Files
windows-itpro-docs/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md
2023-02-24 07:47:14 -05:00

2.7 KiB

title, description, ms.prod, ms.topic, ms.date, appliesto
title description ms.prod ms.topic ms.date appliesto
Checklist Configuring Rules for the Encryption Zone (Windows) Use these tasks to configure connection security rules and IPsec settings in your GPOs to implement the encryption zone in an isolated domain. windows-client conceptual 09/07/2021
<a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10 and later</a>
<a href="https://learn.microsoft.com/windows/release-health/windows-server-release-info" target="_blank">Windows Server 2016 and later</a>

Checklist: Configuring Rules for the Encryption Zone

This checklist includes tasks for configuring connection security rules and IPsec settings in your GPOs to implement the encryption zone in an isolated domain.

Rules for the encryption zone are typically the same as those rules for the isolated domain, with the exception that the main rule requires encryption in addition to authentication.

Checklist: Configuring encryption zone rules

This checklist assumes that you've already created the GPO for the isolated domain as described in Checklist: Implementing a Domain Isolation Policy Design. You can then copy those GPOs for use with the encryption zone. After you create the copies, modify the main rule to require encryption in addition to the authentication required by the rest of the isolated domain.

Task Reference
Make a copy of the domain isolation GPOs to serve as a starting point for the GPOs for the encryption zone. Copy a GPO to Create a New GPO
Modify the group memberships and WMI filters so that they're correct for the encryption zone and the version of Windows for which this GPO is intended. Modify GPO Filters to Apply to a Different Zone or Version of Windows
Add the encryption requirements for the zone. Configure the Rules to Require Encryption
Link the GPO to the domain level of the Active Directory organizational unit hierarchy. Link the GPO to the Domain
Add your test computers to the membership group for the encryption zone. Be sure to add at least one for each operating system supported by a different GPO in the group. Add Test Computers to the Membership Group for a Zone
Verify that the connection security rules are protecting network traffic. Verify That Network Traffic Is Authenticated