windows-itpro-docs/windows/access-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md

2.9 KiB

title, description, ms.assetid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, author
title description ms.assetid ms.prod ms.mktglfcycl ms.sitesec ms.pagetype author
Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals (Windows 10) Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals 598cf45e-2e1c-4947-970f-361dfa264bba w10 deploy library security brianlic-msft

Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals

Applies to

  • Windows 10
  • Windows Server 2016

Correctly identifying your Windows Defender Firewall with Advanced Security deployment goals is essential for the success of your Windows Defender Firewall design project. Form a project team that can clearly articulate deployment issues in a vision statement. When you write your vision statement, identify, clarify, and refine your deployment goals. Prioritize and, if possible, combine your deployment goals so that you can design and deploy Windows Defender Firewall by using an iterative approach. You can take advantage of the predefined Windows Defender Firewall deployment goals presented in this guide that are relevant to your scenarios.

The following table lists the three main tasks for articulating, refining, and subsequently documenting your Windows Defender Firewall deployment goals:

Deployment goal tasks Reference links
Evaluate predefined Windows Defender Firewall with Advanced Security deployment goals that are provided in this section of the guide, and combine one or more goals to reach your organizational objectives. Predefined deployment goals:

Map one goal or a combination of the predefined deployment goals to an existing Windows Defender Firewall with Advanced Security design.
Based on the status of your current infrastructure, document your deployment goals for your Windows Defender Firewall with Advanced Security design into a deployment plan.

Next: Protect Devices from Unwanted Network Traffic