Summary

Completed

IPSec is another layer of protection to ensure the integrity of the communications between devices. IPSec can be used to authenticate and verify the identity between devices, and encrypt the data being sent over the network. Connection security rules define the criteria for how and which computers can communicate with each other. Different authentication methods and protocols are available depending on organizational needs. Policies can be applied using Group Policy and can be monitored using Windows Defender Firewall with Advanced Security or Connection Security Monitor MMC snap-ins.

Learn more