mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 02:43:43 +00:00
fixing broken links
This commit is contained in:
@ -506,12 +506,12 @@
|
||||
###### [Assign Security Group Filters to the GPO](assign-security-group-filters-to-the-gpo.md)
|
||||
###### [Change Rules from Request to Require Mode](change-rules-from-request-to-require-mode.md)
|
||||
###### [Configure Authentication Methods](configure-authentication-methods.md)
|
||||
###### [Configure Data Protection (Quick Mode) Settings](configure-data-protection--quick-mode--settings.md)
|
||||
###### [Configure Data Protection (Quick Mode) Settings](configure-data-protection-quick-mode-settings.md)
|
||||
###### [Configure Group Policy to Autoenroll and Deploy Certificates](configure-group-policy-to-autoenroll-and-deploy-certificates.md)
|
||||
###### [Configure Key Exchange (Main Mode) Settings](configure-key-exchange--main-mode--settings.md)
|
||||
###### [Configure Key Exchange (Main Mode) Settings](configure-key-exchange-main-mode-settings.md)
|
||||
###### [Configure the Rules to Require Encryption](configure-the-rules-to-require-encryption.md)
|
||||
###### [Configure the Windows Firewall Log](configure-the-windows-firewall-log.md)
|
||||
###### [Configure the Workstation Authentication Certificate Template[wfas_dep]](configure-the-workstation-authentication-certificate-templatewfas-dep.md)
|
||||
###### [Configure the Workstation Authentication Certificate Template](configure-the-workstation-authentication-certificate-template.md)
|
||||
###### [Configure Windows Firewall to Suppress Notifications When a Program Is Blocked](configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md)
|
||||
###### [Confirm That Certificates Are Deployed Correctly](confirm-that-certificates-are-deployed-correctly.md)
|
||||
###### [Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md)
|
||||
@ -529,7 +529,6 @@
|
||||
###### [Enable Predefined Inbound Rules](enable-predefined-inbound-rules.md)
|
||||
###### [Enable Predefined Outbound Rules](enable-predefined-outbound-rules.md)
|
||||
###### [Exempt ICMP from Authentication](exempt-icmp-from-authentication.md)
|
||||
###### [Install Active Directory Certificate Services](install-active-directory-certificate-services.md)
|
||||
###### [Link the GPO to the Domain](link-the-gpo-to-the-domain.md)
|
||||
###### [Modify GPO Filters to Apply to a Different Zone or Version of Windows](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md)
|
||||
###### [Open the Group Policy Management Console to IP Security Policies](open-the-group-policy-management-console-to-ip-security-policies.md)
|
||||
|
@ -39,6 +39,6 @@ This goal, which corresponds to [Server Isolation Policy Design](server-isolatio
|
||||
|
||||
The following components are required for this deployment goal:
|
||||
|
||||
- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain. For more info about Active Directory, see [Additional Resources](additional-resources-wfasdesign.md).
|
||||
- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain.
|
||||
|
||||
**Next: **[Mapping Your Deployment Goals to a Windows Firewall with Advanced Security Design](mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md)
|
||||
|
@ -49,6 +49,6 @@ These goals also support optional zones that can be created to add customized pr
|
||||
|
||||
The following components are required for this deployment goal:
|
||||
|
||||
- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain. For more info about Active Directory, see [Additional Resources](additional-resources-wfasdesign.md).
|
||||
- **Active Directory**: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain.
|
||||
|
||||
**Next: **[Require Encryption When Accessing Sensitive Network Resources](require-encryption-when-accessing-sensitive-network-resources.md)
|
||||
|
Reference in New Issue
Block a user