These goals also support optional zones that can be created to add customized protection to meet the needs of subsets of an organization's devices:
+
+- Devices in the "boundary zone" are configured to use connection security rules that request but do not require authentication. This enables them to receive unsolicited inbound network traffic from untrusted devices, and also to receive traffic from the other members of the isolated domain.
+
+ For example, Woodgrove Bank has a server that must be accessed by its partners' devices through the Internet. The rules applied to devices in the boundary zone use authentication when the client device can support it, but do not block the connection if the client device cannot authenticate.
+
+- Devices in the "encryption zone" require that all network traffic in and out must be encrypted to secure potentially sensitive material when it is sent over the network.
+
+ For example, Woodgrove Bank wants the devices running SQL Server to only transmit data that is encrypted to help protect the sensitive data stored on those devices.
+
+The following components are required for this deployment goal:
+
+- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain.
+
+**Next: **[Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md)
diff --git a/windows/keep-secure/restrict-server-access-to-members-of-a-group-only.md b/windows/keep-secure/restrict-server-access-to-members-of-a-group-only.md
new file mode 100644
index 0000000000..85d7267abb
--- /dev/null
+++ b/windows/keep-secure/restrict-server-access-to-members-of-a-group-only.md
@@ -0,0 +1,44 @@
+---
+title: Restrict Server Access to Members of a Group Only (Windows 10)
+description: Restrict Server Access to Members of a Group Only
+ms.assetid: ea51c55b-e1ed-44b4-82e3-3c4287a8628b
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Restrict Server Access to Members of a Group Only
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+After you have configured the IPsec connection security rules that force client devices to authenticate their connections to the isolated server, you must configure the rules that restrict access to only those devices or users who have been identified through the authentication process as members of the isolated server’s access group.
+
+In this topic:
+
+- [Create a firewall rule to access isolated servers running Windows Server 2008 or later](#to-create-a-firewall-rule-that-grants-access-to-an-isolated-server)
+
+**Administrative credentials**
+
+To complete these procedures, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the GPOs.
+
+## To create a firewall rule that grants access to an isolated server
+
+1. [Open the Group Policy Management Console to Windows Firewall with Advanced Security](open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md). You must edit the GPO that applies settings to servers in the isolated server zone.
+
+2. In the navigation pane, right-click **Inbound Rules**, and then click **New Rule**.
+
+3. On the **Rule Type** page, click **Custom**, and then click **Next**.
+
+4. If you must restrict access to a single network program, then you can select **This program path**, and specify the program or service to which to grant access. Otherwise, click **All programs**, and then click **Next**.
+
+5. If you must restrict access to only some TCP or UDP port numbers, then enter the port numbers on the **Protocol and Ports** page. Otherwise, set **Protocol type** to **Any**, and then click **Next**.
+
+6. On the **Scope** page, select **Any IP address** for both local and remote addresses, and then click **Next**.
+
+7. On the **Action** page, click **Allow the connection if it is secure**. If required by your design, you can also click **Customize** and select **Require the connections to be encrypted**. Click **Next**.
+
+8. On the **Users and Computers** page, select the check box for the type of accounts (computer or user) you want to allow, click **Add**, and then enter the group account that contains the device and user accounts permitted to access the server.
diff --git a/windows/keep-secure/securing-end-to-end-ipsec-connections-by-using-ikev2.md b/windows/keep-secure/securing-end-to-end-ipsec-connections-by-using-ikev2.md
new file mode 100644
index 0000000000..fa9c66bfb4
--- /dev/null
+++ b/windows/keep-secure/securing-end-to-end-ipsec-connections-by-using-ikev2.md
@@ -0,0 +1,189 @@
+---
+title: Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012 (Windows 10)
+description: Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Securing End-to-End IPsec connections by using IKEv2
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+IKEv2 offers the following:
+
+- Supports IPsec end-to-end transport mode connections
+
+- Provides interoperability for Windows with other operating systems that use IKEv2 for end-to-end security
+
+- Supports Suite B (RFC 4869) requirements
+
+- Coexists with existing policies that deploy AuthIP/IKEv1
+
+- Uses the Windows PowerShell interface exclusively for configuration. You cannot configure IKEv2 through the user interface.
+
+- Uses certificates for the authentication mechanism
+
+You can use IKEv2 as a virtual private network (VPN) tunneling protocol that supports automatic VPN reconnection. IKEv2 allows the security association to remain unchanged despite changes in the underlying connection.
+
+**In this document**
+
+- [Prerequisites](#prerequisites)
+
+- [Devices joined to a domain](#devices-joined-to-a-domain)
+
+- [Device not joined to a domain](#devices-not-joined-to-a-domain)
+
+- [Troubleshooting](#troubleshooting)
+
+>**Note:** This topic includes sample Windows PowerShell cmdlets. For more info, see [How to Run a Windows PowerShell Cmdlet](http://go.microsoft.com/fwlink/p/?linkid=230693).
+
+## Prerequisites
+
+These procedures assume that you already have a public key infrastructure (PKI) in place for device authentication.
+
+## Devices joined to a domain
+
+The following Windows PowerShell script establishes a connection security rule that uses IKEv2 for communication between two computers (CLIENT1 and SERVER1) that are joined to the corp.contoso.com domain as shown in Figure 1.
+
+
+
+**Figure 1** The Contoso corporate network
+
+This script does the following:
+
+- Creates a security group called **IPsec client and servers** and adds CLIENT1 and SERVER1 as members.
+
+- Creates a Group Policy Object (GPO) called **IPsecRequireInRequestOut** and links it to the corp.contoso.com domain.
+
+- Sets the permissions to the GPO so that they apply only to the computers in **IPsec client and servers** and not to **Authenticated Users**.
+
+- Indicates the certificate to use for authentication.
+
+ >**Important:** The certificate parameters that you specify for the certificate are case sensitive, so make sure that you type them exactly as specified in the certificate, and place the parameters in the exact order that you see in the following example. Failure to do so will result in connection errors.
+
+- Creates the IKEv2 connection security rule called **My IKEv2 Rule**.
+
+**Windows PowerShell commands**
+
+Type each cmdlet on a single line, even though they may appear to wrap across several lines because of formatting constraints.
+
+``` syntax
+# Create a Security Group for the computers that will get the policy
+$pathname = (Get-ADDomain).distinguishedname
+New-ADGroup -name "IPsec client and servers" -SamAccountName "IPsec client and servers" `
+-GroupCategory security -GroupScope Global -path $pathname
+
+# Add test computers to the Security Group
+$computer = Get-ADComputer -LDAPFilter "(name=client1)"
+Add-ADGroupMember -Identity "IPsec client and servers" -Members $computer
+$computer = Get-ADComputer -LDAPFilter "(name=server1)"
+Add-ADGroupMember -Identity "IPsec client and servers" -Members $computer
+
+# Create and link the GPO to the domain
+$gpo = New-gpo IPsecRequireInRequestOut
+$gpo | new-gplink -target "dc=corp,dc=contoso,dc=com" -LinkEnabled Yes
+
+# Set permissions to security group for the GPO
+$gpo | Set-GPPermissions -TargetName "IPsec client and servers" -TargetType Group -PermissionLevel GpoApply -Replace
+$gpo | Set-GPPermissions -TargetName "Authenticated Users" -TargetType Group -PermissionLevel None -Replace
+
+#Set up the certificate for authentication
+$gponame = "corp.contoso.com\IPsecRequireInRequestOut"
+$certprop = New-NetIPsecAuthProposal -machine -cert -Authority "DC=com, DC=contoso, DC=corp, CN=corp-APP1-CA"
+$myauth = New-NetIPsecPhase1AuthSet -DisplayName "IKEv2TestPhase1AuthSet" -proposal $certprop –PolicyStore GPO:$gponame
+
+#Create the IKEv2 Connection Security rule
+New-NetIPsecRule -DisplayName "My IKEv2 Rule" -RemoteAddress any -Phase1AuthSet $myauth.InstanceID `
+-InboundSecurity Require -OutboundSecurity Request -KeyModule IKEv2 -PolicyStore GPO:$gponame
+```
+
+## Devices not joined to a domain
+
+Use a Windows PowerShell script similar to the following to create a local IPsec policy on the devices that you want to include in the secure connection.
+
+>**Important:** The certificate parameters that you specify for the certificate are case sensitive, so make sure that you type them exactly as specified in the certificate, and place the parameters in the exact order that you see in the following example. Failure to do so will result in connection errors.
+
+**Windows PowerShell commands**
+
+Type each cmdlet on a single line, even though they may appear to wrap across several lines because of formatting constraints.
+
+``` syntax
+#Set up the certificate
+$certprop = New-NetIPsecAuthProposal -machine -cert -Authority "DC=com, DC=contoso, DC=corp, CN=corp-APP1-CA"
+$myauth = New-NetIPsecPhase1AuthSet -DisplayName "IKEv2TestPhase1AuthSet" -proposal $certprop
+
+#Create the IKEv2 Connection Security rule
+New-NetIPsecRule -DisplayName "My IKEv2 Rule" -RemoteAddress any -Phase1AuthSet $myauth.InstanceID `
+-InboundSecurity Require -OutboundSecurity Request -KeyModule IKEv2
+```
+
+Make sure that you install the required certificates on the participating computers.
+
+>**Note:**
+- For local devices, you can import the certificates manually if you have administrator access to the computer. For more info, see [Import or export certificates and private keys](http://windows.microsoft.com/windows-vista/Import-or-export-certificates-and-private-keys).
+- You need a root certificate and a computer certificate on all devices that participate in the secure connection. Save the computer certificate in the **Personal/Certificates** folder.
+- For remote devices, you can create a secure website to facilitate access to the script and certificates.
+
+## Troubleshooting
+
+Follow these procedures to verify and troubleshoot your IKEv2 IPsec connections:
+
+**Use the Windows Firewall with Advanced Security snap-in to verify that a connection security rule is enabled.**
+
+1. Open the Windows Firewall with Advanced Security console.
+
+2. In the left pane of the Windows Firewall with Advanced Security snap-in, click **Connection Security Rules**, and then verify that there is an enabled connection security rule.
+
+3. Expand **Monitoring**, and then click **Connection Security Rules** to verify that your IKEv2 rule is active for your currently active profile.
+
+**Use Windows PowerShell cmdlets to display the security associations.**
+
+1. Open a Windows PowerShell command prompt.
+
+2. Type **get-NetIPsecQuickModeSA** to display the Quick Mode security associations.
+
+3. Type **get-NetIPsecMainModeSA** to display the Main Mode security associations.
+
+**Use netsh to capture IPsec events.**
+
+1. Open an elevated command prompt.
+
+2. At the command prompt, type **netsh wfp capture start**.
+
+3. Reproduce the error event so that it can be captured.
+
+4. At the command prompt, type **netsh wfp capture stop**.
+
+ A wfpdiag.cab file is created in the current folder.
+
+5. Open the cab file, and then extract the wfpdiag.xml file.
+
+6. Open the wfpdiag.xml file with your an XML viewer program or Notepad, and then examine the contents. There will be a lot of data in this file. One way to narrow down where to start looking is to search the last “errorFrequencyTable” at the end of the file. There might be many instances of this table, so make sure that you look at the last table in the file. For example, if you have a certificate problem, you might see the following entry in the last table at the end of the file:
+
+ ``` syntax
+ -
+ ERROR_IPSEC_IKE_NO_CERT
+ 32
+
+ ```
+ In this example, there are 32 instances of the **ERROR\_IPSEC\_IKE\_NO\_CERT** error. So now you can search for **ERROR\_IPSEC\_IKE\_NO\_CERT** to get more details regarding this error.
+
+You might not find the exact answer for the issue, but you can find good hints. For example, you might find that there seems to be an issue with the certificates, so you can look at your certificates and the related cmdlets for possible issues.
+
+## See also
+
+- [Windows Firewall with Advanced Security](windows-firewall-with-advanced-security.md)
+
+
+
+
+
+
+
+
+
diff --git a/windows/keep-secure/security-technologies.md b/windows/keep-secure/security-technologies.md
index 39c9eedbb3..19a6af38ba 100644
--- a/windows/keep-secure/security-technologies.md
+++ b/windows/keep-secure/security-technologies.md
@@ -24,6 +24,7 @@ Learn more about the different security technologies that are available in Windo
| [User Account Control](user-account-control-overview.md)| User Account Control (UAC) helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop. With UAC, apps and tasks always run in the security context of a non-administrator account, unless an administrator specifically authorizes administrator-level access to the system. UAC can block the automatic installation of unauthorized apps and prevent inadvertent changes to system settings.|
| [Windows Defender Advanced Threat Protection](windows-defender-advanced-threat-protection.md)| Windows Defender Advanced Threat Protection (Windows Defender ATP) is an out-of-the-box Windows enterprise security service that enables enterprise cybersecurity teams to detect and respond to advanced threats on their networks.|
| [Windows Defender in Windows 10](windows-defender-in-windows-10.md)| This topic provides an overview of Windows Defender, including a list of system requirements and new features.|
+| [Windows Firewall with Advanced Security](windows-firewall-with-advanced-security.md) | Windows Firewall with Advanced Security is an important part of a layered security model. By providing host-based, two-way network traffic filtering for a device, Windows Firewall with Advanced Security blocks unauthorized network traffic flowing into or out of the local device. |
diff --git a/windows/keep-secure/server-isolation-gpos.md b/windows/keep-secure/server-isolation-gpos.md
new file mode 100644
index 0000000000..149730d1a5
--- /dev/null
+++ b/windows/keep-secure/server-isolation-gpos.md
@@ -0,0 +1,31 @@
+---
+title: Server Isolation GPOs (Windows 10)
+description: Server Isolation GPOs
+ms.assetid: c97b1f2f-51d8-4596-b38a-8a3f6f706be4
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Server Isolation GPOs
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+Each set of devices that have different users or devices accessing them require a separate server isolation zone. Each zone requires one GPO for each version of Windows running on devices in the zone. The Woodgrove Bank example has an isolation zone for their devices that run SQL Server. The server isolation zone is logically considered part of the encryption zone. Therefore, server isolation zone GPOs must also include rules for encrypting all isolated server traffic. Woodgrove Bank copied the encryption zone GPOs to serve as a starting point, and renamed them to reflect their new purpose.
+
+All of the device accounts for devices in the SQL Server server isolation zone are added to the group CG\_SRVISO\_WGBANK\_SQL. This group is granted Read and Apply Group Policy permissions in on the GPOs described in this section. The GPOs are only for server versions of Windows. Client devices are not expected to be members of the server isolation zone, although they can access the servers in the zone by being a member of a network access group (NAG) for the zone.
+
+## GPO\_SRVISO
+
+
+This GPO is identical to the GPO\_DOMISO\_Encryption GPO with the following changes:
+
+- The firewall rule that enforces encryption is modified to include the NAGs on the **Users and Computers** tab of the rule. The NAGs granted permission include CG\_NAG\_SQL\_Users and CG\_NAG\_SQL\_Computers.
+
+ >**Important:** Earlier versions of Windows support only device-based authentication. If you specify that user authentication is mandatory, only users on devices that are running at least Windows Vista or Windows Server 2008 can connect.
+
+**Next: **[Planning GPO Deployment](planning-gpo-deployment.md)
diff --git a/windows/keep-secure/server-isolation-policy-design-example.md b/windows/keep-secure/server-isolation-policy-design-example.md
new file mode 100644
index 0000000000..4d38ed4c99
--- /dev/null
+++ b/windows/keep-secure/server-isolation-policy-design-example.md
@@ -0,0 +1,77 @@
+---
+title: Server Isolation Policy Design Example (Windows 10)
+description: Server Isolation Policy Design Example
+ms.assetid: 337e5f6b-1ec5-4b83-bee5-d0aea1fa5fc6
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Server Isolation Policy Design Example
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+This design example continues to use the fictitious company Woodgrove Bank, as described in the [Firewall Policy Design Example](firewall-policy-design-example.md) section and the [Domain Isolation Policy Design Example](domain-isolation-policy-design-example.md) section.
+
+In addition to the protections provided by the firewall and domain isolation, Woodgrove Bank wants to provide additional protection to the devices that are running Microsoft SQL Server for the WGBank program. They contain personal data, including each customer's financial history. Government and industry rules and regulations specify that access to this information must be restricted to only those users who have a legitimate business need. This includes a requirement to prevent interception of and access to the information when it is in transit over the network.
+
+The information presented by the WGBank front-end servers to the client devices, and the information presented by the WGPartner servers to the remote partner devices, are not considered sensitive for the purposes of the government regulations, because they are processed to remove sensitive elements before transmitting the data to the client devices.
+
+In this guide, the examples show server isolation layered on top of a domain isolation design. If you have an isolated domain, the client devices are already equipped with GPOs that require authentication. You only have to add settings to the isolated server(s) to require authentication on inbound connections, and to check for membership in the NAG. The connection attempt succeeds only if NAG membership is confirmed.
+
+## Server isolation without domain isolation
+
+Server isolation can also be deployed by itself, to only the devices that must participate. The GPO on the server is no different from the one discussed in the previous paragraph for a server in an existing isolated domain. The difference is that you must also deploy a GPO with supporting connection security rules to the clients that must be able to communicate with the isolated server. Because those devices must be members of the NAG, that group can also be used in a security group filter on the client GPO. That GPO must contain rules that support the authentication requirements of the isolated server.
+
+In short, instead of applying the client GPO to all clients in the domain, you apply the GPO to only the members of the NAG.
+
+If you do not have an Active Directory domain, you can manually apply the connection security rules, use a netsh command-line script, or use a Windows PowerShell script to help automate the configuration of the rules on larger numbers of devices. If you do not have an Active Directory domain, you cannot use the Kerberos V5 protocol, but instead must provide the clients and the isolated servers with certificates that are referenced in the connection security rules.
+
+## Design requirements
+
+In addition to the protection provided by the firewall rules and domain isolation described in the previous design examples, the network administrators want to implement server isolation to help protect the sensitive data stored on the devices that run SQL Server.
+
+The following illustration shows the traffic protection needs for this design example.
+
+
+
+1. Access to the SQL Server devices must be restricted to only those computer or user accounts that have a business requirement to access the data. This includes the service accounts that are used by the WGBank front-end servers, and administrators of the SQL Server devices. In addition, access is only granted when it is sent from an authorized computer. Authorization is determined by membership in a network access group (NAG).
+
+2. All network traffic to and from the SQL Server devices must be encrypted.
+
+3. Client devices or users whose accounts are not members of the NAG cannot access the isolated servers.
+
+**Other traffic notes:**
+
+- All of the design requirements shown in the [Firewall Policy Design Example](firewall-policy-design-example.md) section are still enforced.
+
+- All of the design requirements shown in the [Domain Isolation Policy Design Example](domain-isolation-policy-design-example.md) section are still enforced.
+
+## Design details
+
+Woodgrove Bank uses Active Directory groups and GPOs to deploy the server isolation settings and rules to the devices on its network.
+
+As in the previously described policy design examples, GPOs to implement the domain isolation environment are linked to the domain container in Active Directory, and then WMI filters and security group filters are attached to GPOs to ensure that the correct GPO is applied to each computer. The following groups were created by using the Active Directory Users and Computers snap-in, and all devices that run Windows were added to the correct groups.
+
+- **CG\_SRVISO\_WGBANK\_SQL**. This group contains the computer accounts for the devices that run SQL Server. Members of this group receive a GPO with firewall and connections security rules that require that only users who are members of the group CG\_NAG\_SQL\_USERS can access the server, and only when they are using a computer that is a member of the group CG\_NAG\_SQL\_COMPUTERS.
+
+>**Note:** You can design your GPOs in nested groups. For example, you can make the boundary group a member of the isolated domain group, so that it receives the firewall and basic isolated domain settings through that nested membership, with only the changes supplied by the boundary zone GPO. However, devices that are running older versions of Windows can only support a single IPsec policy being active at a time. The policies for each GPO must be complete (and to a great extent redundant with each other), because you cannot layer them as you can in the newer versions of Windows. For simplicity, this guide describes the techniques used to create the independent, non-layered policies. We recommend that you create and periodically run a script that compares the memberships of the groups that must be mutually exclusive and reports any devices that are incorrectly assigned to more than one group.
+
+
+Network access groups (NAGs) are not used to determine which GPOs are applied to a computer. Instead, these groups determine which users and devices can access the services on the isolated server.
+
+- **CG\_NAG\_SQL\_COMPUTERS**. This network access group contains the computer accounts that are able to access the devices running SQL Server hosting the WGBank data. Members of this group include the WGBank front-end servers, and some client devices from which SQL Server administrators are permitted to work on the servers.
+
+- **CG\_NAG\_SQL\_USERS**. This network access group contains the user accounts of users who are permitted to access the SQL Server devices that host the WGBank data. Members of this group include the service account that the WGBank front-end program uses to run on its devices, and the user accounts for the SQL Server administration team members.
+
+>**Note:** You can use a single group for both user and computer accounts. Woodgrove Bank chose to keep them separate for clarity.
+
+If Woodgrove Bank wants to implement server isolation without domain isolation, the CG\_NAG\_SQL\_COMPUTERS group can also be attached as a security group filter on the GPOs that apply connection security rules to the client devices. By doing this, all the devices that are authorized to access the isolated server also have the required connection security rules.
+
+You do not have to include the encryption-capable rules on all devices. Instead, you can create GPOs that are applied only to members of the NAG, in addition to the standard domain isolation GPO, that contain connection security rules to support encryption.
+
+**Next: **[Certificate-based Isolation Policy Design Example](certificate-based-isolation-policy-design-example.md)
diff --git a/windows/keep-secure/server-isolation-policy-design.md b/windows/keep-secure/server-isolation-policy-design.md
new file mode 100644
index 0000000000..a2397773da
--- /dev/null
+++ b/windows/keep-secure/server-isolation-policy-design.md
@@ -0,0 +1,54 @@
+---
+title: Server Isolation Policy Design (Windows 10)
+description: Server Isolation Policy Design
+ms.assetid: f93f65cd-b863-461e-ab5d-a620fd962c9a
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Server Isolation Policy Design
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+In the server isolation policy design, you assign servers to a zone that allows access only to users and devices that authenticate as members of an approved network access group (NAG).
+
+This design typically begins with a network configured as described in the [Domain Isolation Policy Design](domain-isolation-policy-design.md) section. For this design, you then create zones for servers that have additional security requirements. The zones can limit access to the server to only members of authorized groups, and can optionally require the encryption of all traffic in or out of these servers. This can be done on a per server basis, or for a group of servers that share common security requirements.
+
+You can implement a server isolation design without using domain isolation. To do this, you use the same principles as domain isolation, but instead of applying them to an Active Directory domain, you apply them only to the devices that must be able to access the isolated servers. The GPO contains connection security and firewall rules that require authentication when communicating with the isolated servers. In this case, the NAGs that determine which users and devices can access the isolated server are also used to determine which devices receive the GPO.
+
+The design is shown in the following illustration, with arrows that show the permitted communication paths.
+
+
+
+Characteristics of this design include the following:
+
+- Isolated domain (area A) - The same isolated domain described in the [Domain Isolation Policy Design](domain-isolation-policy-design.md) section. If the isolated domain includes a boundary zone, then devices in the boundary zone behave just like other members of the isolated domain in the way that they interact with devices in server isolation zones.
+
+- Isolated servers (area B) - Devices in the server isolation zones restrict access to devices, and optionally users, that authenticate as a member of a network access group (NAG) authorized to gain access.
+
+- Encryption zone (area C) - If the data being exchanged is sufficiently sensitive, the connection security rules for the zone can also require that the network traffic be encrypted. Encryption zones are most often implemented as rules that are part of a server isolation zone, instead of as a separate zone. The diagram illustrates the concept as a subset for conceptual purposes only.
+
+To add support for server isolation, you must ensure that the authentication methods are compatible with the requirements of the isolated server. For example, if you want to authorize user accounts that are members of a NAG in addition to authorizing computer accounts, you must enable both user and computer authentication in your connection security rules.
+
+>**Important:** This design builds on the [Domain Isolation Policy Design](domain-isolation-policy-design.md), which in turn builds on the [Basic Firewall Policy Design](basic-firewall-policy-design.md). If you plan to deploy all three designs, do the design work for all three together, and then deploy in the sequence presented.
+
+This design can be applied to devices that are part of an Active Directory forest. Active Directory is required to provide the centralized management and deployment of Group Policy objects that contain the connection security rules.
+
+For more info about this design:
+
+- This design coincides with the deployment goals to [Protect Devices from Unwanted Network Traffic](protect-devices-from-unwanted-network-traffic.md), [Restrict Access to Only Trusted Devices](restrict-access-to-only-trusted-devices.md), [Restrict Access to Only Specified Users or Devices](restrict-access-to-only-specified-users-or-devices.md), and [Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md).
+
+- To learn more about this design, see [Server Isolation Policy Design Example](server-isolation-policy-design-example.md).
+
+- Before completing the design, gather the information described in [Designing a Windows Firewall with Advanced Security Strategy](designing-a-windows-firewall-with-advanced-security-strategy.md).
+
+- To help you make the decisions required in this design, see [Planning Server Isolation Zones](planning-server-isolation-zones.md) and [Planning Group Policy Deployment for Your Isolation Zones](planning-group-policy-deployment-for-your-isolation-zones.md).
+
+- For a list of tasks that you can use to deploy your server isolation policy design, see [Checklist: Implementing a Standalone Server Isolation Policy Design](checklist-implementing-a-standalone-server-isolation-policy-design.md).
+
+**Next: **[Certificate-based Isolation Policy Design](certificate-based-isolation-policy-design.md)
diff --git a/windows/keep-secure/turn-on-windows-firewall-and-configure-default-behavior.md b/windows/keep-secure/turn-on-windows-firewall-and-configure-default-behavior.md
new file mode 100644
index 0000000000..758bffcd66
--- /dev/null
+++ b/windows/keep-secure/turn-on-windows-firewall-and-configure-default-behavior.md
@@ -0,0 +1,49 @@
+---
+title: Turn on Windows Firewall and Configure Default Behavior (Windows 10)
+description: Turn on Windows Firewall and Configure Default Behavior
+ms.assetid: 3c3fe832-ea81-4227-98d7-857a3129db74
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Turn on Windows Firewall and Configure Default Behavior
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+To enable Windows Firewall and configure its default behavior, use the Windows Firewall with Advanced Security node in the Group Policy Management console.
+
+**Administrative credentials**
+
+To complete these procedures, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the GPOs.
+
+## To enable Windows Firewall and configure the default behavior
+
+1. [Open the Group Policy Management Console to Windows Firewall with Advanced Security](open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md).
+
+2. In the details pane, in the **Overview** section, click **Windows Firewall Properties**.
+
+3. For each network location type (Domain, Private, Public), perform the following steps.
+
+ >**Note:** The steps shown here indicate the recommended values for a typical deployment. Use the settings that are appropriate for your firewall design.
+
+ 1. Click the tab that corresponds to the network location type.
+
+ 2. Change **Firewall state** to **On (recommended)**.
+
+ 3. Change **Inbound connections** to **Block (default)**.
+
+ 4. Change **Outbound connections** to **Allow (default)**.
+
+
+
+
+
+
+
+
+
diff --git a/windows/keep-secure/understanding-the-windows-firewall-with-advanced-security-design-process.md b/windows/keep-secure/understanding-the-windows-firewall-with-advanced-security-design-process.md
new file mode 100644
index 0000000000..82f6355c8a
--- /dev/null
+++ b/windows/keep-secure/understanding-the-windows-firewall-with-advanced-security-design-process.md
@@ -0,0 +1,27 @@
+---
+title: Understanding the Windows Firewall with Advanced Security Design Process (Windows 10)
+description: Understanding the Windows Firewall with Advanced Security Design Process
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Understanding the Windows Firewall with Advanced Security Design Process
+
+Designing any deployment starts by performing several important tasks:
+
+- [Identifying Your Windows Firewall with Advanced Security Design Goals](identifying-your-windows-firewall-with-advanced-security-deployment-goals.md)
+
+- [Mapping Your Deployment Goals to a Windows Firewall with Advanced Security Design](mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md)
+
+- [Evaluating Windows Firewall with Advanced Security Design Examples](evaluating-windows-firewall-with-advanced-security-design-examples.md)
+
+After you identify your deployment goals and map them to a Windows Firewall with Advanced Security design, you can begin documenting the design based on the processes that are described in the following topics:
+
+- [Designing A Windows Firewall with Advanced Security Strategy](designing-a-windows-firewall-with-advanced-security-strategy.md)
+
+- [Planning Your Windows Firewall with Advanced Security Design](planning-your-windows-firewall-with-advanced-security-design.md)
+
+**Next:** [Identifying Your Windows Firewall with Advanced Security Design Goals](identifying-your-windows-firewall-with-advanced-security-deployment-goals.md)
diff --git a/windows/keep-secure/verify-that-network-traffic-is-authenticated.md b/windows/keep-secure/verify-that-network-traffic-is-authenticated.md
new file mode 100644
index 0000000000..44e4ba7803
--- /dev/null
+++ b/windows/keep-secure/verify-that-network-traffic-is-authenticated.md
@@ -0,0 +1,65 @@
+---
+title: Verify That Network Traffic Is Authenticated (Windows 10)
+description: Verify That Network Traffic Is Authenticated
+ms.assetid: cc1fb973-aedf-4074-ad4a-7376b24f03d2
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Verify That Network Traffic Is Authenticated
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+After you have configured your domain isolation rule to request, rather than require, authentication, you must confirm that the network traffic sent by the devices on the network is being protected by IPsec authentication as expected. If you switch your rules to require authentication before all of the devices have received and applied the correct GPOs, or if there are any errors in your rules, then communications on the network can fail. By first setting the rules to request authentication, any network connections that fail authentication can continue in clear text while you diagnose and troubleshoot.
+
+In these procedures, you confirm that the rules you deployed are working correctly. Your next steps depend on which zone you are working on:
+
+- **Main domain isolation zone.** Before you convert your main domain isolation IPsec rule from request mode to require mode, you must make sure that the network traffic is protected according to your design. By configuring your rules to request and not require authentication at the beginning of operations, devices on the network can continue to communicate even when the main mode authentication or quick mode integrity and encryption rules are not working correctly. For example, if your encryption zone contains rules that require a certain encryption algorithm, but that algorithm is not included in a security method combination on the clients, then those clients cannot successfully negotiate a quick mode security association, and the server refuses to accept network traffic from the client. By first using request mode only, you have the opportunity to deploy your rules and then examine the network traffic to see if they are working as expected without risking a loss of communications.
+
+- **Boundary zone.** Confirming correct operation of IPsec is the last step if you are working on the boundary zone GPO. You do not convert the GPO to require mode at any time.
+
+- **Encryption zone.** Similar to the main isolation zone, after you confirm that the network traffic to zone members is properly authenticated and encrypted, you must convert your zone rules from request mode to require mode.
+
+>**Note:** In addition to the steps shown in this procedure, you can also use network traffic capture tools such as Microsoft Network Monitor, which can be downloaded from . Network Monitor and similar tools allow you to capture, parse, and display the network packets received by the network adapter on your device. Current versions of these tools include full support for IPsec. They can identify encrypted network packets, but they cannot decrypt them.
+
+
+
+**Administrative credentials**
+
+To complete these procedures, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the GPOs.
+
+## To verify that network connections are authenticated by using the Windows Firewall with Advanced Security console
+
+1. Open the Windows Firewall with Advanced Security console.
+
+2. In the navigation pane, expand **Monitoring**, and then click **Connection Security Rules**.
+
+ The details pane displays the rules currently in effect on the device.
+
+3. **To display the Rule Source column**
+
+ 1. In the **Actions** pane, click **View**, and then click **Add/Remove Columns**.
+
+ 2. In the **Available columns** list, select **Rule Source**, and then click **Add**.
+
+ 3. Use the **Move up** and **Move down** buttons to rearrange the order. Click **OK** when you are finished.
+
+ It can take a few moments for the list to be refreshed with the newly added column.
+
+4. Examine the list for the rules from GPOs that you expect to be applied to this device.
+
+ >**Note:** If the rules do not appear in the list, then troubleshoot the GPO security group and the WMI filters that are applied to the GPO. Make sure that the local device is a member of the appropriate groups and meets the requirements of the WMI filters.
+5. In the navigation pane, expand **Security Associations**, and then click **Main Mode**.
+
+ The current list of main mode associations that have been negotiated with other devices appears in the details column.
+
+6. Examine the list of main mode security associations for sessions between the local device and the remote device. Make sure that the **1st Authentication Method** and **2nd Authentication Method** columns contain expected values. If your rules specify only a first authentication method, then the **2nd Authentication Method** column displays **No authentication**. If you double-click the row, then the **Properties** dialog box appears with additional details about the security association.
+
+7. In the navigation pane, click **Quick mode**.
+
+8. Examine the list of quick mode security associations for sessions between the local device and the remote device. Make sure that the **AH Integrity**, **ESP integrity**, and **ESP Confidentiality** columns contain expected values.
diff --git a/windows/keep-secure/windows-firewall-with-advanced-security-administration-with-windows-powershell.md b/windows/keep-secure/windows-firewall-with-advanced-security-administration-with-windows-powershell.md
new file mode 100644
index 0000000000..23f9e3d1c0
--- /dev/null
+++ b/windows/keep-secure/windows-firewall-with-advanced-security-administration-with-windows-powershell.md
@@ -0,0 +1,666 @@
+---
+title: Windows Firewall with Advanced Security Administration with Windows PowerShell (Windows 10)
+description: Windows Firewall with Advanced Security Administration with Windows PowerShell
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Windows Firewall with Advanced Security Administration with Windows PowerShell
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+The Windows Firewall with Advanced Security Administration with Windows PowerShell Guide provides essential scriptlets for automating Windows Firewall with Advanced Security management. It is designed for IT pros, system administrators, IT managers, and others who use and need to automate Windows Firewall with Advanced Security management in Windows.
+
+You can use Windows PowerShell to manage your firewall and IPsec deployments. This object-oriented scripting environment will make it easier for you to manage policies and monitor network conditions than was possible in netsh. Windows PowerShell allows network settings to be self-discoverable through the syntax and parameters in each of the cmdlets. This guide demonstrates how common tasks were performed in netsh and how you can use Windows PowerShell to accomplish them.
+
+In future versions of Windows, Microsoft might remove the netsh functionality for Windows Firewall with Advanced Security. Microsoft recommends that you transition to Windows PowerShell if you currently use netsh to configure and manage Windows Firewall with Advanced Security.
+
+Windows PowerShell and netsh command references are at the following locations.
+
+- [Netsh Commands for Windows Firewall with Advanced Security](http://technet.microsoft.com/library/cc771920)
+
+## Scope
+
+This guide does not teach you the fundamentals of Windows Firewall with Advanced Security, which can be found in [Windows Firewall with Advanced Security](windows-firewall-with-advanced-security.md). It does not teach the fundamentals of Windows PowerShell, and it assumes that you are familiar with the Windows PowerShell language and the basic concepts of Windows PowerShell. For more info about Windows PowerShell concepts and usage, see the reference topics in the [Additional resources](#additional-resources) section of this guide.
+
+## Audience and user requirements
+
+This guide is intended for IT pros, system administrators, and IT managers, and it assumes that you are familiar with Windows Firewall with Advanced Security, the Windows PowerShell language, and the basic concepts of Windows PowerShell.
+
+## In this topic
+
+| Section | Description |
+| - | - |
+| [Set profile global defaults](#set-profile-global-defaults) | Enable and control firewall behavior|
+| [Deploy basic firewall rules](#deploy-basic-firewall-rules)| How to create, modify, and delete firewall rules|
+| [Manage Remotely](#manage-remotely) | Remote management by using `-CimSession`|
+| [Deploy basic IPsec rule settings](#deploy-basic-ipsec-rule-settings) | IPsec rules and associated parameters|
+| [Deploy secure firewall rules with IPsec](#deploy-secure-firewall-rules-with-ipsec) | Domain and server isolation|
+| [Additional resources](#additional-resources) | More information about Windows PowerShell|
+
+## Set profile global defaults
+
+Global defaults set the device behavior in a per-profile basis. Windows Firewall with Advanced Security supports Domain, Private, and Public profiles.
+
+### Enable Windows Firewall
+
+Windows Firewall drops traffic that does not correspond to allowed unsolicited traffic, or traffic that is sent in response to a request by the device. If you find that the rules you create are not being enforced, you may need to enable Windows Firewall. Here is how to do this on a local domain device:
+
+**Netsh**
+
+``` syntax
+netsh advfirewall set allprofiles state on
+```
+
+**Windows PowerShell**
+
+``` syntax
+Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled True
+```
+
+### Control firewall behavior
+
+The global default settings can be defined through the command-line interface. These modifications are also available through the Windows Firewall with Advanced Security console.
+
+The following scriptlets set the default inbound and outbound actions, specifies protected network connections, and allows notifications to be displayed to the user when a program is blocked from receiving inbound connections. It allows unicast response to multicast or broadcast network traffic, and it specifies logging settings for troubleshooting.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall set allprofiles firewallpolicy blockinbound,allowoutbound
+netsh advfirewall set allprofiles settings inboundusernotification enable
+netsh advfirewall set allprofiles settings unicastresponsetomulticast enable
+netsh advfirewall set allprofiles logging filename %SystemRoot%\System32\LogFiles\Firewall\pfirewall.log
+```
+
+Windows PowerShell
+
+``` syntax
+Set-NetFirewallProfile -DefaultInboundAction Block -DefaultOutboundAction Allow –NotifyOnListen True -AllowUnicastResponseToMulticast True –LogFileName %SystemRoot%\System32\LogFiles\Firewall\pfirewall.log
+```
+
+## Deploy basic firewall rules
+
+This section provides scriptlet examples for creating, modifying, and deleting firewall rules.
+
+### Create firewall rules
+
+Adding a firewall rule in Windows PowerShell looks a lot like it did in Netsh, but the parameters and values are specified differently.
+
+Here is an example of how to allow the Telnet application to listen on the network. This firewall rule is scoped to the local subnet by using a keyword instead of an IP address. Just like in Netsh, the rule is created on the local device, and it becomes effective immediately.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall firewall add rule name="Allow Inbound Telnet" dir=in program= %SystemRoot%\System32\tlntsvr.exe remoteip=localsubnet action=allow
+```
+
+Windows PowerShell
+
+``` syntax
+New-NetFirewallRule -DisplayName “Allow Inbound Telnet” -Direction Inbound -Program %SystemRoot%\System32\tlntsvr.exe -RemoteAddress LocalSubnet -Action Allow
+```
+
+The following scriptlet shows how to add a basic firewall rule that blocks outbound traffic from a specific application and local port to a Group Policy Object (GPO) in Active Directory. In Windows PowerShell, the policy store is specified as a parameter within the **New-NetFirewall** cmdlet. In Netsh, you must first specify the GPO that the commands in a Netsh session should modify. The commands you enter are run against the contents of the GPO, and this remains in effect until the Netsh session is ended or until another set store command is executed.
+
+Here, **domain.contoso.com** is the name of your Active Directory Domain Services (AD DS), and **gpo\_name** is the name of the GPO that you want to modify. Quotation marks are required if there are any spaces in the GPO name.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall set store gpo=domain.contoso.com\gpo_name
+netsh advfirewall firewall add rule name="Block Outbound Telnet" dir=out program=%SystemRoot%\System32\telnet.exe protocol=tcp localport=23 action=block
+```
+
+Windows PowerShell
+
+``` syntax
+New-NetFirewallRule -DisplayName “Block Outbound Telnet” -Direction Outbound -Program %SystemRoot%\System32\tlntsvr.exe –Protocol TCP –LocalPort 23 -Action Block –PolicyStore domain.contoso.com\gpo_name
+```
+
+### GPO Caching
+
+To reduce the burden on busy domain controllers, Windows PowerShell allows you to load a GPO to your local session, make all your changes in that session, and then save it back at all once.
+
+The following performs the same actions as the previous example (by adding a Telnet rule to a GPO), but we do so leveraging GPO caching in PowerShell. Changing the GPO by loading it onto your local session and using the *-GPOSession* parameter are not supported in Netsh
+
+Windows PowerShell
+
+``` syntax
+$gpo = Open-NetGPO –PolicyStore domain.contoso.com\gpo_name
+New-NetFirewallRule -DisplayName “Block Outbound Telnet” -Direction Outbound -Program %SystemRoot%\System32\telnet.exe –Protocol TCP –LocalPort 23 -Action Block –GPOSession $gpo
+Save-NetGPO –GPOSession $gpo
+```
+
+Note that this does not batch your individual changes, it loads and saves the entire GPO at once. So if any other changes are made by other administrators, or in a different Windows PowerShell window, saving the GPO overwrites those changes.
+
+### Modify an existing firewall rule
+
+When a rule is created, Netsh and Windows PowerShell allow you to change rule properties and influence, but the rule maintains its unique identifier (in Windows PowerShell this is specified with the *-Name* parameter).
+
+For example, you could have a rule **Allow Web 80** that enables TCP port 80 for inbound unsolicited traffic. You can change the rule to match a different remote IP address of a Web server whose traffic will be allowed by specifying the human-readable, localized name of the rule.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall firewall set rule name="Allow Web 80" new remoteip=192.168.0.2
+```
+
+Windows PowerShell
+
+``` syntax
+Set-NetFirewallRule –DisplayName “Allow Web 80” -RemoteAddress 192.168.0.2
+```
+
+Netsh requires you to provide the name of the rule for it to be changed and we do not have an alternate way of getting the firewall rule. In Windows PowerShell, you can query for the rule using its known properties.
+
+When you run `Get-NetFirewallRule`, you may notice that common conditions like addresses and ports do not appear. These conditions are represented in separate objects called Filters. As shown before, you can set all the conditions in New-NetFirewallRule and Set-NetFirewallRule. If you want to query for firewall rules based on these fields (ports, addresses, security, interfaces, services), you will need to get the filter objects themselves.
+
+You can change the remote endpoint of the **Allow Web 80** rule (as done previously) using filter objects. Using Windows PowerShell you query by port using the port filter, then assuming additional rules exist affecting the local port, you build with further queries until your desired rule is retrieved.
+
+In the following example, we assume the query returns a single firewall rule, which is then piped to the `Set-NetFirewallRule` cmdlet utilizing Windows PowerShell’s ability to pipeline inputs.
+
+Windows PowerShell
+
+``` syntax
+Get-NetFirewallPortFilter | ?{$_.LocalPort -eq 80} | Get-NetFirewallRule | ?{ $_.Direction –eq “Inbound” -and $_.Action –eq “Allow”} | Set-NetFirewallRule -RemoteAddress 192.168.0.2
+```
+
+You can also query for rules using the wildcard character. The following example returns an array of firewall rules associated with a particular program. The elements of the array can be modified in subsequent `Set-NetFirewallRule` cmdlets.
+
+Windows PowerShell
+
+``` syntax
+Get-NetFirewallApplicationFilter -Program "*svchost*" | Get-NetFirewallRule
+```
+
+Multiple rules in a group can be simultaneously modified when the associated group name is specified in a Set command. You can add firewall rules to specified management groups in order to manage multiple rules that share the same influences.
+
+In the following example, we add both inbound and outbound Telnet firewall rules to the group **Telnet Management**. In Windows PowerShell, group membership is specified when the rules are first created so we re-create the previous example rules. Adding rules to a custom rule group is not possible in Netsh.
+
+Windows PowerShell
+
+``` syntax
+New-NetFirewallRule -DisplayName “Allow Inbound Telnet” -Direction Inbound -Program %SystemRoot%\System32\tlntsvr.exe -RemoteAddress LocalSubnet -Action Allow –Group “Telnet Management”
+New-NetFirewallRule -DisplayName “Block Outbound Telnet” -Direction Inbound -Program %SystemRoot%\System32\tlntsvr.exe -RemoteAddress LocalSubnet -Action Allow –Group “Telnet Management”
+```
+
+If the group is not specified at rule creation time, the rule can be added to the rule group using dot notation in Windows PowerShell. You cannot specify the group using `Set-NetFirewallRule` since the command allows querying by rule group.
+
+Windows PowerShell
+
+``` syntax
+$rule = Get-NetFirewallRule -DisplayName “Allow Inbound Telnet”
+$rule.Group = “Telnet Management”
+$rule | Set-NetFirewallRule
+```
+
+Using the `Set` command, if the rule group name is specified, the group membership is not modified but rather all rules of the group receive the same modifications indicated by the given parameters.
+
+The following scriptlet enables all rules in a predefined group containing remote management influencing firewall rules.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall firewall set rule group="windows firewall remote management" new enable=yes
+```
+
+Windows PowerShell
+
+``` syntax
+Set-NetFirewallRule -DisplayGroup “Windows Firewall Remote Management” –Enabled True
+```
+
+There is also a separate `Enable-NetFirewallRule` cmdlet for enabling rules by group or by other properties of the rule.
+
+Windows PowerShell
+
+``` syntax
+Enable-NetFirewallRule -DisplayGroup “Windows Firewall Remote Management” -Verbose
+```
+
+### Delete a firewall rule
+
+Rule objects can be disabled so that they are no longer active. In Windows PowerShell, the **Disable-NetFirewallRule** cmdlet will leave the rule on the system, but put it in a disabled state so the rule no longer is applied and impacts traffic. A disabled firewall rule can be re-enabled by **Enable-NetFirewallRule**. This is different from the **Remove-NetFirewallRule**, which permanently removes the rule definition from the device.
+
+The following cmdlet deletes the specified existing firewall rule from the local policy store.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall firewall delete rule name=“Allow Web 80”
+```
+
+Windows PowerShell
+
+``` syntax
+Remove-NetFirewallRule –DisplayName “Allow Web 80”
+```
+
+Like with other cmdlets, you can also query for rules to be removed. Here, all blocking firewall rules are deleted from the device.
+
+Windows PowerShell
+
+``` syntax
+Remove-NetFirewallRule –Action Block
+```
+
+Note that it may be safer to query the rules with the **Get** command and save it in a variable, observe the rules to be affected, then pipe them to the **Remove** command, just as we did for the **Set** commands. The following example shows how you can view all the blocking firewall rules, and then delete the first four rules.
+
+Windows PowerShell
+
+``` syntax
+$x = Get-NetFirewallRule –Action Block
+$x
+$x[0-3] | Remove-NetFirewallRule
+```
+
+## Manage remotely
+
+Remote management using WinRM is enabled by default. The cmdlets that support the *CimSession* parameter use WinRM and can be managed remotely by default.
+
+The following example returns all firewall rules of the persistent store on a device named **RemoteDevice**.
+
+Windows PowerShell
+
+``` syntax
+Get-NetFirewallRule –CimSession RemoteDevice
+```
+
+We can perform any modifications or view rules on remote devices by simply using the *–CimSession* parameter. Here we remove a specific firewall rule from a remote device.
+
+Windows PowerShell
+
+``` syntax
+$RemoteSession = New-CimSession –ComputerName RemoteDevice
+Remove-NetFirewallRule –DisplayName “AllowWeb80” –CimSession $RemoteSession -Confirm
+```
+
+## Deploy basic IPsec rule settings
+
+An Internet Protocol security (IPsec) policy consists of rules that determine IPsec behavior. IPsec supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and replay protection.
+
+Windows PowerShell can create powerful, complex IPsec policies like in Netsh and the Windows Firewall with Advanced Security console. However, because Windows PowerShell is object-based rather than string token-based, configuration in Windows PowerShell offers greater control and flexibility.
+
+In Netsh, the authentication and cryptographic sets were specified as a list of comma-separated tokens in a specific format. In Windows PowerShell, rather than using default settings, you first create your desired authentication or cryptographic proposal objects and bundle them into lists in your preferred order. Then, you create one or more IPsec rules that reference these sets. The benefit of this model is that programmatic access to the information in the rules is much easier. See the following sections for clarifying examples.
+
+
+
+### Create IPsec rules
+
+The following cmdlet creates basic IPsec transport mode rule in a Group Policy Object. An IPsec rule is simple to create; all that is required is the display name, and the remaining properties use default values. Inbound traffic is authenticated and integrity checked using the default quick mode and main mode settings. These default settings can be found in the console under Customize IPsec Defaults.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall set store gpo=domain.contoso.com\gpo_name
+netsh advfirewall consec add rule name="Require Inbound Authentication" endpoint1=any endpoint2=any action=requireinrequestout
+```
+
+Windows PowerShell
+
+``` syntax
+New-NetIPsecRule -DisplayName “Require Inbound Authentication” -PolicyStore domain.contoso.com\gpo_name
+```
+
+### Add custom authentication methods to an IPsec rule
+
+If you want to create a custom set of quick-mode proposals that includes both AH and ESP in an IPsec rule object, you create the associated objects separately and link their associations. For more information about authentication methods, see [Choosing the IPsec Protocol](http://technet.microsoft.com/library/cc757847(WS.10).aspx) .
+
+You can then use the newly created custom quick-mode policies when you create IPsec rules. The cryptography set object is linked to an IPsec rule object.
+
+
+
+In this example, we build on the previously created IPsec rule by specifying a custom quick-mode crypto set. The final IPsec rule requires outbound traffic to be authenticated by the specified cryptography method.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall set store gpo=domain.contoso.com\gpo_name
+netsh advfirewall consec add rule name="Require Outbound Authentication" endpoint1=any endpoint2=any action=requireinrequestout qmsecmethods=ah:sha1+esp:sha1-3des
+```
+
+Windows PowerShell
+
+``` syntax
+$AHandESPQM = New-NetIPsecQuickModeCryptoProposal -Encapsulation AH,ESP –AHHash SHA1 -ESPHash SHA1 -Encryption DES3
+$QMCryptoSet = New-NetIPsecQuickModeCryptoSet –DisplayName “ah:sha1+esp:sha1-des3” -Proposal $AHandESPQM –PolicyStore domain.contoso.com\gpo_name
+New-NetIPsecRule -DisplayName “Require Inbound Authentication” -InboundSecurity Require -OutboundSecurity Request -QuickModeCryptoSet $QMCryptoSet.Name –PolicyStore domain.contoso.com\gpo_name
+```
+
+### IKEv2 IPsec transport rules
+
+A corporate network may need to secure communications with another agency. But, you discover the agency runs non-Windows operating systems and requires the use of the Internet Key Exchange Version 2 (IKEv2) standard.
+
+You can leverage IKEv2 capabilities in Windows Server 2012 by simply specifying IKEv2 as the key module in an IPsec rule. This can only be done using computer certificate authentication and cannot be used with phase 2 authentication.
+
+Windows PowerShell
+
+``` syntax
+New-NetIPsecRule -DisplayName “Require Inbound Authentication” -InboundSecurity Require -OutboundSecurity Request –Phase1AuthSet MyCertAuthSet -KeyModule IKEv2 –RemoteAddress $nonWindowsGateway
+```
+
+For more info about IKEv2, including scenarios, see [Securing End-to-End IPsec Connections by Using IKEv2](securing-end-to-end-ipsec-connections-by-using-ikev2.md).
+
+### Copy an IPsec rule from one policy to another
+
+Firewall and IPsec rules with the same rule properties can be duplicated to simplify the task of re-creating them within different policy stores.
+
+To copy the previously created rule from one policy store to another, the associated objects must be also be copied separately. Note that there is no need to copy associated firewall filters. You can query rules to be copied in the same way as other cmdlets.
+
+Copying individual rules is a task that is not possible through the Netsh interface. Here is how you can accomplish it with Windows PowerShell.
+
+Windows PowerShell
+
+``` syntax
+$Rule = Get-NetIPsecRule –DisplayName “Require Inbound Authentication”
+$Rule | Copy-NetIPsecRule –NewPolicyStore domain.costoso.com\new_gpo_name
+$Rule | Copy-NetPhase1AuthSet –NewPolicyStore domain.costoso.com\new_gpo_name
+```
+
+### Handling Windows PowerShell errors
+
+To handle errors in your Windows PowerShell scripts, you can use the *–ErrorAction* parameter. This is especially useful with the **Remove** cmdlets. If you want to remove a particular rule, you will notice that it fails if the rule is not found. When removing rules, if the rule isn’t already there, it is generally acceptable to ignore that error. In this case, you can do the following to suppress any “rule not found” errors during the remove operation.
+
+Windows PowerShell
+
+``` syntax
+Remove-NetFirewallRule –DisplayName “Contoso Messenger 98” –ErrorAction SilentlyContinue
+```
+
+Note that the use of wildcards can also suppress errors, but they could potentially match rules that you did not intend to remove. This can be a useful shortcut, but should only be used if you know there aren’t any extra rules that will be accidentally deleted. So the following cmdlet will also remove the rule, suppressing any “not found” errors.
+
+Windows PowerShell
+
+``` syntax
+Remove-NetFirewallRule –DisplayName “Contoso Messenger 98*”
+```
+
+When using wildcards, if you want to double-check the set of rules that is matched, you can use the *–WhatIf* parameter.
+
+Windows PowerShell
+
+``` syntax
+Remove-NetFirewallRule –DisplayName “Contoso Messenger 98*” –WhatIf
+```
+
+If you only want to delete some of the matched rules, you can use the *–Confirm* parameter to get a rule-by-rule confirmation prompt.
+
+Windows PowerShell
+
+``` syntax
+Remove-NetFirewallRule –DisplayName “Contoso Messenger 98*” –Confirm
+```
+
+You can also just perform the whole operation, displaying the name of each rule as the operation is performed.
+
+Windows PowerShell
+
+``` syntax
+Remove-NetFirewallRule –DisplayName “Contoso Messenger 98*” –Verbose
+```
+
+### Monitor
+
+The following Windows PowerShell commands are useful in the update cycle of a deployment phase.
+
+To allow you to view all the IPsec rules in a particular store, you can use the following commands. In Netsh, this command does not show rules where profile=domain,public or profile=domain,private. It only shows rules that have the single entry domain that is included in the rule. The following command examples will show the IPsec rules in all profiles.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall consec show rule name=all
+```
+
+Windows PowerShell
+
+``` syntax
+Show-NetIPsecRule –PolicyStore ActiveStore
+```
+
+You can monitor main mode security associations for information such as which peers are currently connected to the device and which protection suite is used to form the security associations.
+
+Use the following cmdlet to view existing main mode rules and their security associations:
+
+**Netsh**
+
+``` syntax
+netsh advfirewall monitor show mmsa all
+```
+
+Windows PowerShell
+
+``` syntax
+Get-NetIPsecMainModeSA
+```
+
+### Find the source GPO of a rule
+
+To view the properties of a particular rule or group of rules, you query for the rule. When a query returns fields that are specified as **NotConfigured**, you can to determine which policy store a rule originates from.
+
+For objects that come from a GPO (the *–PolicyStoreSourceType* parameter is specified as **GroupPolicy** in the **Show** command), if *–TracePolicyStore* is passed, the name of the GPO is found and returned in the **PolicyStoreSource** field.
+
+Windows PowerShell
+
+``` syntax
+Get-NetIPsecRule –DisplayName “Require Inbound Authentication” –TracePolicyStore
+```
+
+It is important to note that the revealed sources do not contain a domain name.
+
+### Deploy a basic domain isolation policy
+
+IPsec can be used to isolate domain members from non-domain members. Domain isolation uses IPsec authentication to require that the domain-joined devices positively establish the identities of the communicating devices to improve security of an organization. One or more features of IPsec can be used to secure traffic with an IPsec rule object.
+
+To implement domain isolation on your network, the devices in the domain receive IPsec rules that block unsolicited inbound network traffic that is not protected by IPsec. Here we create an IPsec rule that requires authentication by domain members. Through this, you can isolate domain-joined devices from devices that are not joined to a domain. In the following examples, Kerberos authentication is required for inbound traffic and requested for outbound traffic.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall set store gpo=domain.contoso.com\domain_isolation
+netsh advfirewall consec add rule name=“Basic Domain Isolation Policy” profile=domain endpoint1=”any” endpoint2=”any” action=requireinrequestout auth1=”computerkerb”
+```
+
+Windows PowerShell
+
+``` syntax
+$kerbprop = New-NetIPsecAuthProposal –Machine –Kerberos
+$Phase1AuthSet = New-NetIPsecPhase1AuthSet -DisplayName "Kerberos Auth Phase1" -Proposal $kerbprop –PolicyStore domain.contoso.com\domain_isolation
+New-NetIPsecRule –DisplayName “Basic Domain Isolation Policy” –Profile Domain –Phase1AuthSet $Phase1AuthSet.Name –InboundSecurity Require –OutboundSecurity Request –PolicyStore domain.contoso.com\domain_isolation
+```
+
+### Configure IPsec tunnel mode
+
+The following command creates an IPsec tunnel that routes traffic from a private network (192.168.0.0/16) through an interface on the local device (1.1.1.1) attached to a public network to a second device through its public interface (2.2.2.2) to another private network (192.157.0.0/16). All traffic through the tunnel is checked for integrity by using ESP/SHA1, and it is encrypted by using ESP/DES3.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall consec add rule name="Tunnel from 192.168.0.0/16 to 192.157.0.0/16" mode=tunnel endpoint1=192.168.0.0/16 endpoint2=192.157.0.0/16 localtunnelendpoint=1.1.1.1 remotetunnelendpoint=2.2.2.2 action=requireinrequireout qmsecmethods=esp:sha1-3des
+```
+
+Windows PowerShell
+
+``` syntax
+$QMProposal = New-NetIPsecQuickModeCryptoProposal -Encapsulation ESP -ESPHash SHA1 -Encryption DES3
+$QMCryptoSet = New-NetIPsecQuickModeCryptoSet –DisplayName “esp:sha1-des3” -Proposal $QMProposal
+New-NetIPSecRule -DisplayName “Tunnel from HQ to Dallas Branch” -Mode Tunnel -LocalAddress 192.168.0.0/16 -RemoteAddress 192.157.0.0/16 -LocalTunnelEndpoint 1.1.1.1 -RemoteTunnelEndpoint 2.2.2.2 -InboundSecurity Require -OutboundSecurity Require -QuickModeCryptoSet $QMCryptoSet.Name
+```
+
+## Deploy secure firewall rules with IPsec
+
+In situations where only secure traffic can be allowed through the Windows Firewall, a combination of manually configured firewall and IPsec rules are necessary. The firewall rules determine the level of security for allowed packets, and the underlying IPsec rules secure the traffic. The scenarios can be accomplished in Windows PowerShell and in Netsh, with many similarities in deployment.
+
+### Create a secure firewall rule (allow if secure)
+
+Configuring firewalls rule to allow connections if they are secure requires the corresponding traffic to be authenticated and integrity protected, and then optionally encrypted by IPsec.
+
+The following example creates a firewall rule that requires traffic to be authenticated. The command permits inbound Telnet network traffic only if the connection from the remote device is authenticated by using a separate IPsec rule.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall firewall add rule name="Allow Authenticated Telnet" dir=in program=%SystemRoot%\System32\tlntsvr.exe security=authenticate action=allow
+```
+
+Windows PowerShell
+
+``` syntax
+New-NetFirewallRule -DisplayName “Allow Authenticated Telnet” -Direction Inbound -Program %SystemRoot%\System32\tlntsvr.exe -Authentication Required -Action Allow
+```
+
+The following command creates an IPsec rule that requires a first (computer) authentication and then attempts an optional second (user) authentication. Creating this rule secures and allows the traffic through the firewall rule requirements for the messenger program.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall consec add rule name="Authenticate Both Computer and User" endpoint1=any endpoint2=any action=requireinrequireout auth1=computerkerb,computerntlm auth2=userkerb,userntlm,anonymous
+```
+
+Windows PowerShell
+
+``` syntax
+$mkerbauthprop = New-NetIPsecAuthProposal -Machine –Kerberos
+$mntlmauthprop = New-NetIPsecAuthProposal -Machine -NTLM
+$P1Auth = New-NetIPsecPhase1AuthSet -DisplayName “Machine Auth” –Proposal $mkerbauthprop,$mntlmauthprop
+$ukerbauthprop = New-NetIPsecAuthProposal -User -Kerberos
+$unentlmauthprop = New-NetIPsecAuthProposal -User -NTLM
+$anonyauthprop = New-NetIPsecAuthProposal -Anonymous
+$P2Auth = New-NetIPsecPhase2AuthSet -DisplayName “User Auth” -Proposal $ukerbauthprop,$unentlmauthprop,$anonyauthprop
+New-NetIPSecRule -DisplayName “Authenticate Both Computer and User” -InboundSecurity Require -OutboundSecurity Require -Phase1AuthSet $P1Auth.Name –Phase2AuthSet $P2Auth.Name
+```
+
+### Isolate a server by requiring encryption and group membership
+
+To improve the security of the devices in an organization, you can deploy domain isolation in which domain-members are restricted. They require authentication when communicating among each other and reject non-authenticated inbound connections. To improve the security of servers with sensitive data, this data must be protected by allowing access only to a subset of devices within the enterprise domain.
+
+IPsec can provide this additional layer of protection by isolating the server. In server isolation, sensitive data access is restricted to users and devices with legitimate business need, and the data is additionally encrypted to prevent eavesdropping.
+
+### Create a firewall rule that requires group membership and encryption
+
+To deploy server isolation, we layer a firewall rule that restricts traffic to authorized users or devices on the IPsec rule that enforces authentication.
+
+The following firewall rule allows Telnet traffic from user accounts that are members of a custom group called “Authorized to Access Server.” This access can additionally be restricted based on the device, user, or both by specifying the restriction parameters.
+
+A Security Descriptor Definition Language (SDDL) string is created by extending a user or group’s security identifier (SID). For more information about finding a group’s SID, see: [Finding the SID for a group account](http://technet.microsoft.com/library/cc753463(WS.10).aspx#bkmk_FINDSID).
+
+Restricting access to a group allows administrations to extend strong authentication support through Windows Firewall/and or IPsec policies.
+
+The following example shows you how to create an SDDL string that represents security groups.
+
+Windows PowerShell
+
+``` syntax
+$user = new-object System.Security.Principal.NTAccount (“corp.contoso.com\Administrators”)
+$SIDofSecureUserGroup = $user.Translate([System.Security.Principal.SecurityIdentifier]).Value
+$secureUserGroup = "D:(A;;CC;;;$SIDofSecureUserGroup)"
+```
+
+By using the previous scriptlet, you can also get the SDDL string for a secure computer group as shown here:
+
+Windows PowerShell
+
+``` syntax
+$secureMachineGroup = "D:(A;;CC;;;$SIDofSecureMachineGroup)"
+```
+
+For more information about how to create security groups or how to determine the SDDL string, see [Working with SIDs](http://technet.microsoft.com/library/ff730940.aspx).
+
+Telnet is an application that does not provide encryption. This application can send data, such as names and passwords, over the network. This data can be intercepted by malicious users. If an administrator would like to allow the use of Telnet, but protect the traffic, a firewall rule that requires IPsec encryption can be created. This is necessary so that the administrator can be certain that when this application is used, all of the traffic sent or received by this port is encrypted. If IPsec fails to authorize the connection, no traffic is allowed from this application.
+
+In this example, we allow only authenticated and encrypted inbound Telnet traffic from a specified secure user group through the creation of the following firewall rule.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall set store gpo=domain.contoso.com\Server_Isolation
+netsh advfirewall firewall add rule name=“Allow Encrypted Inbound Telnet to Group Members Only” program=%SystemRoot%\System32\tlntsvr.exe protocol=TCP dir=in action=allow localport=23 security=authenc rmtusrgrp ="D:(A;;CC;;; S-1-5-21-2329867823-2610410949-1491576313-1735)"
+```
+
+Windows PowerShell
+
+``` syntax
+New-NetFirewallRule -DisplayName "Allow Encrypted Inbound Telnet to Group Members Only" -Program %SystemRoot%\System32\tlntsvr.exe -Protocol TCP -Direction Inbound -Action Allow -LocalPort 23 -Authentication Required -Encryption Required –RemoteUser $secureUserGroup –PolicyStore domain.contoso.com\Server_Isolation
+```
+
+### Endpoint security enforcement
+
+The previous example showed end to end security for a particular application. In situations where endpoint security is required for many applications, having a firewall rule per application can be cumbersome and difficult to manage. Authorization can override the per-rule basis and be done at the IPsec layer.
+
+In this example, we set the global IPsec setting to only allow transport mode traffic to come from an authorized user group with the following cmdlet. Consult the previous examples for working with security groups.
+
+Windows PowerShell
+
+``` syntax
+Set-NetFirewallSetting -RemoteMachineTransportAuthorizationList $secureMachineGroup
+```
+
+### Create firewall rules that allow IPsec-protected network traffic (authenticated bypass)
+
+Authenticated bypass allows traffic from a specified trusted device or user to override firewall block rules. This is helpful when an administrator wants to use scanning servers to monitor and update devices without the need to use port-level exceptions. For more information, see [How to enable authenticated firewall bypass](http://technet.microsoft.com/library/cc753463(WS.10).aspx).
+
+In this example, we assume that a blocking firewall rule exists. This example permits any network traffic on any port from any IP address to override the block rule, if the traffic is authenticated as originating from a device or user account that is a member of the specified device or user security group.
+
+**Netsh**
+
+``` syntax
+netsh advfirewall set store gpo=domain.contoso.com\domain_isolation
+netsh advfirewall firewall add rule name="Inbound Secure Bypass Rule" dir=in security=authenticate action="bypass" rmtcomputergrp="D:(A;;CC;;;S-1-5-21-2329867823-2610410949-1491576313-1114)" rmtusrgrp="D:(A;;CC;;; S-1-5-21-2329867823-2610410949-1491576313-1735)"
+```
+
+Windows PowerShell
+
+``` syntax
+New-NetFirewallRule –DisplayName “Inbound Secure Bypass Rule" –Direction Inbound –Authentication Required –OverrideBlockRules $true -RemoteMachine $secureMachineGroup –RemoteUser $secureUserGroup –PolicyStore domain.contoso.com\domain_isolation
+```
+
+## Additional resources
+
+
+For more information about Windows PowerShell concepts, see the following topics.
+
+- [Windows PowerShell Getting Started Guide](http://go.microsoft.com/fwlink/p/?linkid=113440)
+
+- [Windows PowerShell User Guide](http://go.microsoft.com/fwlink/p/?linkid=113441)
+
+- [Windows PowerShell About Help Topics](http://go.microsoft.com/fwlink/p/?linkid=113206)
+
+- [about\_Functions](http://go.microsoft.com/fwlink/p/?linkid=113231)
+
+- [about\_Functions\_Advanced](http://go.microsoft.com/fwlink/p/?linkid=144511)
+
+- [about\_Execution\_Policies](http://go.microsoft.com/fwlink/p/?linkid=135170)
+
+- [about\_Foreach](http://go.microsoft.com/fwlink/p/?linkid=113229)
+
+- [about\_Objects](http://go.microsoft.com/fwlink/p/?linkid=113241)
+
+- [about\_Properties](http://go.microsoft.com/fwlink/p/?linkid=113249)
+
+- [about\_While](http://go.microsoft.com/fwlink/p/?linkid=113275)
+
+- [about\_Scripts](http://go.microsoft.com/fwlink/p/?linkid=144310)
+
+- [about\_Signing](http://go.microsoft.com/fwlink/p/?linkid=113268)
+
+- [about\_Throw](http://go.microsoft.com/fwlink/p/?linkid=145153)
+
+- [about\_PSSessions](http://go.microsoft.com/fwlink/p/?linkid=135181)
+
+- [about\_Modules](http://go.microsoft.com/fwlink/p/?linkid=144311)
+
+- [about\_Command\_Precedence](http://go.microsoft.com/fwlink/p/?linkid=113214)
+
+
+
+
+
+
+
+
+
diff --git a/windows/keep-secure/windows-firewall-with-advanced-security-deployment-guide.md b/windows/keep-secure/windows-firewall-with-advanced-security-deployment-guide.md
new file mode 100644
index 0000000000..5dabaedf02
--- /dev/null
+++ b/windows/keep-secure/windows-firewall-with-advanced-security-deployment-guide.md
@@ -0,0 +1,62 @@
+---
+title: Windows Firewall with Advanced Security Deployment Guide (Windows 10)
+description: Windows Firewall with Advanced Security Deployment Guide
+ms.assetid: 56b51b97-1c38-481e-bbda-540f1216ad56
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Windows Firewall with Advanced Security Deployment Guide
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+You can use the Windows Firewall with Advanced Security MMC snap-in with devices running at least Windows Vista or Windows Server 2008 to help protect the devices and the data that they share across a network.
+
+You can use Windows Firewall to control access to the device from the network. You can create rules that allow or block network traffic in either direction based on your business requirements. You can also create IPsec connection security rules to help protect your data as it travels across the network from device to device.
+
+## About this guide
+
+This guide is intended for use by system administrators and system engineers. It provides detailed guidance for deploying a Windows Firewall with Advanced Security design that you or an infrastructure specialist or system architect in your organization has selected.
+
+Begin by reviewing the information in [Planning to Deploy Windows Firewall with Advanced Security](planning-to-deploy-windows-firewall-with-advanced-security.md).
+
+If you have not yet selected a design, we recommend that you wait to follow the instructions in this guide until after you have reviewed the design options in the [Windows Firewall with Advanced Security Design Guide](windows-firewall-with-advanced-security-design-guide.md) and selected the one most appropriate for your organization.
+
+After you select your design and gather the required information about the zones (isolation, boundary, and encryption), operating systems to support, and other details, you can then use this guide to deploy your Windows Firewall with Advanced Security design in your production environment. This guide provides steps for deploying any of the following primary designs that are described in the Design Guide:
+
+- [Basic Firewall Policy Design](basic-firewall-policy-design.md)
+
+- [Domain Isolation Policy Design](domain-isolation-policy-design.md)
+
+- [Server Isolation Policy Design](server-isolation-policy-design.md)
+
+- [Certificate-based Isolation Policy Design](certificate-based-isolation-policy-design.md)
+
+Use the checklists in [Implementing Your Windows Firewall with Advanced Security Design Plan](implementing-your-windows-firewall-with-advanced-security-design-plan.md) to determine how best to use the instructions in this guide to deploy your particular design.
+
+>**Caution:** We recommend that you use the techniques documented in this guide only for GPOs that must be deployed to the majority of the devices in your organization, and only when the OU hierarchy in your Active Directory domain does not match the deployment needs of these GPOs. These characteristics are typical of GPOs for server and domain isolation scenarios, but are not typical of most other GPOs. When the OU hierarchy supports it, deploy a GPO by linking it to the lowest level OU that contains all of the accounts to which the GPO applies.
+
+In a large enterprise environment with hundreds or thousands of GPOs, using this technique with too many GPOs can result in user or device accounts that are members of an excessive number of groups; this can result in network connectivity problems if network protocol limits are exceeded.
+
+## What this guide does not provide
+
+This guide does not provide:
+
+- Guidance for creating firewall rules for specific network applications. For this information, see [Planning Settings for a Basic Firewall Policy](planning-settings-for-a-basic-firewall-policy.md) in the Windows Firewall with Advanced Security Design Guide.
+
+- Guidance for setting up Active Directory Domain Services (AD DS) to support Group Policy.
+
+- Guidance for setting up certification authorities (CAs) to create certificates for certificate-based authentication.
+
+## Overview of Windows Firewall with Advanced Security
+
+Windows Firewall with Advanced Security in Windows 8, Windows 7, Windows Vista, Windows Server 2012, Windows Server 2008, and Windows Server 2008 R2 is a stateful host firewall that helps secure the device by allowing you to create rules that determine which network traffic is permitted to enter the device from the network and which network traffic the device is allowed to send to the network. Windows Firewall with Advanced Security also supports Internet Protocol security (IPsec), which you can use to require authentication from any device that is attempting to communicate with your device. When authentication is required, devices that cannot be authenticated as a trusted device cannot communicate with your device. You can also use IPsec to require that certain network traffic is encrypted to prevent it from being read by network packet analyzers that could be attached to the network by a malicious user.
+
+The Windows Firewall with Advanced Security MMC snap-in is more flexible and provides much more functionality than the consumer-friendly Windows Firewall interface found in the Control Panel. Both interfaces interact with the same underlying services, but provide different levels of control over those services. While the Windows Firewall Control Panel program can protect a single device in a home environment, it does not provide enough centralized management or security features to help secure more complex network traffic found in a typical business enterprise environment.
+
+For more information about Windows Firewall with Advanced Security, see [Windows Firewall with Advanced Security Overview](windows-firewall-with-advanced-security.md).
diff --git a/windows/keep-secure/windows-firewall-with-advanced-security-design-guide.md b/windows/keep-secure/windows-firewall-with-advanced-security-design-guide.md
new file mode 100644
index 0000000000..acc229bd6a
--- /dev/null
+++ b/windows/keep-secure/windows-firewall-with-advanced-security-design-guide.md
@@ -0,0 +1,99 @@
+---
+title: Windows Firewall with Advanced Security Design Guide (Windows 10)
+description: Windows Firewall with Advanced Security Design Guide
+ms.assetid: 5c631389-f232-4b95-9e48-ec02b8677d51
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Windows Firewall with Advanced Security Design Guide
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+Windows Firewall with Advanced Security is a host firewall that helps secure the device in two ways. First, it can filter the network traffic permitted to enter the device from the network, and also control what network traffic the device is allowed to send to the network. Second, Windows Firewall with Advanced Security supports IPsec, which enables you to require authentication from any device that is attempting to communicate with your device. When authentication is required, devices that cannot authenticate cannot communicate with your device. By using IPsec, you can also require that specific network traffic be encrypted to prevent it from being read or intercepted while in transit between devices.
+
+The interface for Windows Firewall with Advanced Security is much more capable and flexible than the consumer-friendly interface found in the Windows Firewall Control Panel. They both interact with the same underlying services, but provide different levels of control over those services. While the Windows Firewall Control Panel meets the needs for protecting a single device in a home environment, it does not provide enough centralized management or security features to help secure more complex network traffic found in a typical business enterprise environment.
+
+For more overview information about Windows Firewall with Advanced Security and see [Windows Firewall with Advanced Security](windows-firewall-with-advanced-security.md).
+
+## About this guide
+
+This guide provides recommendations to help you to choose or create a design for deploying Windows Firewall with Advanced Security in your enterprise environment. The guide describes some of the common goals for using Windows Firewall with Advanced Security, and then helps you map the goals that apply to your scenario to the designs that are presented in this guide.
+
+This guide is intended for the IT professional who has been assigned the task of deploying firewall and IPsec technologies on an organization's network to help meet the organization's security goals.
+
+Windows Firewall with Advanced Security should be part of a comprehensive security solution that implements a variety of security technologies, such as perimeter firewalls, intrusion detection systems, virtual private networking (VPN), IEEE 802.1X authentication for wireless and wired connections, and IPsec connection security rules.
+
+To successfully use this guide, you need a good understanding of both the capabilities provided by Windows Firewall with Advanced Security, and how to deliver configuration settings to your managed devices by using Group Policy in Active Directory.
+
+You can use the deployment goals to form one of these Windows Firewall with Advanced Security designs, or a custom design that combines elements from those presented here:
+
+- **Basic firewall policy design**. Restricts network traffic in and out of your devices to only that which is needed and authorized.
+
+- **Domain isolation policy design**. Prevents devices that are domain members from receiving unsolicited network traffic from devices that are not domain members. Additional "zones" can be established to support the special requirements of some devices, such as:
+
+ - A "boundary zone" for devices that must be able to receive requests from non-isolated devices.
+
+ - An "encryption zone" for devices that store sensitive data that must be protected during network transmission.
+
+- **Server isolation policy design**. Restricts access to a server to only a limited group of authorized users and devices. Commonly configured as a zone in a domain isolation design, but can also be configured as a stand-alone design, providing many of the benefits of domain isolation to a small set of devices.
+
+- **Certificate-based isolation policy design**. This design is a complement to either of the previous two designs, and supports any of their capabilities. It uses cryptographic certificates that are deployed to clients and servers for authentication, instead of the Kerberos V5 authentication used by default in Active Directory. This enables devices that are not part of an Active Directory domain, such as devices running operating systems other than Windows, to participate in your isolation solution.
+
+In addition to descriptions and example for each design, you will find guidelines for gathering required data about your environment. You can then use these guidelines to plan and design your Windows Firewall with Advanced Security deployment. After you read this guide, and finish gathering, documenting, and mapping your organization's requirements, you have the information that you need to begin deploying Windows Firewall with Advanced Security using the guidance in the Windows Firewall with Advanced Security Deployment Guide.
+
+You can find the Windows Firewall with Advanced Security Deployment Guide at these locations:
+
+- (Web page)
+
+- (Downloadable Word document)
+
+## In this section
+
+| Topic | Description
+| - | - |
+| [Understanding the Windows Firewall with Advanced Security Design Process](understanding-the-windows-firewall-with-advanced-security-design-process.md) | Learn how to get started with the Windows Firewall with Advanced Security design process. |
+| [Identifying Your Windows Firewall with Advanced Security Deployment Goals](identifying-your-windows-firewall-with-advanced-security-deployment-goals.md) | Learn how to identify your Windows Firewall with Advanced Security deployment goals. |
+| [Mapping Your Deployment Goals to a Windows Firewall with Advanced Security Design](mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md) | After you finish reviewing the existing Windows Firewall with Advanced Security deployment goals and you determine which goals are important to your specific deployment, you can map those goals to a specific Windows Firewall with Advanced Security design. |
+| [Evaluating Windows Firewall with Advanced Security Design Examples](evaluating-windows-firewall-with-advanced-security-design-examples.md) | Learn how to use Windows Firewall with Advanced Security to improve the security of the computers connected to the network. |
+| [Designing a Windows Firewall with Advanced Security Strategy](designing-a-windows-firewall-with-advanced-security-strategy.md) | To select the most effective design for helping to protect the network, you must spend time collecting key information about your current computer environment. |
+| [Planning Your Windows Firewall with Advanced Security Design](planning-your-windows-firewall-with-advanced-security-design.md) | After you have gathered the relevant information in the previous sections, and understand the basics of the designs as described earlier in this guide, you can select the design (or combination of designs) that meet your needs. |
+| [Appendix A: Sample GPO Template Files for Settings Used in this Guide](appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md) | You can import an XML file containing customized registry preferences into a Group Policy Object (GPO) by using the Preferences feature of the Group Policy Management Console (GPMC). |
+
+## Terminology used in this guide
+
+The following table identifies and defines terms used throughout this guide.
+
+| Term | Definition |
+| - | - |
+| Active Directory domain | A group of devices and users managed by an administrator by using Active Directory Domain Services (AD DS). Devices in a domain share a common directory database and security policies. Multiple domains can co-exist in a "forest," with trust relationships that establish the forest as the security boundary. |
+| Authentication | A process that enables the sender of a message to prove its identity to the receiver. For connection security in Windows, authentication is implemented by the IPsec protocol suite.|
+| Boundary zone | A subset of the devices in an isolated domain that must be able to receive unsolicited and non-authenticated network traffic from devices that are not members of the isolated domain. Devices in the boundary zone request but do not require authentication. They use IPsec to communicate with other devices in the isolated domain.|
+| Connection security rule | A rule in Windows Firewall with Advanced Security that contains a set of conditions and an action to be applied to network packets that match the conditions. The action can allow the packet, block the packet, or require the packet to be protected by IPsec. In previous versions of Windows, this was called an *IPsec rule*.|
+| Certificate-based isolation | A way to add devices that cannot use Kerberos V5 authentication to an isolated domain, by using an alternate authentication technique. Every device in the isolated domain and the devices that cannot use Kerberos V5 are provided with a device certificate that can be used to authenticate with each other. Certificate-based isolation requires a way to create and distribute an appropriate certificate (if you choose not to purchase one from a commercial certificate provider).|
+| Domain isolation | A technique for helping protect the devices in an organization by requiring that the devices authenticate each other's identity before exchanging information, and refusing connection requests from devices that cannot authenticate. Domain isolation takes advantage of Active Directory domain membership and the Kerberos V5 authentication protocol available to all members of the domain. Also see "Isolated domain" in this table.|
+| Encryption zone | A subset of the devices in an isolated domain that process sensitive data. Devices that are part of the encryption zone have all network traffic encrypted to prevent viewing by non-authorized users. Devices that are part of the encryption zone also typically are subject to the access control restrictions of server isolation.|
+| Firewall rule | A rule in Windows Firewall with Advanced Security that contains a set of conditions used to determine whether a network packet is allowed to pass through the firewall.
By default, the firewall rules in Windows Server 2012, Windows Server 2008 R2, Windows Server 2008, Windows 8, Windows 7, and Windows Vista block unsolicited inbound network traffic. Likewise, by default, all outbound network traffic is allowed. The firewall included in previous versions of Windows only filtered inbound network traffic. |
+| Internet Protocol security (IPsec) | A set of industry-standard, cryptography-based protection services and protocols. IPsec protects all protocols in the TCP/IP protocol suite except Address Resolution Protocol (ARP).|
+| IPsec policy | A collection of connection security rules that provide the required protection to network traffic entering and leaving the device. The protection includes authentication of both the sending and receiving device, integrity protection of the network traffic exchanged between them, and can include encryption.|
+| Isolated domain | An Active Directory domain (or an Active Directory forest, or set of domains with two-way trust relationships) that has Group Policy settings applied to help protect its member devices by using IPsec connection security rules. Members of the isolated domain require authentication on all unsolicited inbound connections (with exceptions handled by the other zones).
In this guide, the term *isolated domain* refers to the IPsec concept of a group of devices that can share authentication. The term *Active Directory domain* refers to the group of devices that share a security database by using Active Directory.|
+| Server isolation | A technique for using group membership to restrict access to a server that is typically already a member of an isolated domain. The additional protection comes from using the authentication credentials of the requesting device to determine its group membership, and then only allowing access if the computer account (and optionally the user account) is a member of an authorized group.|
+| Solicited network traffic | Network traffic that is sent in response to a request. By default, Windows Firewall with Advanced Security allows all solicited network traffic through.|
+| Unsolicited network traffic | Network traffic that is not a response to an earlier request, and that the receiving device cannot necessarily anticipate. By default, Windows Firewall with Advanced Security blocks all unsolicited network traffic. |
+| Zone | A zone is a logical grouping of devices that share common IPsec policies because of their communications requirements. For example, the boundary zone permits inbound connections from non-trusted devices. The encryption zone requires that all connections be encrypted.
This is not related to the term zone as used by Domain Name System (DNS). |
+
+**Next:** [Understanding the Windows Firewall with Advanced Security Design Process](understanding-the-windows-firewall-with-advanced-security-design-process.md)
+
+
+
+
+
+
+
+
+
diff --git a/windows/keep-secure/windows-firewall-with-advanced-security.md b/windows/keep-secure/windows-firewall-with-advanced-security.md
new file mode 100644
index 0000000000..51c6967315
--- /dev/null
+++ b/windows/keep-secure/windows-firewall-with-advanced-security.md
@@ -0,0 +1,42 @@
+---
+title: Windows Firewall with Advanced Security (Windows 10)
+description: Windows Firewall with Advanced Security
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: brianlic-msft
+---
+
+# Windows Firewall with Advanced Security
+
+**Applies to**
+- Windows 10
+- Windows Server 2016 Technical Preview
+
+This is an overview of the Windows Firewall with Advanced Security (WFAS) and Internet Protocol security (IPsec) features.
+
+## Feature description
+
+Windows Firewall with Advanced Security is an important part of a layered security model. By providing host-based, two-way network traffic filtering for a device, Windows Firewall with Advanced Security blocks unauthorized network traffic flowing into or out of the local device. Windows Firewall with Advanced Security also works with Network Awareness so that it can apply security settings appropriate to the types of networks to which the device is connected. Windows Firewall and Internet Protocol Security (IPsec) configuration settings are integrated into a single Microsoft Management Console (MMC) named Windows Firewall with Advanced Security, so Windows Firewall is also an important part of your network’s isolation strategy.
+
+## Practical applications
+
+
+To help address your organizational network security challenges, Windows Firewall with Advanced Security offers the following benefits:
+
+- **Reduces the risk of network security threats.** Windows Firewall with Advanced Security reduces the attack surface of a device, providing an additional layer to the defense-in-depth model. Reducing the attack surface of a device increases manageability and decreases the likelihood of a successful attack.
+
+- **Safeguards sensitive data and intellectual property.** With its integration with IPsec, Windows Firewall with Advanced Security provides a simple way to enforce authenticated, end-to-end network communications. It provides scalable, tiered access to trusted network resources, helping to enforce integrity of the data, and optionally helping to protect the confidentiality of the data.
+
+- **Extends the value of existing investments.** Because Windows Firewall with Advanced Security is a host-based firewall that is included with the operating system, there is no additional hardware or software required. Windows Firewall with Advanced Security is also designed to complement existing non-Microsoft network security solutions through a documented application programming interface (API).
+
+## In this section
+
+| Topic | Description
+| - | - |
+| [Isolating Windows Store Apps on Your Network](isolating-apps-on-your-network.md) | You can customize your Windows Firewall configuration to isolate the network access of Windows Store apps that run on devices. |
+| [Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012](securing-end-to-end-ipsec-connections-by-using-ikev2.md) | You can use IKEv2 to help secure your end-to-end IPSec connections. |
+| [Windows Firewall with Advanced Security Administration with Windows PowerShell](windows-firewall-with-advanced-security-administration-with-windows-powershell.md) | Learn more about using Windows PowerShell to manage the Windows Firewall. |
+| [Windows Firewall with Advanced Security Design Guide](windows-firewall-with-advanced-security-design-guide.md) | Learn how to create a design for deploying Windows Firewall with Advanced Security. |
+| [Windows Firewall with Advanced Security Deployment Guide](windows-firewall-with-advanced-security-deployment-guide.md) | Learn how to deploy Windows Firewall with Advanced Security. |
diff --git a/windows/manage/acquire-apps-windows-store-for-business.md b/windows/manage/acquire-apps-windows-store-for-business.md
index 8e22322f1c..47dc081e5c 100644
--- a/windows/manage/acquire-apps-windows-store-for-business.md
+++ b/windows/manage/acquire-apps-windows-store-for-business.md
@@ -1,7 +1,7 @@
---
title: Acquire apps in Windows Store for Business (Windows 10)
description: As an admin, you can acquire apps from the Windows Store for Business for your employees. Some apps are free, and some have a price. For info on app types that are supported, see Apps in the Windows Store for Business.
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
---
diff --git a/windows/manage/add-unsigned-app-to-code-integrity-policy.md b/windows/manage/add-unsigned-app-to-code-integrity-policy.md
index 538034d0f2..8ccdfd7c62 100644
--- a/windows/manage/add-unsigned-app-to-code-integrity-policy.md
+++ b/windows/manage/add-unsigned-app-to-code-integrity-policy.md
@@ -2,7 +2,7 @@
title: Add unsigned app to code integrity policy (Windows 10)
description: When you want to add an unsigned app to a code integrity policy, you need to start with a code integrity policy created from a reference device.
ms.assetid: 580E18B1-2FFD-4EE4-8CC5-6F375BE224EA
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/administrative-tools-in-windows-10.md b/windows/manage/administrative-tools-in-windows-10.md
index 5019f298d8..cc42197767 100644
--- a/windows/manage/administrative-tools-in-windows-10.md
+++ b/windows/manage/administrative-tools-in-windows-10.md
@@ -2,7 +2,7 @@
title: Administrative Tools in Windows 10 (Windows 10)
description: Administrative Tools is a folder in Control Panel that contains tools for system administrators and advanced users.
ms.assetid: FDC63933-C94C-43CB-8373-629795926DC8
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/app-inventory-managemement-windows-store-for-business.md b/windows/manage/app-inventory-managemement-windows-store-for-business.md
index 245d15cac1..16923a2b15 100644
--- a/windows/manage/app-inventory-managemement-windows-store-for-business.md
+++ b/windows/manage/app-inventory-managemement-windows-store-for-business.md
@@ -2,7 +2,7 @@
title: App inventory management for Windows Store for Business (Windows 10)
description: You can manage all apps that you've acquired on your Inventory page.
ms.assetid: 44211937-801B-4B85-8810-9CA055CDB1B2
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/application-development-for-windows-as-a-service.md b/windows/manage/application-development-for-windows-as-a-service.md
index cffbdd7092..5b8fc04a92 100644
--- a/windows/manage/application-development-for-windows-as-a-service.md
+++ b/windows/manage/application-development-for-windows-as-a-service.md
@@ -2,7 +2,7 @@
title: Application development for Windows as a service (Windows 10)
description: In today’s environment, where user expectations frequently are set by device-centric experiences, complete product cycles need to be measured in months, not years.
ms.assetid: 28E0D103-B0EE-4B14-8680-6F30BD373ACF
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
ms.pagetype: security
diff --git a/windows/manage/apps-in-windows-store-for-business.md b/windows/manage/apps-in-windows-store-for-business.md
index 30d0677d94..bd94b6ad6f 100644
--- a/windows/manage/apps-in-windows-store-for-business.md
+++ b/windows/manage/apps-in-windows-store-for-business.md
@@ -2,7 +2,7 @@
title: Apps in Windows Store for Business (Windows 10)
description: Windows Store for Business has thousands of apps from many different categories.
ms.assetid: CC5641DA-3CEA-4950-AD81-1AF1AE876926
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/assign-apps-to-employees.md b/windows/manage/assign-apps-to-employees.md
index c6e8393f30..e3be271bfd 100644
--- a/windows/manage/assign-apps-to-employees.md
+++ b/windows/manage/assign-apps-to-employees.md
@@ -2,7 +2,7 @@
title: Assign apps to employees (Windows 10)
description: Administrators can assign online-licensed apps to employees in their organization.
ms.assetid: A0DF4EC2-BE33-41E1-8832-DBB0EBECA31A
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/change-history-for-manage-and-update-windows-10.md b/windows/manage/change-history-for-manage-and-update-windows-10.md
index df398cfd27..5bdd320fd8 100644
--- a/windows/manage/change-history-for-manage-and-update-windows-10.md
+++ b/windows/manage/change-history-for-manage-and-update-windows-10.md
@@ -2,7 +2,7 @@
title: Change history for Manage and update Windows 10 (Windows 10)
description: This topic lists new and updated topics in the Manage and update Windows 10 documentation for Windows 10 and Windows 10 Mobile.
ms.assetid: 29144AFA-1DA9-4532-B07D-1EBE34B7E1E0
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
@@ -17,7 +17,7 @@ This topic lists new and updated topics in the [Manage and update Windows 10](in
| New or changed topic | Description |
| ---|---|
| [Group Policies that apply only to Windows 10 Enterprise and Education Editions](group-policies-for-enterprise-and-education-editions.md) | New |
-| [Configure Windows 10 devices to stop data flow to Microsoft](configure-windows-10-devices-to-stop-data-flow-to-microsoft.md) | Added section on how to turn off Live Tiles |
+| [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) | Added section on how to turn off Live Tiles |
| [Configure Windows telemetry in your organization](configure-windows-telemetry-in-your-organization.md) | New telemetry content |
| [Manage Wi-Fi Sense in your company](manage-wifi-sense-in-enterprise.md) |Removed info about sharing wi-fi network access with contacts, since it's been deprecated. |
| [Set up a kiosk on Windows 10 Pro, Enterprise, or Education](set-up-a-kiosk-for-windows-10-for-desktop-editions.md) | Corrected script for setting a custom shell using Shell Launcher |
diff --git a/windows/manage/changes-to-start-policies-in-windows-10.md b/windows/manage/changes-to-start-policies-in-windows-10.md
index 30a8c0a870..8697ff8945 100644
--- a/windows/manage/changes-to-start-policies-in-windows-10.md
+++ b/windows/manage/changes-to-start-policies-in-windows-10.md
@@ -3,7 +3,7 @@ title: Changes to Group Policy settings for Windows 10 Start (Windows 10)
description: Windows 10 has a brand new Start experience.
ms.assetid: 612FB68A-3832-451F-AA97-E73791FEAA9F
keywords: ["group policy", "start menu", "start screen"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/configure-devices-without-mdm.md b/windows/manage/configure-devices-without-mdm.md
index 82e3420ae6..11dd816f58 100644
--- a/windows/manage/configure-devices-without-mdm.md
+++ b/windows/manage/configure-devices-without-mdm.md
@@ -3,7 +3,7 @@ title: Configure devices without MDM (Windows 10)
description: Create a runtime provisioning package to apply settings, profiles, and file assets to a device running Windows 10.
ms.assetid: 66D14E97-E116-4218-8924-E2A326C9367E
keywords: ["runtime provisioning", "provisioning package"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/configure-mdm-provider-windows-store-for-business.md b/windows/manage/configure-mdm-provider-windows-store-for-business.md
index 2b94aba619..d187a3674a 100644
--- a/windows/manage/configure-mdm-provider-windows-store-for-business.md
+++ b/windows/manage/configure-mdm-provider-windows-store-for-business.md
@@ -2,7 +2,7 @@
title: Configure an MDM provider (Windows 10)
description: For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Windows Store for Business inventory to manage apps with offline licenses.
ms.assetid: B3A45C8C-A96C-4254-9659-A9B364784673
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/customize-and-export-start-layout.md b/windows/manage/customize-and-export-start-layout.md
index 4d1f382a15..bd7b75c0fd 100644
--- a/windows/manage/customize-and-export-start-layout.md
+++ b/windows/manage/customize-and-export-start-layout.md
@@ -3,7 +3,7 @@ title: Customize and export Start layout (Windows 10)
description: The easiest method for creating a customized Start layout is to set up the Start screen and export the layout.
ms.assetid: CA8DF327-5DD4-452F-9FE5-F17C514B6236
keywords: ["start screen"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/customize-windows-10-start-screens-by-using-group-policy.md b/windows/manage/customize-windows-10-start-screens-by-using-group-policy.md
index 614edb4d66..bf5aed9ec4 100644
--- a/windows/manage/customize-windows-10-start-screens-by-using-group-policy.md
+++ b/windows/manage/customize-windows-10-start-screens-by-using-group-policy.md
@@ -3,7 +3,7 @@ title: Customize Windows 10 Start with Group Policy (Windows 10)
description: In Windows 10 Enterprise and Windows 10 Education, you can use a Group Policy Object (GPO) to deploy a customized Start layout to users in a domain.
ms.assetid: F4A47B36-F1EF-41CD-9CBA-04C83E960545
keywords: ["Start layout", "start menu", "layout", "group policy"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/customize-windows-10-start-screens-by-using-mobile-device-management.md b/windows/manage/customize-windows-10-start-screens-by-using-mobile-device-management.md
index d3c9160101..a0ad00415a 100644
--- a/windows/manage/customize-windows-10-start-screens-by-using-mobile-device-management.md
+++ b/windows/manage/customize-windows-10-start-screens-by-using-mobile-device-management.md
@@ -3,7 +3,7 @@ title: Customize Windows 10 Start with mobile device management (MDM) (Windows 1
description: In Windows 10 Enterprise and Windows 10 Education, you can use a mobile device management (MDM) policy to deploy a customized Start layout to users.
ms.assetid: F487850D-8950-41FB-9B06-64240127C1E4
keywords: ["start screen", "start menu"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md b/windows/manage/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md
index 3af066fdac..cc0c54d783 100644
--- a/windows/manage/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md
+++ b/windows/manage/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md
@@ -3,7 +3,7 @@ title: Customize Windows 10 Start with ICD and provisioning packages (Windows 10
description: In Windows 10, you can use a provisioning package to deploy a customized Start layout to users.
ms.assetid: AC952899-86A0-42FC-9E3C-C25F45B1ACAC
keywords: ["Start layout", "start menu"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/device-guard-signing-portal.md b/windows/manage/device-guard-signing-portal.md
index 4604411897..c511f4b081 100644
--- a/windows/manage/device-guard-signing-portal.md
+++ b/windows/manage/device-guard-signing-portal.md
@@ -2,7 +2,7 @@
title: Device Guard signing (Windows 10)
description: Device Guard signing is a Device Guard feature that is available in the Windows Store for Business.
ms.assetid: 8D9CD2B9-5FC6-4C3D-AA96-F135AFEEBB78
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/distribute-apps-from-your-private-store.md b/windows/manage/distribute-apps-from-your-private-store.md
index d751c6d2f2..07e519edc4 100644
--- a/windows/manage/distribute-apps-from-your-private-store.md
+++ b/windows/manage/distribute-apps-from-your-private-store.md
@@ -2,7 +2,7 @@
title: Distribute apps using your private store (Windows 10)
description: The private store is a feature in Windows Store for Business that organizations receive during the sign up process.
ms.assetid: C4644035-845C-4C84-87F0-D87EA8F5BA19
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/distribute-apps-to-your-employees-windows-store-for-business.md b/windows/manage/distribute-apps-to-your-employees-windows-store-for-business.md
index 28f762ec11..1c58d0489a 100644
--- a/windows/manage/distribute-apps-to-your-employees-windows-store-for-business.md
+++ b/windows/manage/distribute-apps-to-your-employees-windows-store-for-business.md
@@ -2,7 +2,7 @@
title: Distribute apps to your employees from the Windows Store for Business (Windows 10)
description: Distribute apps to your employees from Windows Store for Business. You can assign apps to employees, or let employees install them from your private store.
ms.assetid: E591497C-6DFA-49C1-8329-4670F2164E9E
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/distribute-apps-with-management-tool.md b/windows/manage/distribute-apps-with-management-tool.md
index 37824f30c5..65abfa89d6 100644
--- a/windows/manage/distribute-apps-with-management-tool.md
+++ b/windows/manage/distribute-apps-with-management-tool.md
@@ -2,7 +2,7 @@
title: Distribute apps with a management tool (Windows 10)
description: You can configure a mobile device management (MDM) tool to synchronize your Store for Business inventory. Store for Business management tool services work with MDM tools to manage content.
ms.assetid: 006F5FB1-E688-4769-BD9A-CFA6F5829016
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/distribute-offline-apps.md b/windows/manage/distribute-offline-apps.md
index 8cb184da6b..82c3720714 100644
--- a/windows/manage/distribute-offline-apps.md
+++ b/windows/manage/distribute-offline-apps.md
@@ -2,7 +2,7 @@
title: Distribute offline apps (Windows 10)
description: Offline licensing is a new licensing option for Windows 10.
ms.assetid: 6B9F6876-AA66-4EE4-A448-1371511AC95E
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/find-and-acquire-apps-overview.md b/windows/manage/find-and-acquire-apps-overview.md
index dbb7882835..28a4e36fef 100644
--- a/windows/manage/find-and-acquire-apps-overview.md
+++ b/windows/manage/find-and-acquire-apps-overview.md
@@ -2,7 +2,7 @@
title: Find and acquire apps (Windows 10)
description: Use the Windows Store for Business to find apps for your organization. You can also work with developers to create line-of-business apps that are only available to your organization.
ms.assetid: 274A5003-5F15-4635-BB8B-953953FD209A
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/group-policies-for-enterprise-and-education-editions.md b/windows/manage/group-policies-for-enterprise-and-education-editions.md
index 5d5f71e9f1..8a39c49e60 100644
--- a/windows/manage/group-policies-for-enterprise-and-education-editions.md
+++ b/windows/manage/group-policies-for-enterprise-and-education-editions.md
@@ -1,7 +1,7 @@
---
title: Group Policies that apply only to Windows 10 Enterprise and Education Editions (Windows 10)
description: Use this topic to learn about Group Policy objects that apply only to Windows 10 Enterprise and Windows 10 Education.
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
---
diff --git a/windows/manage/how-it-pros-can-use-configuration-service-providers.md b/windows/manage/how-it-pros-can-use-configuration-service-providers.md
index 463a578534..bab2563813 100644
--- a/windows/manage/how-it-pros-can-use-configuration-service-providers.md
+++ b/windows/manage/how-it-pros-can-use-configuration-service-providers.md
@@ -2,7 +2,7 @@
title: Introduction to configuration service providers (CSPs) for IT pros (Windows 10)
description: Configuration service providers (CSPs) expose device configuration settings in Windows 10.
ms.assetid: 25C1FDCA-0E10-42A1-A368-984FFDB2B7B6
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/index.md b/windows/manage/index.md
index 412bfc3d9b..fa16723bc3 100644
--- a/windows/manage/index.md
+++ b/windows/manage/index.md
@@ -3,7 +3,7 @@ title: Manage and update Windows 10 (Windows 10)
description: Learn about managing and updating Windows 10.
ms.assetid: E5716355-02AB-4B75-A962-14B1A7F7BDA0
keywords: Windows 10, MDM, WSUS, Windows update
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
ms.pagetype: security
diff --git a/windows/manage/introduction-to-windows-10-servicing.md b/windows/manage/introduction-to-windows-10-servicing.md
index 0c6c2ab9a6..4a7499aac7 100644
--- a/windows/manage/introduction-to-windows-10-servicing.md
+++ b/windows/manage/introduction-to-windows-10-servicing.md
@@ -3,7 +3,7 @@ title: Windows 10 servicing options for updates and upgrades (Windows 10)
description: This article describes the new servicing options available in Windows 10.
ms.assetid: D1DEB7C0-283F-4D7F-9A11-EE16CB242B42
keywords: update, LTSB, lifecycle, Windows update, upgrade
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
ms.pagetype: security
diff --git a/windows/manage/join-windows-10-mobile-to-azure-active-directory.md b/windows/manage/join-windows-10-mobile-to-azure-active-directory.md
index cd798c3163..876c02620c 100644
--- a/windows/manage/join-windows-10-mobile-to-azure-active-directory.md
+++ b/windows/manage/join-windows-10-mobile-to-azure-active-directory.md
@@ -2,7 +2,7 @@
title: Join Windows 10 Mobile to Azure Active Directory (Windows 10)
description: Devices running Windows 10 Mobile can join Azure Active Directory (Azure AD) when the device is configured during the out-of-box experience (OOBE).
ms.assetid: 955DD9EC-3519-4752-827E-79CEB1EC8D6B
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/lock-down-windows-10-to-specific-apps.md b/windows/manage/lock-down-windows-10-to-specific-apps.md
index 095f7b1bbf..800fe35493 100644
--- a/windows/manage/lock-down-windows-10-to-specific-apps.md
+++ b/windows/manage/lock-down-windows-10-to-specific-apps.md
@@ -3,7 +3,7 @@ title: Lock down Windows 10 to specific apps (Windows 10)
description: Learn how to configure a device running Windows 10 Enterprise or Windows 10 Education so that users can only run a few specific apps.
ms.assetid: 14DDDC96-88C7-4181-8415-B371F25726C8
keywords: ["lockdown", "app restrictions", "applocker"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/lock-down-windows-10.md b/windows/manage/lock-down-windows-10.md
index 61004d8822..4c11f7b7ce 100644
--- a/windows/manage/lock-down-windows-10.md
+++ b/windows/manage/lock-down-windows-10.md
@@ -3,7 +3,7 @@ title: Lock down Windows 10 (Windows 10)
description: Windows 10 provides a number of features and methods to help you lock down specific parts of a Windows 10 device.
ms.assetid: 955BCD92-0A1A-4C48-98A8-30D7FAF2067D
keywords: lockdown
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/lockdown-xml.md b/windows/manage/lockdown-xml.md
index 616e800b95..3baacaad11 100644
--- a/windows/manage/lockdown-xml.md
+++ b/windows/manage/lockdown-xml.md
@@ -2,7 +2,7 @@
title: Configure Windows 10 Mobile using Lockdown XML (Windows 10)
description: Windows 10 Mobile allows enterprises to lock down a device, define multiple user roles, and configure custom layouts on a device.
ms.assetid: 22C8F654-2EC3-4E6D-8666-1EA9FCF90F5F
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/manage-apps-windows-store-for-business-overview.md b/windows/manage/manage-apps-windows-store-for-business-overview.md
index f763f788bf..faaed20b58 100644
--- a/windows/manage/manage-apps-windows-store-for-business-overview.md
+++ b/windows/manage/manage-apps-windows-store-for-business-overview.md
@@ -2,7 +2,7 @@
title: Manage apps in Windows Store for Business (Windows 10)
description: Manage settings and access to apps in Windows Store for Business.
ms.assetid: 2F65D4C3-B02C-41CC-92F0-5D9937228202
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services.md
index 616f93dc73..b1a2217df3 100644
--- a/windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services.md
+++ b/windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services.md
@@ -3,7 +3,7 @@ title: Manage connections from Windows operating system components to Microsoft
description: If you want to minimize connections from Windows to Microsoft services, or configure particular privacy settings, this article covers the settings that you could consider.
ms.assetid: ACCEB0DD-BC6F-41B1-B359-140B242183D9
keywords: privacy, manage connections to Microsoft
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
---
diff --git a/windows/manage/manage-corporate-devices.md b/windows/manage/manage-corporate-devices.md
index bbfa571b02..87b3a7684b 100644
--- a/windows/manage/manage-corporate-devices.md
+++ b/windows/manage/manage-corporate-devices.md
@@ -3,7 +3,7 @@ title: Manage corporate devices (Windows 10)
description: You can use the same management tools to manage all device types running Windows 10 desktops, laptops, tablets, and phones.
ms.assetid: 62D6710C-E59C-4077-9C7E-CE0A92DFC05D
keywords: ["MDM", "device management"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/manage-inventory-windows-store-for-business.md b/windows/manage/manage-inventory-windows-store-for-business.md
index 0a364336aa..8535d16d65 100644
--- a/windows/manage/manage-inventory-windows-store-for-business.md
+++ b/windows/manage/manage-inventory-windows-store-for-business.md
@@ -2,7 +2,7 @@
title: Manage inventory in Windows Store for Business (Windows 10)
description: When you acquire apps from the Windows Store for Business, we add them to the Inventory for your organization. Once an app is part of your inventory, you can distribute the app, and manage licenses.
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/manage/app-inventory-management-windows-store-for-business
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
---
diff --git a/windows/manage/manage-orders-windows-store-for-business.md b/windows/manage/manage-orders-windows-store-for-business.md
index d698699806..bfebed0a7e 100644
--- a/windows/manage/manage-orders-windows-store-for-business.md
+++ b/windows/manage/manage-orders-windows-store-for-business.md
@@ -1,7 +1,7 @@
---
title: Manage app orders in Windows Store for Business (Windows 10)
description: You can view your order history with Windows Store for Business.
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
---
diff --git a/windows/manage/manage-private-store-settings.md b/windows/manage/manage-private-store-settings.md
index 835535ff36..dd0d959555 100644
--- a/windows/manage/manage-private-store-settings.md
+++ b/windows/manage/manage-private-store-settings.md
@@ -2,7 +2,7 @@
title: Manage private store settings (Windows 10)
description: The private store is a feature in the Windows Store for Business that organizations receive during the sign up process.
ms.assetid: 2D501538-0C6E-4408-948A-2BF5B05F7A0C
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/manage-settings-windows-store-for-business.md b/windows/manage/manage-settings-windows-store-for-business.md
index 488b0f26ab..5736a2df33 100644
--- a/windows/manage/manage-settings-windows-store-for-business.md
+++ b/windows/manage/manage-settings-windows-store-for-business.md
@@ -2,7 +2,7 @@
title: Manage settings for the Windows Store for Business (Windows 10)
description: You can add users and groups, as well as update some of the settings associated with the Azure Active Directory (AD) tenant.
ms.assetid: E3283D77-4DB2-40A9-9479-DDBC33D5A895
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/manage-users-and-groups-windows-store-for-business.md b/windows/manage/manage-users-and-groups-windows-store-for-business.md
index 8621faf1e6..a057ed9e67 100644
--- a/windows/manage/manage-users-and-groups-windows-store-for-business.md
+++ b/windows/manage/manage-users-and-groups-windows-store-for-business.md
@@ -2,7 +2,7 @@
title: Manage user accounts in Windows Store for Business (Windows 10)
description: Windows Store for Business manages permissions with a set of roles. Currently, you can assign these roles to individuals in your organization, but not to groups.
ms.assetid: 5E7FA071-CABD-4ACA-8AAE-F549EFCE922F
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/manage-wifi-sense-in-enterprise.md b/windows/manage/manage-wifi-sense-in-enterprise.md
index 58d0eadae7..2728a8dd5d 100644
--- a/windows/manage/manage-wifi-sense-in-enterprise.md
+++ b/windows/manage/manage-wifi-sense-in-enterprise.md
@@ -3,7 +3,7 @@ title: Manage Wi-Fi Sense in your company (Windows 10)
description: Wi-Fi Sense automatically connects you to Wi-Fi, so you can get online quickly in more places.
ms.assetid: 1845e00d-c4ee-4a8f-a5e5-d00f2735a271
keywords: ["WiFi Sense", "automatically connect to wi-fi", "wi-fi hotspot connection"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: eross-msft
diff --git a/windows/manage/new-policies-for-windows-10.md b/windows/manage/new-policies-for-windows-10.md
index 7bc7dd8224..2da6a7e615 100644
--- a/windows/manage/new-policies-for-windows-10.md
+++ b/windows/manage/new-policies-for-windows-10.md
@@ -3,7 +3,7 @@ title: New policies for Windows 10 (Windows 10)
description: Windows 10 includes the following new policies for management, in addition to policies that were available for Windows 8.1 and Windows Phone 8.1.
ms.assetid: 1F24ABD8-A57A-45EA-BA54-2DA2238C573D
keywords: ["MDM", "Group Policy"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/prerequisites-windows-store-for-business.md b/windows/manage/prerequisites-windows-store-for-business.md
index b3d9b02599..706b1a93a1 100644
--- a/windows/manage/prerequisites-windows-store-for-business.md
+++ b/windows/manage/prerequisites-windows-store-for-business.md
@@ -2,7 +2,7 @@
title: Prerequisites for Windows Store for Business (Windows 10)
description: There are a few prerequisites for using Windows Store for Business.
ms.assetid: CEBC6870-FFDD-48AD-8650-8B0DC6B2651D
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/product-ids-in-windows-10-mobile.md b/windows/manage/product-ids-in-windows-10-mobile.md
index 0dcbc397eb..0e9a15a716 100644
--- a/windows/manage/product-ids-in-windows-10-mobile.md
+++ b/windows/manage/product-ids-in-windows-10-mobile.md
@@ -3,7 +3,7 @@ title: Product IDs in Windows 10 Mobile (Windows 10)
description: You can use the product ID and Application User Model (AUMID) in Lockdown.xml to specify apps that will be available to the user.
ms.assetid: 31116BED-C16A-495A-BD44-93218A087A1C
keywords: ["lockdown"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/reset-a-windows-10-mobile-device.md b/windows/manage/reset-a-windows-10-mobile-device.md
index 40b79a96a5..15d8ead349 100644
--- a/windows/manage/reset-a-windows-10-mobile-device.md
+++ b/windows/manage/reset-a-windows-10-mobile-device.md
@@ -2,7 +2,7 @@
title: Reset a Windows 10 Mobile device (Windows 10)
description: There are two methods for resetting a Windows 10 Mobile device factory reset and \ 0034;wipe and persist \ 0034; reset.
ms.assetid: B42A71F4-DFEE-4D6E-A904-7942D1AAB73F
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/roles-and-permissions-windows-store-for-business.md b/windows/manage/roles-and-permissions-windows-store-for-business.md
index fae343dfca..6906e95ed6 100644
--- a/windows/manage/roles-and-permissions-windows-store-for-business.md
+++ b/windows/manage/roles-and-permissions-windows-store-for-business.md
@@ -2,7 +2,7 @@
title: Roles and permissions in Windows Store for Business (Windows 10)
description: The first person to sign in to Windows Store for Business must be a Global Admin of the Azure Active Directory (AD) tenant. Once the Global Admin has signed in, they can give permissions to others employees.
ms.assetid: CB6281E1-37B1-4B8B-991D-BC5ED361F1EE
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/set-up-a-device-for-anyone-to-use.md b/windows/manage/set-up-a-device-for-anyone-to-use.md
index cc81d0801d..156c44901a 100644
--- a/windows/manage/set-up-a-device-for-anyone-to-use.md
+++ b/windows/manage/set-up-a-device-for-anyone-to-use.md
@@ -3,7 +3,7 @@ title: Set up a device for anyone to use (kiosk mode) (Windows 10)
description: You can configure Windows 10 as a kiosk device, so that users can only interact with a single app.
ms.assetid: F1F4FF19-188C-4CDC-AABA-977639C53CA8
keywords: ["kiosk", "lockdown", "assigned access"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md b/windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md
index 55945ea84b..2c481fd829 100644
--- a/windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md
+++ b/windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md
@@ -3,7 +3,7 @@ title: Set up a kiosk on Windows 10 Pro, Enterprise, or Education (Windows 10)
description: A single-use device is easy to set up in Windows 10 for desktop editions (Pro, Enterprise, and Education).
ms.assetid: 428680AE-A05F-43ED-BD59-088024D1BFCC
keywords: ["assigned access", "kiosk", "lockdown"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/set-up-a-kiosk-for-windows-10-for-mobile-edition.md b/windows/manage/set-up-a-kiosk-for-windows-10-for-mobile-edition.md
index bc918aae23..6b5f7c60df 100644
--- a/windows/manage/set-up-a-kiosk-for-windows-10-for-mobile-edition.md
+++ b/windows/manage/set-up-a-kiosk-for-windows-10-for-mobile-edition.md
@@ -3,7 +3,7 @@ title: Set up a kiosk on Windows 10 Mobile or Windows 10 Mobile Enterprise (Wind
description: A device in kiosk mode runs a specified app with no access to other device functions, menus, or settings.
ms.assetid: 35EC82D8-D9E8-45C3-84E9-B0C8C167BFF7
keywords: ["kiosk", "lockdown", "assigned access"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/settings-reference-windows-store-for-business.md b/windows/manage/settings-reference-windows-store-for-business.md
index b3b1cf9083..7cf2f724c9 100644
--- a/windows/manage/settings-reference-windows-store-for-business.md
+++ b/windows/manage/settings-reference-windows-store-for-business.md
@@ -2,7 +2,7 @@
title: Settings reference Windows Store for Business (Windows 10)
description: The Windows Store for Business has a group of settings that admins use to manage the store.
ms.assetid: 34F7FA2B-B848-454B-AC00-ECA49D87B678
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/settings-that-can-be-locked-down.md b/windows/manage/settings-that-can-be-locked-down.md
index 09b88d9160..325b33fcb7 100644
--- a/windows/manage/settings-that-can-be-locked-down.md
+++ b/windows/manage/settings-that-can-be-locked-down.md
@@ -3,7 +3,7 @@ title: Settings and quick actions that can be locked down in Windows 10 Mobile (
description: This topic lists the settings and quick actions that can be locked down in Windows 10 Mobile.
ms.assetid: 69E2F202-D32B-4FAC-A83D-C3051DF02185
keywords: ["lockdown"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/sign-code-integrity-policy-with-device-guard-signing.md b/windows/manage/sign-code-integrity-policy-with-device-guard-signing.md
index 45cf03f80d..4fc6b81da0 100644
--- a/windows/manage/sign-code-integrity-policy-with-device-guard-signing.md
+++ b/windows/manage/sign-code-integrity-policy-with-device-guard-signing.md
@@ -2,7 +2,7 @@
title: Sign code integrity policy with Device Guard signing (Windows 10)
description: Signing code integrity policies prevents policies from being tampered with after they're deployed. You can sign code integrity policies with the Device Guard signing portal.
ms.assetid: 63B56B8B-2A40-44B5-B100-DC50C43D20A9
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/sign-up-windows-store-for-business-overview.md b/windows/manage/sign-up-windows-store-for-business-overview.md
index 382b317a88..5aeff64c06 100644
--- a/windows/manage/sign-up-windows-store-for-business-overview.md
+++ b/windows/manage/sign-up-windows-store-for-business-overview.md
@@ -2,7 +2,7 @@
title: Sign up and get started (Windows 10)
description: IT admins can sign up for the Windows Store for Business, and get started working with apps.
ms.assetid: 87C6FA60-3AB9-4152-A85C-6A1588A20C7B
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/sign-up-windows-store-for-business.md b/windows/manage/sign-up-windows-store-for-business.md
index bbbb7df639..cd31dc1d15 100644
--- a/windows/manage/sign-up-windows-store-for-business.md
+++ b/windows/manage/sign-up-windows-store-for-business.md
@@ -2,7 +2,7 @@
title: Sign up for Windows Store for Business (Windows 10)
description: Before you sign up for Windows Store for Business, at a minimum, you'll need an Azure Active Directory (AD) account for your organization, and you'll need to be the global administrator for your organization.
ms.assetid: 296AAC02-5C79-4999-B221-4F5F8CEA1F12
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/stop-employees-from-using-the-windows-store.md b/windows/manage/stop-employees-from-using-the-windows-store.md
index a8e3f58f0b..7b3cb2aa7b 100644
--- a/windows/manage/stop-employees-from-using-the-windows-store.md
+++ b/windows/manage/stop-employees-from-using-the-windows-store.md
@@ -2,7 +2,7 @@
title: Configure access to Windows Store (Windows 10)
description: IT Pros can configure access to Windows Store for client computers in their organization. For some organizations, business policies require blocking access to Windows Store.
ms.assetid: 7AA60D3D-2A69-45E7-AAB0-B8AFC29C2E97
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/troubleshoot-windows-store-for-business.md b/windows/manage/troubleshoot-windows-store-for-business.md
index 0c9404bb5a..f39d0bcdbf 100644
--- a/windows/manage/troubleshoot-windows-store-for-business.md
+++ b/windows/manage/troubleshoot-windows-store-for-business.md
@@ -2,7 +2,7 @@
title: Troubleshoot Windows Store for Business (Windows 10)
description: Troubleshooting topics for Windows Store for Business.
ms.assetid: 243755A3-9B20-4032-9A77-2207320A242A
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/update-windows-store-for-business-account-settings.md b/windows/manage/update-windows-store-for-business-account-settings.md
index 0150a4f7e4..613556110e 100644
--- a/windows/manage/update-windows-store-for-business-account-settings.md
+++ b/windows/manage/update-windows-store-for-business-account-settings.md
@@ -1,7 +1,7 @@
---
title: Update Windows Store for Business account settings (Windows 10)
description: The Account information page in Windows Store for Business shows information about your organization that you can update, including country or region, organization name, default domain, and language preference.
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/windows-10-mobile-and-mdm.md b/windows/manage/windows-10-mobile-and-mdm.md
index a818238913..6e48f9f183 100644
--- a/windows/manage/windows-10-mobile-and-mdm.md
+++ b/windows/manage/windows-10-mobile-and-mdm.md
@@ -3,7 +3,7 @@ title: Windows 10 Mobile and mobile device management (Windows 10)
description: This guide provides an overview of the mobile device and app management technologies in the Windows 10 Mobile operating system.
ms.assetid: 6CAA1004-CB65-4FEC-9B84-61AAD2125E5E
keywords: telemetry, BYOD, MDM
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
ms.pagetype: mobile; devices
diff --git a/windows/manage/windows-10-start-layout-options-and-policies.md b/windows/manage/windows-10-start-layout-options-and-policies.md
index 5a0c3eadfe..34e40d5095 100644
--- a/windows/manage/windows-10-start-layout-options-and-policies.md
+++ b/windows/manage/windows-10-start-layout-options-and-policies.md
@@ -3,7 +3,7 @@ title: Manage Windows 10 Start layout options (Windows 10)
description: Organizations might want to deploy a customized Start screen and menu to devices running Windows 10 Enterprise or Windows 10 Education.
ms.assetid: 2E94743B-6A49-463C-9448-B7DD19D9CD6A
keywords: ["start screen", "start menu"]
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: jdeckerMS
diff --git a/windows/manage/windows-store-for-business.md b/windows/manage/windows-store-for-business.md
index b718c7ace7..b30c16566a 100644
--- a/windows/manage/windows-store-for-business.md
+++ b/windows/manage/windows-store-for-business.md
@@ -2,7 +2,7 @@
title: Windows Store for Business (Windows 10)
description: Welcome to the Windows Store for Business You can use the Store for Business, to find, acquire, distribute, and manage apps for your organization.
ms.assetid: 527E611E-4D47-44F0-9422-DCC2D1ACBAB8
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/manage/working-with-line-of-business-apps.md b/windows/manage/working-with-line-of-business-apps.md
index 2700a1f83a..e3bfdb63b7 100644
--- a/windows/manage/working-with-line-of-business-apps.md
+++ b/windows/manage/working-with-line-of-business-apps.md
@@ -2,7 +2,7 @@
title: Working with line-of-business apps (Windows 10)
description: Your company can make line-of-business (LOB) applications available through Windows Store for Business. These apps are custom to your company – they might be internal business apps, or apps specific to your business or industry.
ms.assetid: 95EB7085-335A-447B-84BA-39C26AEB5AC7
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: TrudyHa
diff --git a/windows/plan/deployment-considerations-for-windows-to-go.md b/windows/plan/deployment-considerations-for-windows-to-go.md
index da2f4412e7..5ef6884c18 100644
--- a/windows/plan/deployment-considerations-for-windows-to-go.md
+++ b/windows/plan/deployment-considerations-for-windows-to-go.md
@@ -3,7 +3,7 @@ title: Deployment considerations for Windows To Go (Windows 10)
description: Deployment considerations for Windows To Go
ms.assetid: dcfc5d96-b96b-44cd-ab65-416b5611c65e
keywords: deploy, mobile, device, USB, boot, image, workspace, driver
-ms.prod: W10
+ms.prod: w10
ms.mktglfcycl: plan
ms.pagetype: mobility
ms.sitesec: library