diff --git a/windows/security/application-security/application-isolation/microsoft-defender-application-guard/faq-md-app-guard.yml b/windows/security/application-security/application-isolation/microsoft-defender-application-guard/faq-md-app-guard.yml index e1da302edf..5f3515a26b 100644 --- a/windows/security/application-security/application-isolation/microsoft-defender-application-guard/faq-md-app-guard.yml +++ b/windows/security/application-security/application-isolation/microsoft-defender-application-guard/faq-md-app-guard.yml @@ -119,7 +119,7 @@ sections: - question: | Why am I getting the error message "ERR_NAME_NOT_RESOLVED" after not being able to reach the PAC file? answer: | - This issue is a known one. To mitigate this issue, you need to create two firewall rules. For information about creating a firewall rule with Group Policy, see [Configure Windows Firewall rules with group policy](../../../operating-system-security/network-security/windows-firewall/configure-rules-with-gpo.md) + This issue is a known one. To mitigate this issue, you need to create two firewall rules. For information about creating a firewall rule with Group Policy, see [Configure Windows Firewall rules with group policy](../../../operating-system-security/network-security/windows-firewall/configure.md) ### First rule (DHCP Server) - Program path: `%SystemRoot%\System32\svchost.exe` diff --git a/windows/security/operating-system-security/network-security/windows-firewall/rules.md b/windows/security/operating-system-security/network-security/windows-firewall/rules.md index 86d889bb65..aa98029298 100644 --- a/windows/security/operating-system-security/network-security/windows-firewall/rules.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/rules.md @@ -111,14 +111,6 @@ What follows are a few general guidelines for configuring outbound rules. - It's recommended to *allow outbound* by default for most deployments for the sake of simplification with app deployments, unless the organization prefers tight security controls over ease-of-use - In high security environments, an inventory of all apps should be logged and maintained. Records must include whether an app used requires network connectivity. Administrators need to create new rules specific to each app that needs network connectivity and push those rules centrally, via GPO or CSP -## Configure firewall rules - -Firewall rules can be configure with the following tools: - -- Using the [Firewall CSP](/windows/client-management/mdm/firewall-csp), with a mobile device management (MDM) solution like Microsoft Intune. For more information, see [][] -- Using the Windows Defender Firewall with Advanced Security (WFAS) console, locally or via GPO. For more information, see [][] -- Using command line tools. For more information, see [][] - ## Next steps > [!div class="nextstepaction"] diff --git a/windows/security/operating-system-security/network-security/windows-firewall/tools.md b/windows/security/operating-system-security/network-security/windows-firewall/tools.md index ff0d3f67fa..e4d5485358 100644 --- a/windows/security/operating-system-security/network-security/windows-firewall/tools.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/tools.md @@ -131,15 +131,10 @@ Once the emergency is over, uncheck the setting to restore regular network traff ## Next steps -> [!div class="nextstepaction"] -> Learn about the tools to configure Windows Firewall and firewall rules: -> -> [Configure Windows Firewall >](configure.md) - +From the following dropdown, select one of tools to learn how to configure Windows Firewall: > [!div class="op_single_selector"] -> From the following dropdown, select one of tools to learn how to configure Windows Firewall: - +> > - [Configure with Microsoft Intune 🔗](/mem/intune/protect/endpoint-security-firewall-policy) > - [Configure with GPO](configure.md) > - [Configure with command line tools](configure-with-command-line.md)