From f4b3f0f48a2dab6e0df609a5607cd7a15b55a083 Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Fri, 22 Jul 2022 15:41:06 -0700 Subject: [PATCH] Update require-encryption-when-accessing-sensitive-network-resources.md --- ...ire-encryption-when-accessing-sensitive-network-resources.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md b/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md index 4e58c71406..92a170d7ef 100644 --- a/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md +++ b/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md @@ -25,7 +25,7 @@ The use of authentication in the previously described goal ([Restrict Access to For devices that share sensitive information over the network, Windows Defender Firewall with Advanced Security allows you to require that all such network traffic be encrypted. Using encryption can help you comply with regulatory and legislative requirements such as those found in the Federal Information Security Management Act of 2002 (FISMA), the Sarbanes-Oxley Act of 2002, the Health Insurance Portability and Accountability Act of 1996 (HIPAA), and other government and industry regulations. By creating connection security rules that apply to devices that host and exchange sensitive data, you can help protect the confidentiality of that data by encrypting it. The following illustration shows an encryption zone in an isolated domain. The rules that implement both the isolated domain and the different zones are deployed by using Group Policy and Active Directory. -s + ![encryption zone in an isolated domain.](images/wfas-domainisoencrypt.gif) This goal provides the following benefits: