18.5.21.2 Ensure 'Prohibit connection to non-domain networks when connected to domain authenticated network' is set to 'Enabled'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

This policy setting prevents computers from connecting to both a domain based network and a non-domain based network at the same time.

The recommended state for this setting is: 'Enabled'.

Rationale:

The potential concern is that a user would unknowingly allow network traffic to flow between the insecure public network and the enterprise managed network.

Solution

To establish the recommended configuration via GP, set the following UI path to 'Enabled':

Computer Configuration\Policies\Administrative Templates\Network\Windows Connection Manager\Prohibit connection to non-domain networks when connected to domain authenticated network

Note: This Group Policy path may not exist by default.

It is provided by the Group Policy template 'WCM.admx/adml' that is included with the Microsoft Windows 8.0 & Server 2012 (non-R2) Administrative Templates (or newer).

Impact:

The computer responds to automatic and manual network connection attempts based on the following circumstances:

_Automatic connection attempts_ - When the computer is already connected to a domain based network, all automatic connection attempts to non-domain networks are blocked.

- When the computer is already connected to a non-domain based network, automatic connection attempts to domain based networks are blocked.

_Manual connection attempts_ - When the computer is already connected to either a non-domain based network or a domain based network over media other than Ethernet, and a user attempts to create a manual connection to an additional network in violation of this policy setting, the existing network connection is disconnected and the manual connection is allowed.

- When the computer is already connected to either a non-domain based network or a domain based network over Ethernet, and a user attempts to create a manual connection to an additional network in violation of this policy setting, the existing Ethernet connection is maintained and the manual connection attempt is blocked.

See Also

https://workbench.cisecurity.org/files/1933

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-4(21), CCE|CCE-35375-5, CSCv6|12

Plugin: Windows

Control ID: 4fa4889716f5a8498fbc2447730f97340f6ae1c289d1a1317e776d67330fd182