(0) exportieren Drucken
Alle erweitern

Checklist: Implementing a Domain Isolation Policy Design

Letzte Aktualisierung: Januar 2010

Betrifft: Windows 7, Windows Essential Business Server, Windows SBS 2003, Windows SBS 2008, Windows Server 2000, Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2, Windows Server 2008, Windows Server 2008 R2, Windows Vista

This parent checklist includes cross-reference links to important concepts about the domain isolation policy design. It also contains links to subordinate checklists that will help you complete the tasks that are required to implement this design.

noteHinweis
Complete the tasks in this checklist in order. When a reference link takes you to a procedure, return to this topic after you complete the steps in that procedure so that you can proceed with the remaining tasks in this checklist.

The procedures in this section use the Group Policy MMC snap-ins to configure the GPOs, but you can also use the Netsh command-line tool to configure GPOs. For more information, see Use Netsh to Configure GPOs.

For more information about the security algorithms and authentication methods available in each version of Windows, see IPsec Algorithms and Methods Supported in Windows (http://go.microsoft.com/fwlink/?linkid=129230.

Prüfliste Checklist: Implementing a domain isolation policy design

 

  Task Reference
Kontrollkästchen

Review important concepts and examples for the domain isolation policy design, determine your Windows-Firewall mit erweiterten Sicherheitseinstellungen deployment goals, and customize this design to meet the needs of your organization.

Konzeptionsthema Identifying Your Windows Firewall with Advanced Security Deployment Goals

Konzeptionsthema Domain Isolation Policy Design

Konzeptionsthema Domain Isolation Policy Design Example

Konzeptionsthema Planning Domain Isolation Zones

Kontrollkästchen

Create the GPOs and connection security rules for the isolated domain.

Prüflistenthema Checklist: Configuring Rules for the Isolated Domain

Kontrollkästchen

Create the GPOs and connection security rules for the boundary zone.

Prüflistenthema Checklist: Configuring Rules for the Boundary Zone

Kontrollkästchen

Create the GPOs and connection security rules for the encryption zone.

Prüflistenthema Checklist: Configuring Rules for the Encryption Zone

Kontrollkästchen

Create the GPOs and connection security rules for the isolated server zone.

Prüflistenthema Checklist: Configuring Rules for an Isolated Server Zone

Kontrollkästchen

According to the testing and roll-out schedule in your design plan, add computer accounts to the membership group to deploy rules and settings to your computers.

Thema Vorgehensweise Add Production Computers to the Membership Group for a Zone

Kontrollkästchen

After you confirm that network traffic is authenticated by IPsec, you can change authentication rules for the isolated domain and encryption zone from request to require mode.

Thema Vorgehensweise Change Rules from Request to Require Mode

Fanden Sie dies hilfreich?
(1500 verbleibende Zeichen)
Vielen Dank für Ihr Feedback.

Community-Beiträge

HINZUFÜGEN
Anzeigen:
© 2014 Microsoft