Change Rules from Request to Require Mode


Updated: October 11, 2012

Applies To: Windows Server 2012

After you confirm that network traffic is being correctly protected by using IPsec, you can change the rules for the domain isolation and encryption zones to require, instead of request, authentication. Do not change the rules for the boundary zone; they must stay in request mode so that computers in the boundary zone can continue to accept connections from computers that are not part of the isolated domain.

Administrative credentials

To complete these procedures, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the GPOs.

To convert a rule from request to require mode for Windows 8, Windows 7, Windows Vista, Windows Server 2012, Windows Server 2008, or Windows Server 2008 R2

  1. In the navigation pane, click Connection Security Rules.

  2. In the details pane, double-click the connection security rule that you want to modify.

  3. Click the Authentication tab.

  4. In the Requirements section, change Authenticated mode to Require inbound and request outbound, and then click OK.

To apply the modified GPOs to the client computers

  1. The next time each computer refreshes its Group Policy, it will receive the updated GPO and apply the modified rule. To force an immediate refresh, Start a Command Prompt as an Administrator and run the following command:

    gpupdate /force
  2. To verify that the modified GPO is correctly applied to the client computers, you can run one of the following commands:

    On computers that are running Windows 8, Windows 7, Windows Vista, Windows Server 2012, Windows Server 2008, or Windows Server 2008 R2, run the following command:

    gpresult /r /scope computer
  3. Examine the command output for the list of GPOs that are applied to the computer, and make sure that the list contains the GPOs you expect to see on that computer.