Use Windows Firewall with Advanced Security to create Connection Security Rules. There are five options: Isolation, Authentication Exception, Server-to-Server, Tunnel, and Custom. These rules can be used to specify how and when IPsec authentication occurs between two hosts or other communication points over a network.
- [Narrator] Windows Firewall protects your computer…by monitoring what types of data move through it.…If data is deemed safe, the firewall allows it to pass.…If the data doesn't meet firewall guidelines,…it blocks the data, and does not allow it in or out.…Windows Firewall does not encrypt or authenticate…communications between hosts, though.…If you want to encrypt or authenticate,…you need to create your own Connection Security Rules.…You do this in Windows Firewall with Advanced Security.…I have that open here.…
To get started, first click Connection Security Rules.…Then right click it and choose New Rule.…There are several options to base your rule on…that we should examine in further detail.…Isolation Rules restrict connections based on credentials,…such as if the computer is a member of a domain or not,…if it is healthy, and so on.…Authentication Exemptions exclude specific computers…from authentication rules…based on their IP address or subnet,…among other things.…
Server-to-server rules are used to prevent…
This course maps to the domain of Exam 70-698, Installing and Configuring Windows 10, a required exam for Microsoft Certified Solutions Associate (MCSA).
- Configuring and supporting network settings
- Connecting to a network and configuring network locations
- Using Windows Firewall
- Managing partitions with Disk Management
- Managing storage with PowerShell
- Creating and configuring a VHD
- Creating and configuring homegroups and folder shares
- Configuring desktop apps and startup options
- Creating and deploying provisioning packages
- Using Remote Management tools
- Configuring Remote Assistance and Remote Desktop
Skill Level Intermediate
1. Configure Networking
2. Configure Storage
3. Configure Data Access and Usage
Troubleshoot data access5m 59s
4. Implement Apps
5. Configure Remote Management
What's next?1m 2s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.