Monitor Connection Security Rules - Authentication

Applies To: Windows 7, Windows Server 2008 R2

This tab shows basic information about authentication methods used by a connection security rule that is applied to the computer.

To get to this tab

  1. In the Windows Firewall with Advanced Security MMC snap-in, expand Monitoring, and then expand Connection Security Rules.

  2. Double-click the rule you want to examine, and then select the Authentication tab.

Requirements

This refers to the authentication requirement on connections matching the rule criteria.

First authentication

The first and second authentication methods are used during the main mode phase of Internet Protocol security (IPsec) negotiations. For first authentication, you can view the way the two peer computers authenticate, such as through Kerberos version 5, NTLMv2, computer certificates, or another method.

The Details column displays information for certificates and preshared keys only. For certificates, it displays the issuer details, whether the certificate was issued by a root or intermediate certification authority (CA), and the certificate signing algorithm. For a preshared key, it displays the key in plain text.

The authentication information displayed can be configured on the Authentication tab of the Connection Security Rules Properties dialog box.

Second authentication

For second authentication, you can view the user authentication method, such as Kerberos version 5, NTLMv2, user certificates, or a computer health certificate.

The Details column displays information for certificates only. It displays the issuer details, whether the certificate was issued by a root or intermediate CA, and the certificate signing algorithm.

The authentication information that is displayed can be configured on the Authentication tab of the Connection Security Rules Properties dialog box.

Additional references