
On the next screen make sure the action is highlighted as “Block” and click “Next”: When you’re done with that list you should have a screen which looks like the following, if you’re happy click “Next”: You will have to repeat the two steps above to add the following IP ranges, (the list below contains the one above by the way so you needn’t add it twice!): On the next popup we’ll want to add some IP ranges, so click on “This IP Range” and enter this as the range 0.0.0.1 – 9.255.255.255, just like this: This next screen is where we’re going to add the majority of our settings, under the “remote IP addresses” select “These IP addresses” and click “Add”: Leave the defaults as “Any” protocol and click Next: Leave the default as “All Programs” and click Next: In the box which pops up select a “Custom Rule” and then click Next:


On the panel on the right, right click and select “New Rule…”: Next navigate to Policies – Windows Settings – Security Settings – Windows Firewall with Advanced Security – Outbound Rules: Windows Firewall GPOĮdit your Group Policy as you usually would, and pick a pertinent OU to apply your new policy:Īnd then in the screen to the right edit the GPO you’ve just created: The Brief VersionĬreate a Windows Firewall policy and specify these IP address ranges in a BLOCK rule:Īnd create a non-existent proxy too for good measure and stop users from changing this setting. Hence why we are blocking all the non-private IP ranges, in other words we are blocking the entireity of IP addresses on the wider internet and not even specifying the private RFC 1918 and RFC 5735 ranges. You can apply this group policy to individual users or whole OUs as you see fit and will work well across all devices.īe wary though with Windows Firewall the order of rules doesn’t really matter, Block actions will take priority over Allow rules. If we didn’t do both then a proxy could exist on your network in the private IP ranges (which are allowed) and therefore have internet activity. These technologies come inbuilt with Windows. This tutorial suggests using Windows Firewall managed through Active Directory to block all internet IP addresses in additional to enforcing a non-existent proxy. Update – Thanks to Lou and Peter for pointing out the errors in the post which could conflict with DHCP operation. This method will work for some things, but the problem is not all software necessarily uses these settings to connect to the internet and doesn’t necessarily stop a determined user or bad guy.

There are plenty of tutorials out there detailing a way to block access is via enforcing a non-existent proxy. I’ve tested this on Windows 7 and Windows 10 and it works great! This how to will show you how to block internet access for a user, users or computer within an Active Directory Group Policy Object.
