Change Rules from Request to Require Mode
Updated: October 11, 2012
Applies To: Windows Server 2012
After you confirm that network traffic is being correctly protected by using IPsec, you can change the rules for the domain isolation and encryption zones to require, instead of request, authentication. Do not change the rules for the boundary zone; they must stay in request mode so that computers in the boundary zone can continue to accept connections from computers that are not part of the isolated domain.
To complete these procedures, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the GPOs.
To convert a rule from request to require mode for Windows 8, Windows 7, Windows Vista, Windows Server 2012, Windows Server 2008, or Windows Server 2008 R2
In the navigation pane, click Connection Security Rules.
In the details pane, double-click the connection security rule that you want to modify.
Click the Authentication tab.
In the Requirements section, change Authenticated mode to Require inbound and request outbound, and then click OK.
To apply the modified GPOs to the client computers
To verify that the modified GPO is correctly applied to the client computers, you can run one of the following commands:
On computers that are running Windows 8, Windows 7, Windows Vista, Windows Server 2012, Windows Server 2008, or Windows Server 2008 R2, run the following command:
gpresult /r /scope computer
Examine the command output for the list of GPOs that are applied to the computer, and make sure that the list contains the GPOs you expect to see on that computer.