windows-itpro-docs/windows/security/operating-system-security/network-security/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md
2023-05-24 16:42:58 -04:00

4.9 KiB

title, description, ms.prod, ms.topic, ms.date
title description ms.prod ms.topic ms.date
Identify implementation goals for Windows Defender Firewall with Advanced Security Deployment Identifying Your Windows Defender Firewall with Advanced Security (WFAS) implementation goals windows-client conceptual 09/08/2021

Identifying Windows Defender Firewall with Advanced Security implementation goals

Correctly identifying your Windows Defender Firewall with Advanced Security implementation goals is essential for the success of your Windows Defender Firewall design project. Form a project team that can clearly articulate deployment issues in a vision statement. When you write your vision statement, identify, clarify, and refine your implementation goals. Prioritize and, if possible, combine your implementation goals so that you can design and deploy Windows Defender Firewall by using an iterative approach. You can take advantage of the predefined Windows Defender Firewall implementation goals presented in this guide that are relevant to your scenarios.

The following table lists the three main tasks for articulating, refining, and later documenting your Windows Defender Firewall implementation goals:

Deployment goal tasks Reference links
Evaluate predefined Windows Defender Firewall with Advanced Security implementation goals that are provided in this section of the guide, and combine one or more goals to reach your organizational objectives. Predefined implementation goals:

Map one goal or a combination of the predefined implementation goals to an existing Windows Defender Firewall with Advanced Security design.
Based on the status of your current infrastructure, document your implementation goals for your Windows Defender Firewall with Advanced Security design into a deployment plan.

Next: Protect Devices from Unwanted Network Traffic