Windows OS Hub
  • Windows Server
    • Windows Server 2016
    • Windows Server 2012 R2
    • Windows Server 2012
    • Windows Server 2008 R2
    • SCCM
  • Active Directory
    • Group Policies
  • Windows Clients
    • Windows 10
    • Windows 8
    • Windows 7
    • MS Office
    • Outlook
  • Virtualization
    • VMWare
    • Hyper-V
  • PowerShell
  • Exchange
  • Home
  • About

Windows OS Hub

  • Windows Server
    • Windows Server 2016
    • Windows Server 2012 R2
    • Windows Server 2012
    • Windows Server 2008 R2
    • SCCM
  • Active Directory
    • Group Policies
  • Windows Clients
    • Windows 10
    • Windows 8
    • Windows 7
    • MS Office
    • Outlook
  • Virtualization
    • VMWare
    • Hyper-V
  • PowerShell
  • Exchange

 Windows OS Hub / Windows 8 / Filtering Available WiFi Networks in Windows 8

August 21, 2014 Windows 8

Filtering Available WiFi Networks in Windows 8

Today we’ll demonstrate how to manage white/black lists of the WiFi networks and allow/restrict user access to them without using complex group policy objects.

To manage the list of available WiFi networks, we’ll use the feature of WLAN filtering in netsh (other examples of using netsh in Windows to manage wireless networks can be found in this article).

Note. All these operations are performed with local administrator privileges. It also means that if the administrator of the computer has restricted access to certain Wi-Fi networks, a standard user cannot change this behavior.

Filtering a list of available Wi-Fi networks is based on the concepts white and blacklist SSID of WiFI networks.

Note. SSID (Service Set Identifier) is a unique name for the wireless network, the one that you see in the list of available WiFi networks when viewing the wireless environment. This name is specified in the settings of the WiFi access point, its maximum length is 32 characters, and it is case-sensitive.

list of wifi networks in Windows 8

Let’s consider two basic scenarios of WiFi network filtering:

  1. Task: to hide all WiFi networks except permitted ones from the user
  2. Task: to hide only certain WiFi (for example, open or unprotected) networks

The first scenario suggests that we need to configure Windows 8 so that the system sees only those WiFi networks that the administrator has specified (all other networks should be locked and hidden from the user). To implement this scenario:

  1. Run the command line as an administrator
  2. Create a new filter, specifying the SSID of the network, which should be available for connection in the WiFi network list (white list):
    1
    
    netsh wlan add filter permission=allow ssid="SSID-of-White-Network" networktype=infrastructure

    netsh wlan add filter permission=allow ssid="SSID-of-White-Network" networktype=infrastructure

    Note. The similar commands can be used to add SSIDs of all permitted WiFi networks, which a user computer should see, to the white list.
  3. The following command will also forbid displaying all the other ones (usually untrusted WiFi networks):
    1
    
    netsh wlan add filter permission=denyall networktype=infrastructure

    netsh wlan add filter permission=denyall networktype=infrastructure

    windows8 add ssid of wifi network to white list

Let’s consider the second scenario when we need to hide SSIDs of certain WiFi networks from the user. To do it:

  1. Run cmd as administrator
  2. For each of the WiFi networks that we want to hide, run the following command:
    1
    
    netsh wlan add filter permission=block ssid="SSID-of-Black-Network" networktype=infrastructure

    netsh wlan add filter permission=block ssid="SSID-of-Black-Network" networktype=infrastructure

The list of the applied filters can be obtained with the command:

1
netsh wlan show filter

netsh wlan show filter

list applied wifi filters

In our case, we can see that there are two custom filters used: one network is added to the Allow List and the other one – to the Block List.

To remove an SSID of a WiFi network from the block list:

  1. Run the command
    1
    
    netsh wlan set blockednetworks display=show

    netsh wlan set blockednetworks display=show

  2. After the previous command is executed, all Wi-Fi networks blocked with this filter appear in the list with a small cross icon (this means that the network is blocked).hidden wifi networks
  3. Remove this network from the black list:
    1
    
    netsh wlan delete filter permission=block ssid=NETGEAR2b networktype=infrastructure

    netsh wlan delete filter permission=block ssid=NETGEAR2b networktype=infrastructure

  4. Disable the display of hidden wireless networks:
    1
    
    netsh wlan set blockednetworks display=hide

    netsh wlan set blockednetworks display=hide

To remove all applied Wi-Fi filters, run the following command:

1
netsh wlan delete filter permission=denyall networktype=infrastructure

netsh wlan delete filter permission=denyall networktype=infrastructure

remove wifi filter win 8

If the command is successful, the following message appears:

1
The filter is removed from the system successfully.

The filter is removed from the system successfully.

There’s an interesting feature – if the computer administrator uses filters to restrict user access to wireless networks, a standard PC user can view a list of all currently available wireless networks with the command:

1
netsh wlan set blockednetworks display=show

netsh wlan set blockednetworks display=show

Blocked networks will be marked with a red “x” icon and you won’t be able to connect to them.

The described above filtering techniques to access Wi-Fi networks also work in Windows 7/Vista.

0 comment
0
Facebook Twitter Google + Pinterest
previous post
Additional Account Info Tab in AD Users And Computers Console
next post
How to Create a 4GB Windows 8.1 x64 Bootable USB Flash Drive

Related Reading

How to Restore Deleted EFI System Partition in...

July 29, 2020

Internal SSD/SATA Drive Shows as a Removable in...

December 16, 2019

0x80092004: .NET Framework Install Error on Windows Server

September 16, 2019

Fix: The Local Print Spooler Service Not Running...

July 9, 2019

Resetting Windows Update Agent Settings

May 31, 2019

Leave a Comment Cancel Reply

Categories

  • Active Directory
  • Group Policies
  • Exchange
  • Windows 10
  • Windows 8
  • Windows 7
  • Windows Server 2016
  • Windows Server 2012 R2
  • Windows Server 2008 R2
  • PowerShell
  • VMWare
  • MS Office

Recent Posts

  • Accessing USB Flash Drive from VMWare ESXi

    February 26, 2021
  • How to Sign a PowerShell Script (PS1) with a Code Signing Certificate?

    February 25, 2021
  • Change the Default Port Number (TCP/1433) for a MS SQL Server Instance

    February 24, 2021
  • How to Shadow (Remote Control) a User’s RDP session on RDS Windows Server 2016/2019?

    February 22, 2021
  • Configuring PowerShell Script Execution Policy

    February 18, 2021
  • Configuring Proxy Settings on Windows Using Group Policy Preferences

    February 17, 2021
  • Updating Group Policy Settings on Windows Domain Computers

    February 16, 2021
  • Managing Administrative Shares (Admin$, IPC$, C$, D$) in Windows 10

    February 11, 2021
  • Packet Monitor (PktMon) – Built-in Packet Sniffer in Windows 10

    February 10, 2021
  • Fixing “Winload.efi is Missing or Contains Errors” in Windows 10

    February 5, 2021

Follow us

woshub.com
  • Facebook
  • Twitter
  • RSS
Popular Posts
  • How to Create a 4GB Windows 8.1 x64 Bootable USB Flash Drive
  • Access to more than 4GB of RAM on 32bit Windows 8 (x86)
  • Fix: Windows Modern Apps Don’t Work Over VPN Connection
  • How to Hide a Windows Service from Users
  • Activation of Data Deduplication in Windows 8.1
  • How to create a UEFI bootable USB flash drive for install Windows 8 / Server 2012
  • Windows 8 / 2012 Fix: “Failure configuring Windows updates. Reverting changes”
Footer Logo

@2014 - 2018 - Windows OS Hub. All about operating systems for sysadmins


Back To Top