Prohibit connection to non-domain networks when connected to domain authenticated network

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

This policy setting prevents computers from connecting to both a domain based network and a non-domain based network at the same time.

If this policy setting is enabled the computer responds to automatic and manual network connection attempts based on the following circumstances:

Automatic connection attempts
- When the computer is already connected to a domain based network all automatic connection attempts to non-domain networks are blocked.
- When the computer is already connected to a non-domain based network automatic connection attempts to domain based networks are blocked.

Manual connection attempts
- When the computer is already connected to either a non-domain based network or a domain based network over media other than Ethernet and a user attempts to create a manual connection to an additional network in violation of this policy setting the existing network connection is disconnected and the manual connection is allowed.
- When the computer is already connected to either a non-domain based network or a domain based network over Ethernet and a user attempts to create a manual connection to an additional network in violation of this policy setting the existing Ethernet connection is maintained and the manual connection attempt is blocked.

If this policy setting is not configured or is disabled computers are allowed to connect simultaneously to both domain and non-domain networks.

Solution

Policy Path: Network\Windows Connection Manager
Policy Setting Name: Prohibit connection to non-domain networks when connected to domain authenticated network

See Also

https://blogs.technet.microsoft.com/secguide/2017/10/18/security-baseline-for-windows-10-fall-creators-update-v1709-final/

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-4(21), CSCv6|12

Plugin: Windows

Control ID: 620dccb0e6c15733ca614922a44b805391c01499d322a447b20cbbdf9b23b0dc