windows-itpro-docs/windows/security/identity-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md
2018-02-01 09:55:37 -08:00

3.2 KiB

title, description, ms.assetid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, author, ms.date
title description ms.assetid ms.prod ms.mktglfcycl ms.sitesec ms.pagetype author ms.date
Checklist Implementing a Domain Isolation Policy Design (Windows 10) Checklist Implementing a Domain Isolation Policy Design 76586eb3-c13c-4d71-812f-76bff200fc20 w10 deploy library security brianlic-msft 08/17/2017

Checklist: Implementing a Domain Isolation Policy Design

Applies to

  • Windows 10
  • Windows Server 2016

This parent checklist includes cross-reference links to important concepts about the domain isolation policy design. It also contains links to subordinate checklists that will help you complete the tasks that are required to implement this design.

Note:  Complete the tasks in this checklist in order. When a reference link takes you to a procedure, return to this topic after you complete the steps in that procedure so that you can proceed with the remaining tasks in this checklist.

The procedures in this section use the Group Policy MMC snap-ins to configure the GPOs, but you can also use Windows PowerShell to configure GPOs. For more info, see Windows Defender Firewall with Advanced Security Administration with Windows PowerShell.

Checklist: Implementing a domain isolation policy design

Task Reference
Review important concepts and examples for the domain isolation policy design, determine your Windows Defender Firewall with Advanced Security deployment goals, and customize this design to meet the needs of your organization. Identifying Your Windows Defender Firewall with Advanced Security Deployment Goals
Domain Isolation Policy Design
Domain Isolation Policy Design Example
Planning Domain Isolation Zones
Create the GPOs and connection security rules for the isolated domain. Checklist: Configuring Rules for the Isolated Domain
Create the GPOs and connection security rules for the boundary zone. Checklist: Configuring Rules for the Boundary Zone
Create the GPOs and connection security rules for the encryption zone. Checklist: Configuring Rules for the Encryption Zone
Create the GPOs and connection security rules for the isolated server zone. Checklist: Configuring Rules for an Isolated Server Zone
According to the testing and roll-out schedule in your design plan, add computer accounts to the membership group to deploy rules and settings to your computers. Add Production Devices to the Membership Group for a Zone
After you confirm that network traffic is authenticated by IPsec, you can change authentication rules for the isolated domain and encryption zone from request to require mode. Change Rules from Request to Require Mode