diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md index 5f9b509e1c..2ca5758f52 100644 --- a/windows/keep-secure/TOC.md +++ b/windows/keep-secure/TOC.md @@ -506,12 +506,12 @@ ###### [Assign Security Group Filters to the GPO](assign-security-group-filters-to-the-gpo.md) ###### [Change Rules from Request to Require Mode](change-rules-from-request-to-require-mode.md) ###### [Configure Authentication Methods](configure-authentication-methods.md) -###### [Configure Data Protection (Quick Mode) Settings](configure-data-protection--quick-mode--settings.md) +###### [Configure Data Protection (Quick Mode) Settings](configure-data-protection-quick-mode-settings.md) ###### [Configure Group Policy to Autoenroll and Deploy Certificates](configure-group-policy-to-autoenroll-and-deploy-certificates.md) -###### [Configure Key Exchange (Main Mode) Settings](configure-key-exchange--main-mode--settings.md) +###### [Configure Key Exchange (Main Mode) Settings](configure-key-exchange-main-mode-settings.md) ###### [Configure the Rules to Require Encryption](configure-the-rules-to-require-encryption.md) ###### [Configure the Windows Firewall Log](configure-the-windows-firewall-log.md) -###### [Configure the Workstation Authentication Certificate Template[wfas_dep]](configure-the-workstation-authentication-certificate-templatewfas-dep.md) +###### [Configure the Workstation Authentication Certificate Template](configure-the-workstation-authentication-certificate-template.md) ###### [Configure Windows Firewall to Suppress Notifications When a Program Is Blocked](configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md) ###### [Confirm That Certificates Are Deployed Correctly](confirm-that-certificates-are-deployed-correctly.md) ###### [Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md) @@ -529,7 +529,6 @@ ###### [Enable Predefined Inbound Rules](enable-predefined-inbound-rules.md) ###### [Enable Predefined Outbound Rules](enable-predefined-outbound-rules.md) ###### [Exempt ICMP from Authentication](exempt-icmp-from-authentication.md) -###### [Install Active Directory Certificate Services](install-active-directory-certificate-services.md) ###### [Link the GPO to the Domain](link-the-gpo-to-the-domain.md) ###### [Modify GPO Filters to Apply to a Different Zone or Version of Windows](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md) ###### [Open the Group Policy Management Console to IP Security Policies](open-the-group-policy-management-console-to-ip-security-policies.md) diff --git a/windows/keep-secure/restrict-access-to-only-specified-users-or-devices.md b/windows/keep-secure/restrict-access-to-only-specified-users-or-devices.md index 0197fbcba0..049625343b 100644 --- a/windows/keep-secure/restrict-access-to-only-specified-users-or-devices.md +++ b/windows/keep-secure/restrict-access-to-only-specified-users-or-devices.md @@ -39,6 +39,6 @@ This goal, which corresponds to [Server Isolation Policy Design](server-isolatio The following components are required for this deployment goal: -- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain. For more info about Active Directory, see [Additional Resources](additional-resources-wfasdesign.md). +- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain. **Next: **[Mapping Your Deployment Goals to a Windows Firewall with Advanced Security Design](mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md) diff --git a/windows/keep-secure/restrict-access-to-only-trusted-devices.md b/windows/keep-secure/restrict-access-to-only-trusted-devices.md index be3854af23..d2b47a2dbe 100644 --- a/windows/keep-secure/restrict-access-to-only-trusted-devices.md +++ b/windows/keep-secure/restrict-access-to-only-trusted-devices.md @@ -49,6 +49,6 @@ These goals also support optional zones that can be created to add customized pr The following components are required for this deployment goal: -- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain. For more info about Active Directory, see [Additional Resources](additional-resources-wfasdesign.md). +- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain. **Next: **[Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md)