Server Isolation
Welcome to the Understand "Server Isolation" Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.
Already have an account? Sign In »

Introduction
Welcome to the Understand Server Isolation Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 - Create Isolation Policy Rule
- Exercise 2 -Test Isolation Policy Rule
After completing this lab, you will be able to:
- Create Isolation Policy Rule
- Understand connection security rules to secure network traffic
- Verify security association among devices with connection security rules enabled
- Test Isolation Policy Rule
- View network traffic between devices where connection security rules are in place
- How to turn off connection security rules
Exam Objectives
The following exam objectives are covered in this lab:
- Understand network isolation - server and domain isolation
Lab Duration
It will take approximately 45 minutes to complete this lab.
Exercise 1 - Create Isolation Policy Rule
Internet Protocol Security or IPsec is a stack of protocols that help to protect data traversing through a network by ensuring authentication, integrity, and encryption.
Before data is sent between two devices, IPsec authentication ensures that the identity of the devices is verified through the use certificates, authentication or passwords. IPsec signs data sent between devices to ensure that they were not modified meaning its integrity was intact while in transit. With encryption provided by IPsec, this means that the data can only be read by authorized devices in the network. Therefore, when an intruder listens to an IPsec-protected network all traffic between the hosts is protected.
Windows use connection security rules that combine IPsec and Windows Firewall with Advanced Security to simplify the rules and minimize conflicting policies and streamline the process of securing devices against unauthorized access.
When a connection security rule is created, it will enforce authentication between two computers before they can establish a connection and transmit data. IPsec is used by Windows to apply these rules.
One type of connection security rule is isolation. An isolation rule simply isolates computers by restricting connections on credentials such as domain membership. Isolation rules can be used to isolate servers and client workstations.
For this exercise, you will create local connection security rules on Windows 10 and Windows Server 2012 R2 to protect data packets by enforcing authentication between the two devices.
Exam Objectives
After completing this exercise, you will be able to:
- Create Isolation Policy Rule
- Understand connection security rules to secure network traffic
- Verify security association among devices with connection security rules enabled
Exercise 2 - Test Isolation Policy Rule
The connection security rules to use isolation have been successfully created in Windows 10 and Windows Server 2012 R2 devices. For this exercise, you will use a protocol analyzer called Microsoft Network Monitor to monitor network traffic between the two devices.
Learning Outcomes
After completing this exercise, you will be able to:
- PLABDC01 - Domain Controller (Windows Server 2012 R2)
- PLABWIN10 - Workstation (Windows 10 Enterprise)
See the full benefits of our immersive learning experience with interactive courses and guided career paths.