2023-05-24 16:42:58 -04:00

2.3 KiB

title, description, ms.prod, ms.topic, ms.date
title description ms.prod ms.topic ms.date
Change Rules from Request to Require Mode Learn how to convert a rule from request to require mode and apply the modified GPOs to the client devices. windows-client conceptual 09/07/2021

Change Rules from Request to Require Mode

After you confirm that network traffic is being correctly protected by using IPsec, you can change the rules for the domain isolation and encryption zones to require, instead of request, authentication. Don't change the rules for the boundary zone; they must stay in request mode so that devices in the boundary zone can continue to accept connections from devices that aren't part of the isolated domain.

Administrative credentials

To complete these procedures, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the GPOs.

In this topic:

To convert a rule from request to require mode

  1. Open the Group Policy Management Console to Windows Defender Firewall with Advanced Security.

  2. In the right navigation pane, click Connection Security Rules.

  3. In the details pane, double-click the connection security rule that you want to modify.

  4. Click the Authentication tab.

  5. In the Requirements section, change Authenticated mode to Require inbound and request outbound, and then click OK.

To apply the modified GPOs to the client devices

  1. The next time each device refreshes its Group Policy, it will receive the updated GPO and apply the modified rule. To force an immediate refresh, run the following command from an elevated command prompt:

    gpupdate /force
    
  2. To verify that the modified GPO is correctly applied to the client devices, you can run the following command:

    gpresult /r /scope computer
    
  3. Examine the command output for the list of GPOs that are applied to the device, and make sure that the list contains the GPOs you expect to see on that device.