[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Restricting wireless adapter to only connect to office wireless

Posted on 2013-12-03
6
Medium Priority
?
740 Views
Last Modified: 2013-12-05
I've got a surface RT tablet that I do not want my end users hitting any wireless unless it's MY wireless here at work.  It's not the Surface Pro, so I cannot join it to the domain and use GPO to restrict connections.  How would I do it locally?  Inside the windows firewall?  In local security policy?
0
Comment
Question by:melissasfarris
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points
ID: 39695128
May want to consider use of netsh to create profile to specific ssid and interface no. Also add filter...

http://technet.microsoft.com/en-us/library/dd744890(v=ws.10).aspx#bkmk_wlanAddFilter

Maybe something like ...


netsh wlan add filter permission=denyall networktype=infrastructure
netsh wlan set blockednetworks display=hide
netsh wlan add filter permission=allow ssid=My_SSID networktype=infrastructure
netsh wlan add filter permission=allow ssid=My_SSID_G networktype=infrastructure
 
Supposedly all other nearby wireless networks are blocked and hidden while still able to connect to allowed networks, the only ones listed in the available networks list
0
 

Author Comment

by:melissasfarris
ID: 39697067
Thank you Breadtan, that looks to be working!  Except, that I put line 3 in first, then line 1 and 2.

Now, because I need to know this, how would I UNDO this restriction?  Btw, thank you for the exact syntax with no typos!!!
0
 
LVL 65

Expert Comment

by:btan
ID: 39697085
Can try deleting the filter

netsh wlan delete filter permission={allow|block|denyall} ssid=NETWORKNAME networktype={infrastructure|adhoc}

Then check filter by

netsh wlan show filters
0
Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

 

Author Comment

by:melissasfarris
ID: 39697094
I will test that tomorrow!
0
 

Author Comment

by:melissasfarris
ID: 39698464
By the way, I meant to mention in my earlier comments that in order to do ALLLL of this, when I ran the command prompt, I had to "run as administrator".  Even logged on as admin, it doesn't work unless you do this.

Ok, so to ultimately delete the filter and the networks I'd added to the allow list, this is what finally worked:

netsh wlan delete filter permission=denyall networktype=infrastructure
netsh wlan delete filter permission=allow ssid=My_SSID networktype=infrastructure
netsh wlan delete filter permission=allow ssid=My_SSID_G networktype=infrastructure

Then I used the:

netsh wlan show filters

And I see that these commands have put me back to normal.  I can see all wireless.

So now I can get this exactly how I need it, and I thank you!  Resolved!
0
 
LVL 65

Expert Comment

by:btan
ID: 39698531
Thanks for sharing!
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
In this article, we’ll look at how to deploy ProxySQL.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question