This commit is contained in:
Paolo Matarazzo 2023-11-20 17:52:03 -05:00
parent 54c8580064
commit bf460d70a3
3 changed files with 3 additions and 16 deletions

View File

@ -119,7 +119,7 @@ sections:
- question: | - question: |
Why am I getting the error message "ERR_NAME_NOT_RESOLVED" after not being able to reach the PAC file? Why am I getting the error message "ERR_NAME_NOT_RESOLVED" after not being able to reach the PAC file?
answer: | answer: |
This issue is a known one. To mitigate this issue, you need to create two firewall rules. For information about creating a firewall rule with Group Policy, see [Configure Windows Firewall rules with group policy](../../../operating-system-security/network-security/windows-firewall/configure-rules-with-gpo.md) This issue is a known one. To mitigate this issue, you need to create two firewall rules. For information about creating a firewall rule with Group Policy, see [Configure Windows Firewall rules with group policy](../../../operating-system-security/network-security/windows-firewall/configure.md)
### First rule (DHCP Server) ### First rule (DHCP Server)
- Program path: `%SystemRoot%\System32\svchost.exe` - Program path: `%SystemRoot%\System32\svchost.exe`

View File

@ -111,14 +111,6 @@ What follows are a few general guidelines for configuring outbound rules.
- It's recommended to *allow outbound* by default for most deployments for the sake of simplification with app deployments, unless the organization prefers tight security controls over ease-of-use - It's recommended to *allow outbound* by default for most deployments for the sake of simplification with app deployments, unless the organization prefers tight security controls over ease-of-use
- In high security environments, an inventory of all apps should be logged and maintained. Records must include whether an app used requires network connectivity. Administrators need to create new rules specific to each app that needs network connectivity and push those rules centrally, via GPO or CSP - In high security environments, an inventory of all apps should be logged and maintained. Records must include whether an app used requires network connectivity. Administrators need to create new rules specific to each app that needs network connectivity and push those rules centrally, via GPO or CSP
## Configure firewall rules
Firewall rules can be configure with the following tools:
- Using the [Firewall CSP](/windows/client-management/mdm/firewall-csp), with a mobile device management (MDM) solution like Microsoft Intune. For more information, see [][]
- Using the Windows Defender Firewall with Advanced Security (WFAS) console, locally or via GPO. For more information, see [][]
- Using command line tools. For more information, see [][]
## Next steps ## Next steps
> [!div class="nextstepaction"] > [!div class="nextstepaction"]

View File

@ -131,15 +131,10 @@ Once the emergency is over, uncheck the setting to restore regular network traff
## Next steps ## Next steps
> [!div class="nextstepaction"] From the following dropdown, select one of tools to learn how to configure Windows Firewall:
> Learn about the tools to configure Windows Firewall and firewall rules:
>
> [Configure Windows Firewall >](configure.md)
> [!div class="op_single_selector"] > [!div class="op_single_selector"]
> From the following dropdown, select one of tools to learn how to configure Windows Firewall: >
> - [Configure with Microsoft Intune 🔗](/mem/intune/protect/endpoint-security-firewall-policy) > - [Configure with Microsoft Intune 🔗](/mem/intune/protect/endpoint-security-firewall-policy)
> - [Configure with GPO](configure.md) > - [Configure with GPO](configure.md)
> - [Configure with command line tools](configure-with-command-line.md) > - [Configure with command line tools](configure-with-command-line.md)