1. Home
  2. Security Hardening
  3. CIS Microsoft Windows Server 2016 STIG DC L2 V1.1.0
  4. Ensure ‘Allow network connectivity during connected-standby (on battery)’ is set to ‘Disabled’

Ensure ‘Allow network connectivity during connected-standby (on battery)’ is set to ‘Disabled’

Details

This policy setting allows you to control the network connectivity state in standby on modern standby-capable systems.

The recommended state for this setting is: Disabled.

Rationale:

Disabling this setting ensures that the computer will not be accessible to attackers over a WLAN network while left unattended, on battery and in a sleep state.

Impact:

Network connectivity in standby (while on battery) is not guaranteed. This connectivity restriction currently only applies to WLAN networks only, but is subject to change (according to Microsoft).

Solution

To establish the recommended configuration via GP, set the following UI path to Disabled:

Computer ConfigurationPoliciesAdministrative TemplatesSystemPower ManagementSleep SettingsAllow network connectivity during connected-standby (on battery)

Note: This Group Policy path may not exist by default. It is provided by the Group Policy template Power.admx/adml that is included with the Microsoft Windows 10 Release 1607 & Server 2016 Administrative Templates (or newer).

Default Value:

Enabled. (Network connectivity will be maintained in standby while on battery.)

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management, Identification and Authentication.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles