
|
Review important concepts and examples for the basic firewall policy design to determine if this design meets the needs of your organization. |
[Identifying Your Windows Firewall with Advanced Security Deployment Goals](identifying-your-windows-firewall-with-advanced-security-deployment-goals.md)
[Basic Firewall Policy Design](basic-firewall-policy-design.md)
[Firewall Policy Design Example](firewall-policy-design-example.md)
[Planning Settings for a Basic Firewall Policy](planning-settings-for-a-basic-firewall-policy.md)
|

|
Create the membership group and a GPO for each set of computers that require different firewall rules. Where GPOs will be similar, such as for Windows 8, Windows 7, Windows Vista, Windows Server 2012, Windows Server 2008, and Windows Server 2008 R2, create one GPO, configure it by using the tasks in this checklist, and then make a copy of the GPO for the other version of Windows. For example, create and configure the GPO for Windows 8, make a copy of it for Windows Server 2012, and then follow the steps in this checklist to make the few required changes to the copy. |
[Checklist: Creating Group Policy Objects](checklist-creating-group-policy-objects.md)
[Copy a GPO to Create a New GPO](copy-a-gpo-to-create-a-new-gpo.md)
|

|
If you are working on a GPO that was copied from another, modify the group membership and WMI filters so that they are correct for the computers for which this GPO is intended. |
[Modify GPO Filters to Apply to a Different Zone or Version of Windows](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md)
|

|
Configure the GPO with firewall default settings appropriate for your design. |
[Checklist: Configuring Basic Firewall Settings](checklist-configuring-basic-firewall-settings.md)
|

|
Create one or more inbound firewall rules to allow unsolicited inbound network traffic. |
[Checklist: Creating Inbound Firewall Rules](checklist-creating-inbound-firewall-rules.md)
|

|
Create one or more outbound firewall rules to block unwanted outbound network traffic. |
[Checklist: Creating Outbound Firewall Rules](checklist-creating-outbound-firewall-rules.md)
|

|
Link the GPO to the domain level of the Active Directory organizational unit hierarchy. |
[Link the GPO to the Domain](link-the-gpo-to-the-domain.md)
|

|
Add test computers to the membership group, and then confirm that the computers receive the firewall rules from the GPOs as expected. |
[Add Test Computers to the Membership Group for a Zone](add-test-computers-to-the-membership-group-for-a-zone.md)
|

|
According to the testing and roll-out schedule in your design plan, add computer accounts to the membership group to deploy the completed firewall policy settings to your computers. |
[Add Production Computers to the Membership Group for a Zone](add-production-computers-to-the-membership-group-for-a-zone.md)
|