Implementing connection security rules
This final section focuses on layering additional connection security rules onto the inbound and outbound traffic rules that are available within Windows Defender Firewall. While firewall rules allow or deny traffic through the firewall configuration, they do not enforce connection security. The creation of connection security rules in conjunction with inbound and outbound rules ensures that appropriate connection security between two computers has been applied to the communication layer.
There are five main types of connection security rules:
- Isolation, where you can configure connection restrictions based on domain membership or device health status
- Authentication exemption, allowing any specified computers to bypass authentication
- Server-to-server, ensuring that authentication is enforced between specified computers
- Tunnel ensures that connections are authenticated between two computers
- Custom, where you can apply...