mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
17 KiB
17 KiB
Access protection
Access Control Overview
Dynamic Access Control Overview
Security identifiers
Security Principals
Local Accounts
Active Directory Accounts
Microsoft Accounts
Service Accounts
Active Directory Security Groups
Special Identities
Configure S/MIME for Windows 10 and Windows 10 Mobile
Enterprise Certificate Pinning
Install digital certificates on Windows 10 Mobile
Protect derived domain credentials with Credential Guard
How Credential Guard works
Credential Guard Requirements
Manage Credential Guard
Credential Guard protection limits
Considerations when using Credential Guard
Credential Guard: Additional mitigations
Credential Guard: Known issues
Protect Remote Desktop credentials with Remote Credential Guard
Smart Cards
How Smart Card Sign-in Works in Windows
Smart Card Architecture
Certificate Requirements and Enumeration
Smart Card and Remote Desktop Services
Smart Cards for Windows Service
Certificate Propagation Service
Smart Card Removal Policy Service
Smart Card Tools and Settings
Smart Cards Debugging Information
Smart Card Group Policy and Registry Settings
Smart Card Events
User Account Control
How User Account Control works
User Account Control security policy settings
User Account Control Group Policy and registry key settings
Virtual Smart Cards
Understanding and Evaluating Virtual Smart Cards
Get Started with Virtual Smart Cards: Walkthrough Guide
Use Virtual Smart Cards
Deploy Virtual Smart Cards
Evaluate Virtual Smart Card Security
Tpmvscmgr
VPN technical guide
VPN connection types
VPN routing decisions
VPN authentication options
VPN and conditional access
VPN name resolution
VPN auto-triggered profile options
VPN security features
VPN profile options
How to use single sign-on (SSO) over VPN and Wi-Fi connections
Windows 10 credential theft mitigation guide abstract
Windows Firewall with Advanced Security
Isolating Windows Store Apps on Your Network
Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012
Windows Firewall with Advanced Security Administration with Windows PowerShell
Windows Firewall with Advanced Security Design Guide
Understanding the Windows Firewall with Advanced Security Design Process
Identifying Your Windows Firewall with Advanced Security Deployment Goals
Protect Devices from Unwanted Network Traffic
Restrict Access to Only Trusted Devices
Require Encryption When Accessing Sensitive Network Resources
Restrict Access to Only Specified Users or Computers
Mapping Your Deployment Goals to a Windows Firewall with Advanced Security Design
Basic Firewall Policy Design
Domain Isolation Policy Design
Server Isolation Policy Design
Certificate-based Isolation Policy Design
Evaluating Windows Firewall with Advanced Security Design Examples
Firewall Policy Design Example
Domain Isolation Policy Design Example
Server Isolation Policy Design Example
Certificate-based Isolation Policy Design Example
Designing a Windows Firewall with Advanced Security Strategy
Gathering the Information You Need
Gathering Information about Your Current Network Infrastructure
Gathering Information about Your Active Directory Deployment
Gathering Information about Your Computers
Gathering Other Relevant Information
Determining the Trusted State of Your Computers
Planning Your Windows Firewall with Advanced Security Design
Planning Settings for a Basic Firewall Policy
Planning Domain Isolation Zones
Exemption List
Isolated Domain
Boundary Zone
Encryption Zone
Planning Server Isolation Zones
Planning Certificate-based Authentication
Documenting the Zones
Planning Group Policy Deployment for Your Isolation Zones
####### Planning Isolation Groups for the Zones ####### Planning Network Access Groups ####### Planning the GPOs ######## Firewall GPOs ######### GPO_DOMISO_Firewall ######## Isolated Domain GPOs ######### GPO_DOMISO_IsolatedDomain_Clients ######### GPO_DOMISO_IsolatedDomain_Servers ######## Boundary Zone GPOs ######### GPO_DOMISO_Boundary ######## Encryption Zone GPOs ######### GPO_DOMISO_Encryption ######## Server Isolation GPOs ####### Planning GPO Deployment