mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge pull request #3624 from MicrosoftDocs/master
Publish 08/24/2020 3:54 PM
This commit is contained in:
commit
be4534455f
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: How USMT Works (Windows 10)
|
title: How USMT Works (Windows 10)
|
||||||
description: Learn how USMT works and how it includes two tools that migrate settings and data: ScanState and LoadState.
|
description: Learn how USMT works and how it includes two tools that migrate settings and data - ScanState and LoadState.
|
||||||
ms.assetid: 5c8bd669-9e1e-473d-81e6-652f40b24171
|
ms.assetid: 5c8bd669-9e1e-473d-81e6-652f40b24171
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -10,7 +10,6 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
audience: itpro
|
audience: itpro
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.date: 04/19/2017
|
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -19,17 +18,13 @@ ms.topic: article
|
|||||||
|
|
||||||
USMT includes two tools that migrate settings and data: ScanState and LoadState. ScanState collects information from the source computer, and LoadState applies that information to the destination computer.
|
USMT includes two tools that migrate settings and data: ScanState and LoadState. ScanState collects information from the source computer, and LoadState applies that information to the destination computer.
|
||||||
|
|
||||||
- [ScanState Process](#bkmk-ssprocess)
|
- [ScanState Process](#the-scanstate-process)
|
||||||
|
- [LoadState Process](#the-loadstate-process)
|
||||||
- [LoadState Process](#bkmk-lsprocess)
|
|
||||||
|
|
||||||
**Note**
|
**Note**
|
||||||
For more information about how USMT processes the rules and the XML files, see [Conflicts and Precedence](usmt-conflicts-and-precedence.md).
|
For more information about how USMT processes the rules and the XML files, see [Conflicts and Precedence](usmt-conflicts-and-precedence.md).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## <a href="" id="bkmk-ssprocess"></a>The ScanState Process
|
|
||||||
|
|
||||||
|
## The ScanState Process
|
||||||
|
|
||||||
When you run the ScanState tool on the source computer, it goes through the following process:
|
When you run the ScanState tool on the source computer, it goes through the following process:
|
||||||
|
|
||||||
@ -40,9 +35,7 @@ When you run the ScanState tool on the source computer, it goes through the foll
|
|||||||
There are three types of components:
|
There are three types of components:
|
||||||
|
|
||||||
- Components that migrate the operating system settings
|
- Components that migrate the operating system settings
|
||||||
|
|
||||||
- Components that migrate application settings
|
- Components that migrate application settings
|
||||||
|
|
||||||
- Components that migrate users’ files
|
- Components that migrate users’ files
|
||||||
|
|
||||||
The ScanState tool collects information about the application settings and user data components from the .xml files that are specified on the command line.
|
The ScanState tool collects information about the application settings and user data components from the .xml files that are specified on the command line.
|
||||||
@ -58,8 +51,6 @@ When you run the ScanState tool on the source computer, it goes through the foll
|
|||||||
**Note**
|
**Note**
|
||||||
From this point on, ScanState does not distinguish between components that migrate operating-system settings, those that migrate application settings, and those that migrate users’ files. ScanState processes all components in the same way.
|
From this point on, ScanState does not distinguish between components that migrate operating-system settings, those that migrate application settings, and those that migrate users’ files. ScanState processes all components in the same way.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
2. Each component that is selected in the previous step is processed further. Any profile-specific variables (such as CSIDL\_PERSONAL) are evaluated in the context of the current profile. For example, if the profile that is being processed belongs to “User1”, then CSIDL\_PERSONAL would expand to C:\\Users\\User1\\Documents, assuming that the user profiles are stored in the C:\\Users directory.
|
2. Each component that is selected in the previous step is processed further. Any profile-specific variables (such as CSIDL\_PERSONAL) are evaluated in the context of the current profile. For example, if the profile that is being processed belongs to “User1”, then CSIDL\_PERSONAL would expand to C:\\Users\\User1\\Documents, assuming that the user profiles are stored in the C:\\Users directory.
|
||||||
|
|
||||||
3. For each selected component, ScanState evaluates the <detects> section. If the condition in the <detects> section evaluates to false, the component is not processed any further. Otherwise, the processing of this component continues.
|
3. For each selected component, ScanState evaluates the <detects> section. If the condition in the <detects> section evaluates to false, the component is not processed any further. Otherwise, the processing of this component continues.
|
||||||
@ -73,8 +64,6 @@ When you run the ScanState tool on the source computer, it goes through the foll
|
|||||||
**Note**
|
**Note**
|
||||||
ScanState ignores some subsections such as <destinationCleanup> and <locationModify>. These sections are evaluated only on the destination computer.
|
ScanState ignores some subsections such as <destinationCleanup> and <locationModify>. These sections are evaluated only on the destination computer.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
5. In the "Collecting" phase, ScanState creates a master list of the migration units by combining the lists that were created for each selected user profile.
|
5. In the "Collecting" phase, ScanState creates a master list of the migration units by combining the lists that were created for each selected user profile.
|
||||||
|
|
||||||
6. In the "Saving" phase, ScanState writes the migration units that were collected to the store location.
|
6. In the "Saving" phase, ScanState writes the migration units that were collected to the store location.
|
||||||
@ -82,9 +71,7 @@ When you run the ScanState tool on the source computer, it goes through the foll
|
|||||||
**Note**
|
**Note**
|
||||||
ScanState does not modify the source computer in any way.
|
ScanState does not modify the source computer in any way.
|
||||||
|
|
||||||
|
## The LoadState Process
|
||||||
|
|
||||||
## <a href="" id="bkmk-lsprocess"></a>The LoadState Process
|
|
||||||
|
|
||||||
|
|
||||||
The LoadState process is very similar to the ScanState process. The ScanState tool collects migration units such as file, registry key, or registry values from the source computer and saves them to the store. Similarly, the LoadState tool collects migration units from the store and applies them to the destination computer.
|
The LoadState process is very similar to the ScanState process. The ScanState tool collects migration units such as file, registry key, or registry values from the source computer and saves them to the store. Similarly, the LoadState tool collects migration units from the store and applies them to the destination computer.
|
||||||
@ -132,13 +119,10 @@ The LoadState process is very similar to the ScanState process. The ScanState to
|
|||||||
**Important**
|
**Important**
|
||||||
It is important to specify the .xml files with the LoadState command if you want LoadState to use them. Otherwise, any destination-specific rules, such as <locationModify>, in these .xml files are ignored, even if the same .xml files were provided when the ScanState command ran.
|
It is important to specify the .xml files with the LoadState command if you want LoadState to use them. Otherwise, any destination-specific rules, such as <locationModify>, in these .xml files are ignored, even if the same .xml files were provided when the ScanState command ran.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
5. In the "Apply" phase, LoadState writes the migration units that were collected to the various locations on the destination computer. If there are conflicts and there is not a <merge> rule for the object, the default behavior for the registry is for the source to overwrite the destination. The default behavior for files is for the source to be renamed incrementally, for example, OriginalFileName(1).OriginalExtension. Some settings, such as fonts, wallpaper, and screen-saver settings, do not take effect until the next time the user logs on. For this reason, you should log off when the LoadState command actions have completed.
|
5. In the "Apply" phase, LoadState writes the migration units that were collected to the various locations on the destination computer. If there are conflicts and there is not a <merge> rule for the object, the default behavior for the registry is for the source to overwrite the destination. The default behavior for files is for the source to be renamed incrementally, for example, OriginalFileName(1).OriginalExtension. Some settings, such as fonts, wallpaper, and screen-saver settings, do not take effect until the next time the user logs on. For this reason, you should log off when the LoadState command actions have completed.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
|
|
||||||
[User State Migration Tool (USMT) Command-line Syntax](usmt-command-line-syntax.md)
|
[User State Migration Tool (USMT) Command-line Syntax](usmt-command-line-syntax.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -22,7 +22,12 @@ ms.topic: article
|
|||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This guide contains instructions to configure a proof of concept (PoC) environment requiring a minimum amount of resources. The guide makes extensive use of Windows PowerShell and Hyper-V. Subsequent companion guides contain steps to deploy Windows 10 using the PoC environment. After completing this guide, see the following Windows 10 PoC deployment guides:
|
This guide contains instructions to configure a proof of concept (PoC) environment requiring a minimum amount of resources.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Microsoft also offers a pre-configured labusing an evaluation version of Configuration Manager. For more information, see [Windows and Office deployment and management lab kit](/microsoft-365/enterprise/modern-desktop-deployment-and-management-lab).
|
||||||
|
|
||||||
|
This lab guide makes extensive use of Windows PowerShell and Hyper-V. Subsequent companion guides contain steps to deploy Windows 10 using the PoC environment. After completing this guide, see the following Windows 10 PoC deployment guides:
|
||||||
|
|
||||||
- [Step by step: Deploy Windows 10 in a test lab using MDT](windows-10-poc-mdt.md)<BR>
|
- [Step by step: Deploy Windows 10 in a test lab using MDT](windows-10-poc-mdt.md)<BR>
|
||||||
- [Step by step: Deploy Windows 10 in a test lab using Microsoft Endpoint Configuration Manager](windows-10-poc-sc-config-mgr.md)<BR>
|
- [Step by step: Deploy Windows 10 in a test lab using Microsoft Endpoint Configuration Manager](windows-10-poc-sc-config-mgr.md)<BR>
|
||||||
@ -144,7 +149,7 @@ Hardware requirements are displayed below:
|
|||||||
|
|
||||||
The lab architecture is summarized in the following diagram:
|
The lab architecture is summarized in the following diagram:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
- Computer 1 is configured to host four VMs on a private, PoC network.
|
- Computer 1 is configured to host four VMs on a private, PoC network.
|
||||||
- Two VMs are running Windows Server 2012 R2 with required network services and tools installed.
|
- Two VMs are running Windows Server 2012 R2 with required network services and tools installed.
|
||||||
@ -218,7 +223,7 @@ Starting with Windows 8, the host computer’s microprocessor must support secon
|
|||||||
|
|
||||||
>Alternatively, you can install Hyper-V using the Control Panel in Windows under **Turn Windows features on or off** for a client operating system, or using Server Manager's **Add Roles and Features Wizard** on a server operating system, as shown below:
|
>Alternatively, you can install Hyper-V using the Control Panel in Windows under **Turn Windows features on or off** for a client operating system, or using Server Manager's **Add Roles and Features Wizard** on a server operating system, as shown below:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -443,7 +448,7 @@ Notes:<BR>
|
|||||||
3. Select the checkboxes next to the **C:\\** and the **system reserved** (BIOS/MBR) volumes. The system volume is not assigned a drive letter, but will be displayed in the Disk2VHD tool with a volume label similar to **\\?\Volume{**. See the following example. **Important**: You must include the system volume in order to create a bootable VHD. If this volume is not displayed in the disk2vhd tool, then the computer is likely to be using the GPT partition style. For more information, see [Determine VM generation](#determine-vm-generation).
|
3. Select the checkboxes next to the **C:\\** and the **system reserved** (BIOS/MBR) volumes. The system volume is not assigned a drive letter, but will be displayed in the Disk2VHD tool with a volume label similar to **\\?\Volume{**. See the following example. **Important**: You must include the system volume in order to create a bootable VHD. If this volume is not displayed in the disk2vhd tool, then the computer is likely to be using the GPT partition style. For more information, see [Determine VM generation](#determine-vm-generation).
|
||||||
4. Specify a location to save the resulting VHD or VHDX file (F:\VHD\w7.vhdx in the following example) and click **Create**. See the following example:
|
4. Specify a location to save the resulting VHD or VHDX file (F:\VHD\w7.vhdx in the following example) and click **Create**. See the following example:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
>Disk2vhd can save VHDs to local hard drives, even if they are the same as the volumes being converted. Performance is better however when the VHD is saved on a disk different than those being converted, such as a flash drive.
|
>Disk2vhd can save VHDs to local hard drives, even if they are the same as the volumes being converted. Performance is better however when the VHD is saved on a disk different than those being converted, such as a flash drive.
|
||||||
|
|
||||||
@ -476,7 +481,7 @@ Notes:<BR>
|
|||||||
|
|
||||||
5. Specify a location to save the resulting VHD or VHDX file (F:\VHD\PC1.vhdx in the following example) and click **Create**. See the following example:
|
5. Specify a location to save the resulting VHD or VHDX file (F:\VHD\PC1.vhdx in the following example) and click **Create**. See the following example:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
>Disk2vhd can save VHDs to local hard drives, even if they are the same as the volumes being converted. Performance is better however when the VHD is saved on a disk different than those being converted, such as a flash drive.
|
>Disk2vhd can save VHDs to local hard drives, even if they are the same as the volumes being converted. Performance is better however when the VHD is saved on a disk different than those being converted, such as a flash drive.
|
||||||
|
|
||||||
@ -500,7 +505,7 @@ Notes:<BR>
|
|||||||
3. Select the checkbox next to the **C:\\** volume and clear the checkbox next to **Use Vhdx**. Note: the system volume is not copied in this scenario, it will be added later.
|
3. Select the checkbox next to the **C:\\** volume and clear the checkbox next to **Use Vhdx**. Note: the system volume is not copied in this scenario, it will be added later.
|
||||||
4. Specify a location to save the resulting VHD file (F:\VHD\w7.vhd in the following example) and click **Create**. See the following example:
|
4. Specify a location to save the resulting VHD file (F:\VHD\w7.vhd in the following example) and click **Create**. See the following example:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
>Disk2vhd can save VHDs to local hard drives, even if they are the same as the volumes being converted. Performance is better however when the VHD is saved on a disk different than those being converted, such as a flash drive.
|
>Disk2vhd can save VHDs to local hard drives, even if they are the same as the volumes being converted. Performance is better however when the VHD is saved on a disk different than those being converted, such as a flash drive.
|
||||||
|
|
||||||
@ -815,7 +820,7 @@ The second Windows Server 2012 R2 VHD needs to be expanded in size from 40GB to
|
|||||||
|
|
||||||
15. After signing in, the operating system detects that it is running in a new environment. New drivers will be automatically installed, including the network adapter driver. The network adapter driver must be updated before you can proceed, so that you will be able to join the contoso.com domain. Depending on the resources allocated to PC1, installing the network adapter driver might take a few minutes. You can monitor device driver installation by clicking **Show hidden icons** in the notification area.
|
15. After signing in, the operating system detects that it is running in a new environment. New drivers will be automatically installed, including the network adapter driver. The network adapter driver must be updated before you can proceed, so that you will be able to join the contoso.com domain. Depending on the resources allocated to PC1, installing the network adapter driver might take a few minutes. You can monitor device driver installation by clicking **Show hidden icons** in the notification area.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
>If the client was configured with a static address, you must change this to a dynamic one so that it can obtain a DHCP lease.
|
>If the client was configured with a static address, you must change this to a dynamic one so that it can obtain a DHCP lease.
|
||||||
|
|
||||||
@ -873,7 +878,7 @@ The second Windows Server 2012 R2 VHD needs to be expanded in size from 40GB to
|
|||||||
|
|
||||||
See the following example:
|
See the following example:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
19. Click **File**, click **Save As**, and save the commands as **c:\VHD\pc1.ps1** on the Hyper-V host.
|
19. Click **File**, click **Save As**, and save the commands as **c:\VHD\pc1.ps1** on the Hyper-V host.
|
||||||
20. In the (lower) terminal input window, type the following commands to enable Guest Service Interface on PC1 and then use this service to copy the script to PC1:
|
20. In the (lower) terminal input window, type the following commands to enable Guest Service Interface on PC1 and then use this service to copy the script to PC1:
|
||||||
|
@ -78,6 +78,15 @@ You can configure the following levels of automation:
|
|||||||
|**Semi - require approval for any remediation** | An approval is needed for any remediation action. <br/><br/>*This option is selected by default for Microsoft Defender ATP tenants created before August 16, 2020.*|
|
|**Semi - require approval for any remediation** | An approval is needed for any remediation action. <br/><br/>*This option is selected by default for Microsoft Defender ATP tenants created before August 16, 2020.*|
|
||||||
|**No automated response** | Devices do not get any automated investigations run on them. <br/><br/>*This option is not recommended, because it fully disables automated investigation and remediation capabilities, and reduces the security posture of your organization's devices.* |
|
|**No automated response** | Devices do not get any automated investigations run on them. <br/><br/>*This option is not recommended, because it fully disables automated investigation and remediation capabilities, and reduces the security posture of your organization's devices.* |
|
||||||
|
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> A few points of clarification regarding automation levels and default settings:
|
||||||
|
> - If your tenant already has device groups defined, the automation level settings are not changed.
|
||||||
|
> - If your tenant was onboarded to Microsoft Defender ATP before August 16, 2020, your organization's first device group is set to **Semi - require approval for any remediation** by default.
|
||||||
|
> - If your tenant is onboarded on or after August 16, 2020, when your organization's first device group is set to **Full - remediate threats automatically**.
|
||||||
|
> - To change an automation level, edit your [device groups](configure-automated-investigations-remediation.md#set-up-device-groups).
|
||||||
|
|
||||||
|
|
||||||
### A few points to keep in mind
|
### A few points to keep in mind
|
||||||
|
|
||||||
- Your level of automation is determined by your device group settings. See [Set up device groups](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation#set-up-device-groups).
|
- Your level of automation is determined by your device group settings. See [Set up device groups](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation#set-up-device-groups).
|
||||||
|
@ -117,8 +117,8 @@ The following table lists commands for some of the most common scenarios. Run `m
|
|||||||
|Quarantine management |List all quarantined files |`mdatp threat quarantine list` |
|
|Quarantine management |List all quarantined files |`mdatp threat quarantine list` |
|
||||||
|Quarantine management |Remove all files from the quarantine |`mdatp threat quarantine remove-all` |
|
|Quarantine management |Remove all files from the quarantine |`mdatp threat quarantine remove-all` |
|
||||||
|Quarantine management |Add a file detected as a threat to the quarantine |`mdatp threat quarantine add --id [threat-id]` |
|
|Quarantine management |Add a file detected as a threat to the quarantine |`mdatp threat quarantine add --id [threat-id]` |
|
||||||
|Quarantine management |Remove a file detected as a threat from the quarantine |`mdatp threat quarantine add --id [threat-id]` |
|
|Quarantine management |Remove a file detected as a threat from the quarantine |`mdatp threat quarantine remove --id [threat-id]` |
|
||||||
|Quarantine management |Restore a file from the quarantine |`mdatp threat quarantine add --id [threat-id]` |
|
|Quarantine management |Restore a file from the quarantine |`mdatp threat quarantine restore --id [threat-id]` |
|
||||||
|
|
||||||
## Microsoft Defender ATP portal information
|
## Microsoft Defender ATP portal information
|
||||||
|
|
||||||
|
@ -38,6 +38,10 @@ ms.topic: conceptual
|
|||||||
> 2. Refer to this documentation for detailed configuration information and instructions: [New configuration profiles for macOS Catalina and newer versions of macOS](mac-sysext-policies.md).
|
> 2. Refer to this documentation for detailed configuration information and instructions: [New configuration profiles for macOS Catalina and newer versions of macOS](mac-sysext-policies.md).
|
||||||
> 3. Monitor this page for an announcement of the actual release of MDATP for Mac agent update.
|
> 3. Monitor this page for an announcement of the actual release of MDATP for Mac agent update.
|
||||||
|
|
||||||
|
## 101.06.63
|
||||||
|
|
||||||
|
- Addressed a performance regression introduced in version `101.05.17`. The regression was introduced with the fix to eliminate the kernel panics some customers have observed when accessing SMB shares. We have reverted this code change and are investigating alternative ways to eliminate the kernel panics.
|
||||||
|
|
||||||
## 101.05.17
|
## 101.05.17
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
|
@ -120,6 +120,9 @@ This step of the setup process involves adding Microsoft Defender ATP to the exc
|
|||||||
|
|
||||||
During this step of the setup process, you add Symantec and your other security solutions to the Microsoft Defender Antivirus exclusion list.
|
During this step of the setup process, you add Symantec and your other security solutions to the Microsoft Defender Antivirus exclusion list.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> To get an idea of which processes and services to exclude, see Broadcom's [Processes and services used by Endpoint Protection 14](https://knowledge.broadcom.com/external/article/170706/processes-and-services-used-by-endpoint.html).
|
||||||
|
|
||||||
When you add [exclusions to Microsoft Defender Antivirus scans](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus), you should add path and process exclusions. Keep the following points in mind:
|
When you add [exclusions to Microsoft Defender Antivirus scans](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus), you should add path and process exclusions. Keep the following points in mind:
|
||||||
- Path exclusions exclude specific files and whatever those files access.
|
- Path exclusions exclude specific files and whatever those files access.
|
||||||
- Process exclusions exclude whatever a process touches, but does not exclude the process itself.
|
- Process exclusions exclude whatever a process touches, but does not exclude the process itself.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Add Test Devices to the Membership Group for a Zone (Windows 10)
|
title: Add Test Devices to the Membership Group for a Zone (Windows 10)
|
||||||
description: Add Test Devices to the Membership Group for a Zone
|
description: Learn how to add devices to the group for a zone to test whether your Windows Defender Firewall with Advanced Security implementation works as expected.
|
||||||
ms.assetid: 47057d90-b053-48a3-b881-4f2458d3e431
|
ms.assetid: 47057d90-b053-48a3-b881-4f2458d3e431
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Assign Security Group Filters to the GPO (Windows 10)
|
title: Assign Security Group Filters to the GPO (Windows 10)
|
||||||
description: Assign Security Group Filters to the GPO
|
description: Learn how to use Group Policy Management MMC to assign security group filters to a GPO to make sure that the GPO is applied to the correct computers.
|
||||||
ms.assetid: bcbe3299-8d87-4ec1-9e86-8e4a680fd7c8
|
ms.assetid: bcbe3299-8d87-4ec1-9e86-8e4a680fd7c8
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Boundary Zone GPOs (Windows 10)
|
title: Boundary Zone GPOs (Windows 10)
|
||||||
description: Boundary Zone GPOs
|
description: Learn about GPOs to create that must align with the group you create for the boundary zone in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 1ae66088-02c3-47e4-b7e8-74d0b8f8646e
|
ms.assetid: 1ae66088-02c3-47e4-b7e8-74d0b8f8646e
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Boundary Zone (Windows 10)
|
title: Boundary Zone (Windows 10)
|
||||||
description: Boundary Zone
|
description: Learn how a boundary zone supports devices that must receive traffic from beyond an isolated domain in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: ed98b680-fd24-44bd-a7dd-26c522e45a20
|
ms.assetid: ed98b680-fd24-44bd-a7dd-26c522e45a20
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Certificate-based Isolation Policy Design Example (Windows 10)
|
title: Certificate-based Isolation Policy Design Example (Windows 10)
|
||||||
description: Certificate-based Isolation Policy Design Example
|
description: This example uses a fictitious company to illustrate certificate-based isolation policy design in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 509b513e-dd49-4234-99f9-636fd2f749e3
|
ms.assetid: 509b513e-dd49-4234-99f9-636fd2f749e3
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Checklist Configuring Rules for an Isolated Server Zone (Windows 10)
|
title: Checklist Configuring Rules for an Isolated Server Zone (Windows 10)
|
||||||
description: Checklist Configuring Rules for an Isolated Server Zone
|
description: Use these tasks to configure connection security rules and IPsec settings in GPOs for servers in an isolated server zone that are part of an isolated domain.
|
||||||
ms.assetid: 67c50a91-e71e-4f1e-a534-dad2582e311c
|
ms.assetid: 67c50a91-e71e-4f1e-a534-dad2582e311c
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Checklist Configuring Rules for the Boundary Zone (Windows 10)
|
title: Checklist Configuring Rules for the Boundary Zone (Windows 10)
|
||||||
description: Checklist Configuring Rules for the Boundary Zone
|
description: Use these tasks to configure connection security rules and IPsec settings in your GPOs to implement the boundary zone in an isolated domain.
|
||||||
ms.assetid: 25fe0197-de5a-4b4c-bc44-c6f0620ea94b
|
ms.assetid: 25fe0197-de5a-4b4c-bc44-c6f0620ea94b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Checklist Configuring Rules for the Encryption Zone (Windows 10)
|
title: Checklist Configuring Rules for the Encryption Zone (Windows 10)
|
||||||
description: Checklist Configuring Rules for the Encryption Zone
|
description: Use these tasks to configure connection security rules and IPsec settings in your GPOs to implement the encryption zone in an isolated domain.
|
||||||
ms.assetid: 87b1787b-0c70-47a4-ae52-700bff505ea4
|
ms.assetid: 87b1787b-0c70-47a4-ae52-700bff505ea4
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Checklist Configuring Rules for the Isolated Domain (Windows 10)
|
title: Checklist Configuring Rules for the Isolated Domain (Windows 10)
|
||||||
description: Checklist Configuring Rules for the Isolated Domain
|
description: Use these tasks to configure connection security rules and IPsec settings in your GPOs to implement the main zone in the isolated domain.
|
||||||
ms.assetid: bfd2d29e-4011-40ec-a52e-a67d4af9748e
|
ms.assetid: bfd2d29e-4011-40ec-a52e-a67d4af9748e
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Checklist Creating Group Policy Objects (Windows 10)
|
title: Checklist Creating Group Policy Objects (Windows 10)
|
||||||
description: Checklist Creating Group Policy Objects
|
description: Learn to deploy firewall settings, IPsec settings, firewall rules, or connection security rules, by using Group Policy in AD DS.
|
||||||
ms.assetid: e99bd6a4-34a7-47b5-9791-ae819977a559
|
ms.assetid: e99bd6a4-34a7-47b5-9791-ae819977a559
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Checklist Creating Inbound Firewall Rules (Windows 10)
|
title: Checklist Creating Inbound Firewall Rules (Windows 10)
|
||||||
description: Checklist Creating Inbound Firewall Rules
|
description: Use these tasks for creating inbound firewall rules in your GPOs for Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 0520e14e-5c82-48da-8fbf-87cef36ce02f
|
ms.assetid: 0520e14e-5c82-48da-8fbf-87cef36ce02f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Checklist Creating Outbound Firewall Rules (Windows 10)
|
title: Checklist Creating Outbound Firewall Rules (Windows 10)
|
||||||
description: Checklist Creating Outbound Firewall Rules
|
description: Use these tasks for creating outbound firewall rules in your GPOs for Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 611bb98f-4e97-411f-82bf-7a844a4130de
|
ms.assetid: 611bb98f-4e97-411f-82bf-7a844a4130de
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Checklist Implementing a Certificate-based Isolation Policy Design (Windows 10)
|
title: Checklist Implementing a Certificate-based Isolation Policy Design (Windows 10)
|
||||||
description: Checklist Implementing a Certificate-based Isolation Policy Design
|
description: Use these references to learn about using certificates as an authentication option and configure a certificate-based isolation policy design.
|
||||||
ms.assetid: 1e34b5ea-2e77-4598-a765-550418d33894
|
ms.assetid: 1e34b5ea-2e77-4598-a765-550418d33894
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Checklist Implementing a Domain Isolation Policy Design (Windows 10)
|
title: Checklist Implementing a Domain Isolation Policy Design (Windows 10)
|
||||||
description: Checklist Implementing a Domain Isolation Policy Design
|
description: Use these references to learn about the domain isolation policy design and links to other checklists to complete tasks require to implement this design.
|
||||||
ms.assetid: 76586eb3-c13c-4d71-812f-76bff200fc20
|
ms.assetid: 76586eb3-c13c-4d71-812f-76bff200fc20
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Checklist Implementing a Standalone Server Isolation Policy Design (Windows 10)
|
title: Checklist Implementing a Standalone Server Isolation Policy Design (Windows 10)
|
||||||
description: Checklist Implementing a Standalone Server Isolation Policy Design
|
description: Use these tasks to create a server isolation policy design that is not part of an isolated domain. See references to concepts and links to other checklists.
|
||||||
ms.assetid: 50a997d8-f079-408c-8ac6-ecd02078ade3
|
ms.assetid: 50a997d8-f079-408c-8ac6-ecd02078ade3
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure Authentication Methods (Windows 10)
|
title: Configure Authentication Methods (Windows 10)
|
||||||
description: Configure Authentication Methods
|
description: Learn how to configure authentication methods for devices in an isolated domain or standalone server zone in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 5fcdc523-617f-4233-9213-15fe19f4cd02
|
ms.assetid: 5fcdc523-617f-4233-9213-15fe19f4cd02
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure Data Protection (Quick Mode) Settings (Windows 10)
|
title: Configure Data Protection (Quick Mode) Settings (Windows 10)
|
||||||
description: Configure Data Protection (Quick Mode) Settings
|
description: Learn how to configure the data protection settings for connection security rules in an isolated domain or a standalone isolated server zone.
|
||||||
ms.assetid: fdcb1b36-e267-4be7-b842-5df9a067c9e0
|
ms.assetid: fdcb1b36-e267-4be7-b842-5df9a067c9e0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure Group Policy to Autoenroll and Deploy Certificates (Windows 10)
|
title: Configure Group Policy to Autoenroll and Deploy Certificates (Windows 10)
|
||||||
description: Configure Group Policy to Autoenroll and Deploy Certificates
|
description: Learn how to configure Group Policy to automatically enroll client computer certificates and deploy them to the workstations on your network.
|
||||||
ms.assetid: faeb62b5-2cc3-42f7-bee5-53ba45d05c09
|
ms.assetid: faeb62b5-2cc3-42f7-bee5-53ba45d05c09
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure Key Exchange (Main Mode) Settings (Windows 10)
|
title: Configure Key Exchange (Main Mode) Settings (Windows 10)
|
||||||
description: Configure Key Exchange (Main Mode) Settings
|
description: Learn how to configure the main mode key exchange settings used to secure the IPsec authentication traffic in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 5c593b6b-2cd9-43de-9b4e-95943fe82f52
|
ms.assetid: 5c593b6b-2cd9-43de-9b4e-95943fe82f52
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure the Rules to Require Encryption (Windows 10)
|
title: Configure the Rules to Require Encryption (Windows 10)
|
||||||
description: Configure the Rules to Require Encryption
|
description: Learn how to configure rules to add encryption algorithms and delete the algorithm combinations that do not use encryption for zones that require encryption.
|
||||||
ms.assetid: 07b7760f-3225-4b4b-b418-51787b0972a0
|
ms.assetid: 07b7760f-3225-4b4b-b418-51787b0972a0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure the Windows Defender Firewall Log (Windows 10)
|
title: Configure the Windows Defender Firewall Log (Windows 10)
|
||||||
description: Configure the Windows Defender Firewall Log
|
description: Learn how to configure Windows Defender Firewall with Advanced Security to log dropped packets or successful connections by using Group Policy Management MMC.
|
||||||
ms.assetid: f037113d-506b-44d3-b9c0-0b79d03e7d18
|
ms.assetid: f037113d-506b-44d3-b9c0-0b79d03e7d18
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure the Workstation Authentication Template (Windows 10)
|
title: Configure the Workstation Authentication Template (Windows 10)
|
||||||
description: Configure the Workstation Authentication Certificate Template
|
description: Learn how to configure a workstation authentication certificate template, which is used for device certificates that are enrolled and deployed to workstations.
|
||||||
ms.assetid: c3ac9960-6efc-47c1-bd69-d9d4bf84f7a6
|
ms.assetid: c3ac9960-6efc-47c1-bd69-d9d4bf84f7a6
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Confirm That Certificates Are Deployed Correctly (Windows 10)
|
title: Confirm That Certificates Are Deployed Correctly (Windows 10)
|
||||||
description: Confirm That Certificates Are Deployed Correctly
|
description: Learn how to confirm that a Group Policy is being applied as expected and that the certificates are being properly installed on the workstations.
|
||||||
ms.assetid: de0c8dfe-16b0-4d3b-8e8f-9282f6a65eee
|
ms.assetid: de0c8dfe-16b0-4d3b-8e8f-9282f6a65eee
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Copy a GPO to Create a New GPO (Windows 10)
|
title: Copy a GPO to Create a New GPO (Windows 10)
|
||||||
description: Copy a GPO to Create a New GPO
|
description: Learn how to make a copy of a GPO by using the Active Directory Users and devices MMC snap-in to create a GPO for boundary zone devices.
|
||||||
ms.assetid: 7f6a23e5-4b3f-40d6-bf6d-7895558b1406
|
ms.assetid: 7f6a23e5-4b3f-40d6-bf6d-7895558b1406
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Create a Group Account in Active Directory (Windows 10)
|
title: Create a Group Account in Active Directory (Windows 10)
|
||||||
description: Create a Group Account in Active Directory
|
description: Learn how to create a security group for the computers that are to receive Group Policy settings by using the Active Directory Users and Computers console.
|
||||||
ms.assetid: c3700413-e02d-4d56-96b8-7991f97ae432
|
ms.assetid: c3700413-e02d-4d56-96b8-7991f97ae432
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Create a Group Policy Object (Windows 10)
|
title: Create a Group Policy Object (Windows 10)
|
||||||
description: Create a Group Policy Object
|
description: Learn how to use the Active Directory Users and Computers MMC snap-in to create a GPO. You must be a member of the Domain Administrators group.
|
||||||
ms.assetid: 72a50dd7-5033-4d97-a5eb-0aff8a35cced
|
ms.assetid: 72a50dd7-5033-4d97-a5eb-0aff8a35cced
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Create an Authentication Exemption List Rule (Windows 10)
|
title: Create an Authentication Exemption List Rule (Windows 10)
|
||||||
description: Create an Authentication Exemption List Rule
|
description: Learn how to create rules that exempt devices that cannot communicate by using IPSec from the authentication requirements of your isolation policies.
|
||||||
ms.assetid: 8f6493f3-8527-462a-82c0-fd91a6cb5dd8
|
ms.assetid: 8f6493f3-8527-462a-82c0-fd91a6cb5dd8
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Create an Inbound ICMP Rule (Windows 10)
|
title: Create an Inbound ICMP Rule (Windows 10)
|
||||||
description: Create an Inbound ICMP Rule
|
description: Learn how to allow inbound ICMP traffic by using the Group Policy Management MMC snap-in to create rules in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 267b940a-79d9-4322-b53b-81901e357344
|
ms.assetid: 267b940a-79d9-4322-b53b-81901e357344
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Create an Inbound Port Rule (Windows 10)
|
title: Create an Inbound Port Rule (Windows 10)
|
||||||
description: Create an Inbound Port Rule
|
description: Learn to allow traffic on specific ports by using the Group Policy Management MMC snap-in to create rules in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: a7b6c6ca-32fa-46a9-a5df-a4e43147da9f
|
ms.assetid: a7b6c6ca-32fa-46a9-a5df-a4e43147da9f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Create an Inbound Program or Service Rule (Windows 10)
|
title: Create an Inbound Program or Service Rule (Windows 10)
|
||||||
description: Create an Inbound Program or Service Rule
|
description: Learn how to allow inbound traffic to a program or service by using the Group Policy Management MMC snap-in to create firewall rules.
|
||||||
ms.assetid: 00b7fa60-7c64-4ba5-ba95-c542052834cf
|
ms.assetid: 00b7fa60-7c64-4ba5-ba95-c542052834cf
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Create an Outbound Port Rule (Windows 10)
|
title: Create an Outbound Port Rule (Windows 10)
|
||||||
description: Create an Outbound Port Rule
|
description: Learn to block outbound traffic on a port by using the Group Policy Management MMC snap-in to create rules in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 59062b91-756b-42ea-8f2a-832f05d77ddf
|
ms.assetid: 59062b91-756b-42ea-8f2a-832f05d77ddf
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Create Inbound Rules to Support RPC (Windows 10)
|
title: Create Inbound Rules to Support RPC (Windows 10)
|
||||||
description: Create Inbound Rules to Support RPC
|
description: Learn how to allow RPC network traffic by using the Group Policy Management MMC snap-in to create rules in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 0b001c2c-12c1-4a30-bb99-0c034d7e6150
|
ms.assetid: 0b001c2c-12c1-4a30-bb99-0c034d7e6150
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Create Windows Firewall rules in Intune (Windows 10)
|
title: Create Windows Firewall rules in Intune (Windows 10)
|
||||||
description: Explains how to create Windows Firewall rules in Intune
|
description: Learn how to use Intune to create rules in Windows Defender Firewall with Advanced Security. Start by creating a profile in Device Configuration in Intune.
|
||||||
ms.assetid: 47057d90-b053-48a3-b881-4f2458d3e431
|
ms.assetid: 47057d90-b053-48a3-b881-4f2458d3e431
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Create WMI Filters for the GPO (Windows 10)
|
title: Create WMI Filters for the GPO (Windows 10)
|
||||||
description: Create WMI Filters for the GPO
|
description: Learn how to use WMI filters on a GPO to make sure that each GPO for a group can only be applied to devices running the correct version of Windows.
|
||||||
ms.assetid: b1a6d93d-a3c8-4e61-a388-4a3323f0e74e
|
ms.assetid: b1a6d93d-a3c8-4e61-a388-4a3323f0e74e
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Determining the Trusted State of Your Devices (Windows 10)
|
title: Determining the Trusted State of Your Devices (Windows 10)
|
||||||
description: Determining the Trusted State of Your Devices
|
description: Learn how to define the trusted state of devices in your enterprise to help design your strategy for using Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 3e77f0d0-43aa-47dd-8518-41ccdab2f2b2
|
ms.assetid: 3e77f0d0-43aa-47dd-8518-41ccdab2f2b2
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Documenting the Zones (Windows 10)
|
title: Documenting the Zones (Windows 10)
|
||||||
description: Documenting the Zones
|
description: Learn how to document the zone placement of devices in your design for Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: ebd7a650-4d36-42d4-aac0-428617f5a32d
|
ms.assetid: ebd7a650-4d36-42d4-aac0-428617f5a32d
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Domain Isolation Policy Design Example (Windows 10)
|
title: Domain Isolation Policy Design Example (Windows 10)
|
||||||
description: Domain Isolation Policy Design Example
|
description: This example uses a fictitious company to illustrate domain isolation policy design in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 704dcf58-286f-41aa-80af-c81720aa7fc5
|
ms.assetid: 704dcf58-286f-41aa-80af-c81720aa7fc5
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Domain Isolation Policy Design (Windows 10)
|
title: Domain Isolation Policy Design (Windows 10)
|
||||||
description: Domain Isolation Policy Design
|
description: Learn how to design a domain isolation policy, based on which devices accept only connections from authenticated members of the same isolated domain.
|
||||||
ms.assetid: 7475084e-f231-473a-9357-5e1d39861d66
|
ms.assetid: 7475084e-f231-473a-9357-5e1d39861d66
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Enable Predefined Outbound Rules (Windows 10)
|
title: Enable Predefined Outbound Rules (Windows 10)
|
||||||
description: Enable Predefined Outbound Rules
|
description: Learn to deploy predefined firewall rules that block outbound network traffic for common network functions in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 71cc4157-a1ed-41d9-91e4-b3140c67c1be
|
ms.assetid: 71cc4157-a1ed-41d9-91e4-b3140c67c1be
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Encryption Zone GPOs (Windows 10)
|
title: Encryption Zone GPOs (Windows 10)
|
||||||
description: Encryption Zone GPOs
|
description: Learn how to add a device to an encryption zone by adding the device account to the encryption zone group in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: eeb973dd-83a5-4381-9af9-65c43c98c29b
|
ms.assetid: eeb973dd-83a5-4381-9af9-65c43c98c29b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Encryption Zone (Windows 10)
|
title: Encryption Zone (Windows 10)
|
||||||
description: Encryption Zone
|
description: Learn how to create an encryption zone to contain devices that host very sensitive data and require that the sensitive network traffic be encrypted.
|
||||||
ms.assetid: 55a025ce-357f-4d1b-b2ae-6ee32c9abe13
|
ms.assetid: 55a025ce-357f-4d1b-b2ae-6ee32c9abe13
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Exempt ICMP from Authentication (Windows 10)
|
title: Exempt ICMP from Authentication (Windows 10)
|
||||||
description: Exempt ICMP from Authentication
|
description: Learn how to add exemptions for any network traffic that uses the ICMP protocol in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: c086c715-8d0c-4eb5-9ea7-2f7635a55548
|
ms.assetid: c086c715-8d0c-4eb5-9ea7-2f7635a55548
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Exemption List (Windows 10)
|
title: Exemption List (Windows 10)
|
||||||
description: Learn the ins and outs of exemption lists on a secured network using Windows 10.
|
description: Learn about reasons to add devices to an exemption list in Windows Defender Firewall with Advanced Security and the trade-offs of having too many exemptions.
|
||||||
ms.assetid: a05e65b4-b48d-44b1-a7f1-3a8ea9c19ed8
|
ms.assetid: a05e65b4-b48d-44b1-a7f1-3a8ea9c19ed8
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Firewall GPOs (Windows 10)
|
title: Firewall GPOs (Windows 10)
|
||||||
description: Firewall GPOs
|
description: In this example, a Group Policy Object is linked to the domain container because the domain controllers are not part of the isolated domain.
|
||||||
ms.assetid: 720645fb-a01f-491e-8d05-c9c6d5e28033
|
ms.assetid: 720645fb-a01f-491e-8d05-c9c6d5e28033
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Basic Firewall Policy Design Example (Windows 10)
|
title: Basic Firewall Policy Design Example (Windows 10)
|
||||||
description: Firewall Policy Design Example
|
description: This example features a fictitious company and illustrates firewall policy design for Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 0dc3bcfe-7a4d-4a15-93a9-64b13bd775a7
|
ms.assetid: 0dc3bcfe-7a4d-4a15-93a9-64b13bd775a7
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Gathering Information about Your Active Directory Deployment (Windows 10)
|
title: Gathering Information about Your Active Directory Deployment (Windows 10)
|
||||||
description: Gathering Information about Your Active Directory Deployment
|
description: Learn about gathering Active Directory information, including domain layout, organizational unit architecture, and site topology, for your firewall deployment.
|
||||||
ms.assetid: b591b85b-12ac-4329-a47e-bc1b03e66eb0
|
ms.assetid: b591b85b-12ac-4329-a47e-bc1b03e66eb0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Gathering Information about Your Devices (Windows 10)
|
title: Gathering Information about Your Devices (Windows 10)
|
||||||
description: Gathering Information about Your Devices
|
description: Learn what information to gather about the devices in your enterprise to plan your Windows Defender Firewall with Advanced Security deployment.
|
||||||
ms.assetid: 7f7cd3b9-de8e-4fbf-89c6-3d1a47bc2beb
|
ms.assetid: 7f7cd3b9-de8e-4fbf-89c6-3d1a47bc2beb
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Gathering Other Relevant Information (Windows 10)
|
title: Gathering Other Relevant Information (Windows 10)
|
||||||
description: Gathering Other Relevant Information
|
description: Learn about additional information you may need to gather to deploy Windows Defender Firewall with Advanced Security policies in your organization.
|
||||||
ms.assetid: 87ccca07-4346-496b-876d-cdde57d0ce17
|
ms.assetid: 87ccca07-4346-496b-876d-cdde57d0ce17
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Gathering the Information You Need (Windows 10)
|
title: Gathering the Information You Need (Windows 10)
|
||||||
description: Gathering the Information You Need
|
description: Collect and analyze information about your network, directory services, and devices to prepare for Windows Defender Firewall with Advanced Security deployment.
|
||||||
ms.assetid: 545fef02-5725-4b1e-b67a-a32d94c27d15
|
ms.assetid: 545fef02-5725-4b1e-b67a-a32d94c27d15
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: GPO\_DOMISO\_Boundary (Windows 10)
|
title: GPO\_DOMISO\_Boundary (Windows 10)
|
||||||
description: GPO\_DOMISO\_Boundary
|
description: This example GPO supports devices that are not part of the isolated domain to access specific servers that must be available to those untrusted devices.
|
||||||
ms.assetid: ead3a510-c329-4c2a-9ad2-46a3b4975cfd
|
ms.assetid: ead3a510-c329-4c2a-9ad2-46a3b4975cfd
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: GPO\_DOMISO\_Encryption\_WS2008 (Windows 10)
|
title: GPO\_DOMISO\_Encryption\_WS2008 (Windows 10)
|
||||||
description: GPO\_DOMISO\_Encryption\_WS2008
|
description: This example GPO supports the ability for servers that contain sensitive data to require encryption for all connection requests.
|
||||||
ms.assetid: 84375480-af6a-4c79-aafe-0a37115a7446
|
ms.assetid: 84375480-af6a-4c79-aafe-0a37115a7446
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: GPO\_DOMISO\_Firewall (Windows 10)
|
title: GPO\_DOMISO\_Firewall (Windows 10)
|
||||||
description: GPO\_DOMISO\_Firewall
|
description: Learn about the settings and rules in this example GPO, which is authored by using the Group Policy editing tools.
|
||||||
ms.assetid: 318467d2-5698-4c5d-8000-7f56f5314c42
|
ms.assetid: 318467d2-5698-4c5d-8000-7f56f5314c42
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Isolated Domain GPOs (Windows 10)
|
title: Isolated Domain GPOs (Windows 10)
|
||||||
description: Isolated Domain GPOs
|
description: Learn about GPOs for isolated domains in this example configuration of Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: e254ce4a-18c6-4868-8179-4078d9de215f
|
ms.assetid: e254ce4a-18c6-4868-8179-4078d9de215f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Isolated Domain (Windows 10)
|
title: Isolated Domain (Windows 10)
|
||||||
description: Isolated Domain
|
description: Learn about the isolated domain, which is the primary zone for trusted devices, which use connection security and firewall rules to control communication.
|
||||||
ms.assetid: d6fa8d67-0078-49f6-9bcc-db1f24816c5e
|
ms.assetid: d6fa8d67-0078-49f6-9bcc-db1f24816c5e
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Isolating Microsoft Store Apps on Your Network (Windows 10)
|
title: Isolating Microsoft Store Apps on Your Network (Windows 10)
|
||||||
description: Isolating Microsoft Store Apps on Your Network
|
description: Learn how to customize your firewall configuration to isolate the network access of the new Microsoft Store apps that run on devices added to your network.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Link the GPO to the Domain (Windows 10)
|
title: Link the GPO to the Domain (Windows 10)
|
||||||
description: Link the GPO to the Domain
|
description: Learn how to link a GPO to the Active Directory container for the target devices, after you configure it in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 746d4553-b1a6-4954-9770-a948926b1165
|
ms.assetid: 746d4553-b1a6-4954-9770-a948926b1165
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Modify GPO Filters (Windows 10)
|
title: Modify GPO Filters (Windows 10)
|
||||||
description: Modify GPO Filters to Apply to a Different Zone or Version of Windows
|
description: Learn how to modify GPO filters to apply to a different zone or version of windows in Windows Defender Firewall with Advanced Security.
|
||||||
ms.assetid: 24ede9ca-a501-4025-9020-1129e2cdde80
|
ms.assetid: 24ede9ca-a501-4025-9020-1129e2cdde80
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Open the Group Policy Management Console to IP Security Policies (Windows 10)
|
title: Open the Group Policy Management Console to IP Security Policies (Windows 10)
|
||||||
description: Open the Group Policy Management Console to IP Security Policies
|
description: Learn how to open the Group Policy Management Console to IP Security Policies to configure GPOs for earlier versions of the Windows operating system.
|
||||||
ms.assetid: 235f73e4-37b7-40f4-a35e-3e7238bbef43
|
ms.assetid: 235f73e4-37b7-40f4-a35e-3e7238bbef43
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Open Windows Defender Firewall with Advanced Security (Windows 10)
|
title: Open Windows Defender Firewall with Advanced Security (Windows 10)
|
||||||
description: Open Windows Defender Firewall with Advanced Security
|
description: Learn how to open the Windows Defender Firewall with Advanced Security console. You must be a member of the Administrators group.
|
||||||
ms.assetid: 788faff2-0f50-4e43-91f2-3e2595c0b6a1
|
ms.assetid: 788faff2-0f50-4e43-91f2-3e2595c0b6a1
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Planning Certificate-based Authentication (Windows 10)
|
title: Planning Certificate-based Authentication (Windows 10)
|
||||||
description: Planning Certificate-based Authentication
|
description: Learn how a device unable to join an Active Directory domain can still participate in an isolated domain by using certificate-based authentication.
|
||||||
ms.assetid: a55344e6-d0df-4ad5-a6f5-67ccb6397dec
|
ms.assetid: a55344e6-d0df-4ad5-a6f5-67ccb6397dec
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
Loading…
x
Reference in New Issue
Block a user