Wireless network - stop laptops from auto-connecting

Posted on 2006-04-19
Last Modified: 2008-01-09
Hello, I am trying to create a network wide policy to stop our laptops from auto-connecting to the wireless networks they encounter.

In windows, by default, when you connect to a new wireless network that network is placed in your "preferred network" list and is set to auto-connect when in range.

A user must then go into the configuration of this wireless network, go to advanced settings, click the properties button then the connection tab in order to remove the checkmark from "connect when this network is in range" in order to stop their laptop from auto-connecting when a network on their list is in range.

I would like to make every network on their list "On Demand". I have looked into using a GPO but there is no setting for making all or even specific networks "On Demand" using a GPO.

Any help would be appreciated.
Question by:Agrion
    LVL 6

    Accepted Solution

    There is a node for Wireless Network Policies in there, but you must be actually on the domain controller to see it.  It's under...

    Computer Configuration/Windows Settings/Security Settings/Wireless Network (IEEE 802.11) Policies

    Honestly I'm not sure this'll solve your problem because I haven't tried it.  But right off the top of my head you could try setting that policy up, then leaving the preferred networks lists blank and see what happens.

    LVL 48

    Assisted Solution

    Hi Agrion,

    agreed - but once a policy is enforced to use a wireless network, i am fairly certain that it locks the other networks out - specify a preffered network and make sure the tickbox under the settings in the GPO isnt ticked for auto connect to non preffered - see how you go with that


    Featured Post

    Better Security Awareness With Threat Intelligence

    See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

    Join & Write a Comment

    Greetings, Experts! First let me state that this website is top notch. I thoroughly enjoy the community that is shared here; those seeking help and those willing to sacrifice their time to help. It is fantastic. I am writing this article at th…
    Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    733 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    25 Experts available now in Live!

    Get 1:1 Help Now