Info

Authentication Method

Specify how authentication is performed for connections that match this rule.

* Rule Type j Requirements * Authentication Method

* Profile

* Name

What authentication method would you like to use? C Default

Use the authentication methods specified in the profile properties.

( Computer and user (Kerberos V5)

Restrict communications to connections from domain-joined users and computers. Provides identity information for authorizing specific users and computers in inbound and outbound rules, i* Computer (Kerberos V5J

Restrict communications to connections from domain-joined computers. Provides identity information for authorizing specific computers in inbound and outbound rules.

P Computer certificate

Restrict communications to connections from computers that have a certificate from this certification authority (CA).

V Only accept health certificates ( Advanced

Specify custom first and second authentication settings.

Learn more about authentication methods

< Back || Next> | Cancel |

FIGURE 4-16 Isolation rule authentication options .

FIGURE 4-16 Isolation rule authentication options .

Was this article helpful?

0 0
The Ultimate Computer Repair Guide

The Ultimate Computer Repair Guide

Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.

Get My Free Ebook


Post a comment