GPO - Only allow computers/users access who are on Domain

I am trying to setup a policy to restrict:-

Computers - only allow those that have joined the domain access to network/internet

Users - restrict access to network/internet to those only on Domain.

Not sure if this is possible on GPO - or 3rd party software is required.
Darrin CrawfordAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Alex GreenProject Systems EngineerCommented:
That would be done on a network level, wouldn't it?
Alex GreenProject Systems EngineerCommented:
Ah Radius, it's a radius server I believe you need.
Abhilash PappiyilTechnical Lead - Network SupportCommented:

GPOs are using to manage the AD joined computers and AD users. You will not be able to manage work group computers/users using GPOs. You may need to use proxy application or network devices for authorization to restrict network and internet access.

Acronis True Image 2019 just released!

Create a reliable backup. Make sure you always have dependable copies of your data so you can restore your entire system or individual files.

Most simple way to "fool" non-tech users, use your DHCP server to give out "normal" IP nr (with wrong DNS/gateway) to unknown MAC, have known PC's (domain joined) reserved by MAC with the correct DNS/gateway
Obviously, tech savvy ppl will compare IP info with "working" PC's to solve it.
But obviously, doesn't cost you a thing.
Alex GreenProject Systems EngineerCommented:

It can't be done with Active directory or group policy, what you're looking for is called NAC, Network access control. That talks to the radius server, matches up the machine GUID with the SSID of the computer account in AD and then it'll error lock the port if it doesn't match anything.

The other way is with MAC address databases, this has a massive admin overhead

There you go

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Alex GreenProject Systems EngineerCommented:
Another great link here

ISE is another way of doing it, I believe it superseded NAC
Mark BillExchange, AD, SQL, VMware, HPE, 3PAR, FUD, Anti MS Tekhnet, Pro EE, #1Commented:
Use network level/radius/3rd party programs to achieve this.
This can be done by AD group membership this way.
Alex GreenProject Systems EngineerCommented:
Well, you'll need an active directory reference point but it's still done on a network level.
Shaun VermaakTechnical SpecialistCommented:
Computers - only allow those that have joined the domain access to network/internet
You can block access to domain-joined resources with a GPO that sets an inbound Windows Firewall rule that only allows domain users and computers
Users - restrict access to network/internet to those only on Domain.
Can you configure LDAP authentication on your Internet gateway?
Alex GreenProject Systems EngineerCommented:
That won't stop people accessing the network and running things against it.
Shaun VermaakTechnical SpecialistCommented:
Hence why I said
domain-joined resources
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Windows Server 2012

From novice to tech pro — start learning today.