Recently discovered that using Group Policy if a rule is defined to allow the connection if it is secure and the Override block rules checkbox is checked, Server 2022 fails to load all of the firewall rules and gives event ID 2009 in the Microsoft-Windows-Windows Firewall With Advanced Security log.
I've been able to replicate it with three different servers as well as creating a new GPO from scratch with only one rule in it.
Can anyone else replicate this issue? We are using it to block RDP and using this rule to allow RDP from only hardened computers (jump points). So far my only work arounds are to either change the Domain Profile to not apply local firewall rules, use powershell to disable the automatically enabled built-in RDP rule, or login to each server and manually disable it.
I found an issue with Windows 11 that is similar if the GPO was edited using an older GPO template (admx) and re-creating with the latest template resolved the issue. However I have the latest template for 2022 and made sure to make all of the changes/edits using one of the affected servers to eliminate any template incompatibility issues.