Netsh commands are available for some of the networking technologies, and the security issues for each technology are distinct. You can use the links provided to review security issues, considerations, and best practices for each . In addition, you can review the recommendations in Best practices for security.
Technology | Context name | Reference |
---|---|---|
Dynamic Host Configuration Protocol (DHCP) | netsh dhcp | Security information for DHCP |
Internet Authentication Service (IAS) | netsh aaaa | Security information for IAS |
Internet Protocol security (IPSec) | netsh ipsec | Security issues with IP |
Internet Protocol version 6 (IPv6) | netsh interface ipv6 and netsh interface portproxy | Security information for IPv6 |
Remote Access | netsh ras | Security considerations for remote access; Security information for VPN |
Routing | netsh routing | Security considerations for routing; Security information for VPN |
Transmission Control Protocol/Internet Protocol (TCP/IP) | netsh interface ip and netsh bridge | Internet Protocol security (IPSec); Best practices |
Windows Internet Name Service (WINS) | netsh wins | Security information for WINS |