Admins can configure Windows devices so they only connect to designated wireless networks, but IT pros must consider how workers use devices before they impose such restrictions.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Today, it is very common for users to work from a variety of locations, and locking down the ability to connect to wireless access points can prevent users from working outside the office. Still, there are situations where IT might find it is appropriate to restrict access to specific wireless networks.
IT administrators can configure wireless access at the Group Policy level. Open the Group Policy Object Editor, and navigate through the console tree to Computer Configuration> Policies> Windows Settings> Security Settings> Wireless Network (IEEE 802.11) Policies. To create a wireless policy, right click on the Wireless Network (IEEE 802.11) Policies container and choose the option to create a new wireless network policy. This process is version specific, so the option name will vary from one version of Windows to another.
Creating a policy is a simple process. You will need to enter a name for the policy, and an optional description. After doing so, click the Add button and then enter the SSID for a wireless network. You can choose to allow or deny access to a network.
Windows 10 contains another Group Policy setting that is worth examining. This setting is located at Computer Configuration> Windows Settings> Administrative Templates> Network> WLAN Service> WLAN Settings. The name of the setting is Allow Windows to Automatically Connect to Suggested Open Hotspots, to Networks Shared by Contacts, and to Hotspots Offering Paid Services. This setting is not configured by default, but you can use it to prevent users from connecting to open hotspots.
An overview of Meraki access points
Best practices for network security
More ways to control wireless access with Group Policy
Related Q&A from Brien Posey
Edge computing is finding its place in the enterprise to handle data growth. IT may use that same advantage to help address problems in a VDI ...continue reading
A ghost image can be used to copy the contents of one server to another for backup, but the process of creating ghost images may not be as simple as ...continue reading
Backup and recovery trends, such as hybrid cloud data protection, are gaining popularity in the IT industry. Are these three major trends part of ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.