1. Home
  2. Security Hardening
  3. CIS Microsoft Windows Server 2016 MS L2 V1.3.0
  4. Ensure ‘Allow network connectivity during connected-standby (plugged in)’ is set to ‘Disabled’

Ensure ‘Allow network connectivity during connected-standby (plugged in)’ is set to ‘Disabled’

Details

This policy setting allows you to control the network connectivity state in standby on modern standby-capable systems.

The recommended state for this setting is: Disabled.

Rationale:

Disabling this setting ensures that the computer will not be accessible to attackers over a WLAN network while left unattended, plugged in and in a sleep state.

Impact:

Network connectivity in standby (while plugged in) is not guaranteed. This connectivity restriction currently only applies to WLAN networks only, but is subject to change (according to Microsoft).

Solution

To establish the recommended configuration via GP, set the following UI path to Disabled:

Computer ConfigurationPoliciesAdministrative TemplatesSystemPower ManagementSleep SettingsAllow network connectivity during connected-standby (plugged in)

Note: This Group Policy path may not exist by default. It is provided by the Group Policy template Power.admx/adml that is included with the Microsoft Windows 10 Release 1607 & Server 2016 Administrative Templates (or newer).

Default Value:

Enabled. (Network connectivity will be maintained in standby while plugged in.)

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management, Identification and Authentication.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles