mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
updates
This commit is contained in:
parent
54c8580064
commit
bf460d70a3
@ -119,7 +119,7 @@ sections:
|
||||
- question: |
|
||||
Why am I getting the error message "ERR_NAME_NOT_RESOLVED" after not being able to reach the PAC file?
|
||||
answer: |
|
||||
This issue is a known one. To mitigate this issue, you need to create two firewall rules. For information about creating a firewall rule with Group Policy, see [Configure Windows Firewall rules with group policy](../../../operating-system-security/network-security/windows-firewall/configure-rules-with-gpo.md)
|
||||
This issue is a known one. To mitigate this issue, you need to create two firewall rules. For information about creating a firewall rule with Group Policy, see [Configure Windows Firewall rules with group policy](../../../operating-system-security/network-security/windows-firewall/configure.md)
|
||||
|
||||
### First rule (DHCP Server)
|
||||
- Program path: `%SystemRoot%\System32\svchost.exe`
|
||||
|
@ -111,14 +111,6 @@ What follows are a few general guidelines for configuring outbound rules.
|
||||
- It's recommended to *allow outbound* by default for most deployments for the sake of simplification with app deployments, unless the organization prefers tight security controls over ease-of-use
|
||||
- In high security environments, an inventory of all apps should be logged and maintained. Records must include whether an app used requires network connectivity. Administrators need to create new rules specific to each app that needs network connectivity and push those rules centrally, via GPO or CSP
|
||||
|
||||
## Configure firewall rules
|
||||
|
||||
Firewall rules can be configure with the following tools:
|
||||
|
||||
- Using the [Firewall CSP](/windows/client-management/mdm/firewall-csp), with a mobile device management (MDM) solution like Microsoft Intune. For more information, see [][]
|
||||
- Using the Windows Defender Firewall with Advanced Security (WFAS) console, locally or via GPO. For more information, see [][]
|
||||
- Using command line tools. For more information, see [][]
|
||||
|
||||
## Next steps
|
||||
|
||||
> [!div class="nextstepaction"]
|
||||
|
@ -131,15 +131,10 @@ Once the emergency is over, uncheck the setting to restore regular network traff
|
||||
|
||||
## Next steps
|
||||
|
||||
> [!div class="nextstepaction"]
|
||||
> Learn about the tools to configure Windows Firewall and firewall rules:
|
||||
>
|
||||
> [Configure Windows Firewall >](configure.md)
|
||||
|
||||
From the following dropdown, select one of tools to learn how to configure Windows Firewall:
|
||||
|
||||
> [!div class="op_single_selector"]
|
||||
> From the following dropdown, select one of tools to learn how to configure Windows Firewall:
|
||||
|
||||
>
|
||||
> - [Configure with Microsoft Intune 🔗](/mem/intune/protect/endpoint-security-firewall-policy)
|
||||
> - [Configure with GPO](configure.md)
|
||||
> - [Configure with command line tools](configure-with-command-line.md)
|
||||
|
Loading…
x
Reference in New Issue
Block a user