Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Contact
  • Reviews
  • Toggle search form
Home » Windows Server » Block IP Addresses Using Group Policy (GPO) in Active Directory

Block IP Addresses Using Group Policy (GPO) in Active Directory

Posted on 19/11/202420/11/2024 Matthew By Matthew No Comments on Block IP Addresses Using Group Policy (GPO) in Active Directory
How to Block IP Addresses Using Group Policy (GPO) in Active Directory
How to Block IP Addresses Using Group Policy (GPO) in Active Directory

Blocking specific IP addresses using Group Policy can be helpful when you want to restrict internet access or control network traffic on certain devices in an Active Directory environment. This guide will walk you through how to block IP addresses using Group Policy (GPO) in Active Directory by creating a Group Policy Object (GPO) that uses the Windows Firewall and a proxy configuration to prevent access to external IP addresses. Please see, Restrict IP Address Range on Windows PC and How to Remove Bing Chat Button from Edge Sidebar..

This method ensures security across Windows-based devices and minimizes potential gaps in network restrictions.

Also, see How to Fix Microsoft Edge Not Responding on Windows 11, Remove clickable icons from the Edge browser, and how to Reload all Microsoft Edge Browser Tabs, How to Perform a Reverse Image Search on Your Browsers,

Why Block IP Addresses?

Blocking IP addresses is useful for several reasons, including how to block IP addresses using Group Policy.

  • Restricting Internet Access: Sometimes, you may want to block internet access on specific devices or for particular users.
  • Enhanced Security: Prevent unauthorized traffic from reaching external networks by restricting IP ranges.
  • Traffic Control: Simplify network management by controlling traffic flow to and from your internal network.

This setup has been tested on Windows 7 and Windows 10, but it should work well across various Windows versions.

Setting Up IP Blocking with Windows Firewall

To create a policy that effectively blocks external IP addresses, we’ll use the Windows Firewall with Advanced Security settings through Group Policy to demonstrate how the GPO can be configured.

Step 1: Create a New Group Policy Object (GPO)

Launch the GPMC on your domain controller.

How to Block IP Addresses Using Group Policy (GPO) in Active Directory: Launch group policy management console
Launch group policy management console

Right-click the Organizational Unit (OU) where you want the policy applied and select Create a GPO in this domain, and Link it here.

How to Block IP Addresses Using Group Policy (GPO) in Active Directory: Create a new GPO
Create a new GPO

Give it a meaningful name, such as “Block External IPs” for easy identification.

How to Block IP Addresses Using Group Policy (GPO) in Active Directory: Enter GPO name
Enter GPO name

Step 2: Set Up the Windows Firewall Block Rules

Right-click on your new GPO and select Edit. This is a critical step in how to block IP addresses using Group Policy (GPO) in Active Directory.

How to Block IP Addresses Using Group Policy (GPO) in Active Directory: Edit GPO
Edit GPO

Go to Computer Configuration > Policies > Windows Settings > Security Settings > Windows Firewall with Advanced Security.

How to Block IP Addresses Using Group Policy (GPO) in Active Directory: Select Windows Firewall with Advanced Security
Select Windows Firewall with Advanced Security

Right-click on Outbound Rules and select New Rule.

Create new outbound rule
Create new outbound rule

Choose Custom as the rule type and click Next.

Select custom rule
Select custom rule

Leave the default All Programs selected and click Next.

Choose all programs
Choose all programs

Leave the protocol setting at Any and click Next.

Leave the default option
Leave the default option

On the Which remote IP addresses does this rule apply to? screen, select These IP addresses.

List IP Addresses
List IP Addresses

Click Add, then choose This IP address range.

Enter IP address range
Enter IP address range

Enter the IP range you want to block one at a time. For example, these ranges cover external, non-private IPs:

  • 0.0.0.1 – 9.255.255.255
  • 11.0.0.0 – 126.255.255.255
  • 128.0.0.0 – 169.253.255.255
  • 169.255.0.0 – 172.15.255.255
  • 172.32.0.0 – 192.167.255.255

Repeat this for each range until all are added and click Next.

Confirm IP addresses
Confirm IP addresses

Set the rule to Block the connection and click Next.

Block connection
Block connection

On the profile screen, you can leave all profiles checked (Domain, Private, and Public) and click Next.

Select all profile
Select all profile

Give this rule a descriptive name, like “Block External IPs” or “Internet Block Rule,” and click Finish.

Apply the settings
Apply the settings

Verifying the Configuration

After implementing the GPO to block IP addresses, test it to confirm that it’s working as expected. Restart a client machine in the target OU, then try to access an external IP. It should be blocked.

You can verify that the firewall is actively blocking traffic to external IP ranges by viewing the logs. Enable firewall logging if necessary through Windows Firewall with Advanced Security settings.

Conclusion

By following these steps, you can effectively restrict internet access and control network traffic through a well-structured Group Policy Object in Active Directory.

This setup uses the Windows Firewall for enhanced security, ensuring that users cannot easily bypass the blocks you’ve put in place.

I hope you find this post helpful on how to block IP addresses using Group Policy (GPO) in Active Directory. If you have any questions, feel free to leave them in the comment section below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Network | Monitoring, Windows Server Tags:IP Address, Microsoft Windows

Post navigation

Previous Post: How to Create a User and Custom Domain in Entra ID
Next Post: How to create Microsoft 365 Account

Related Posts

  • mountedimagenotaccessible
    Unable to access the image: Make sure that the image path exist Windows
  • Configure Data Deduplication on Windows Server
    Video on how to Configure Data Deduplication on Windows Server Windows Server
  • WinRM and Kerberos Delegation troubleshooting
    Troubleshooting WinRM and Kerberos Delegation for WAC Network | Monitoring
  • 1 kajkbmlyehn0inifwrh 8w
    How to install Kerberos packages with Cygwin on Windows Windows Server
  • qAS
    How to disable the Microsoft Deployment Toolkit Task Sequence property sheet Windows Server
  • How to disable web console in Cisco switches Network | Monitoring

More Related Articles

mountedimagenotaccessible Unable to access the image: Make sure that the image path exist Windows
Configure Data Deduplication on Windows Server Video on how to Configure Data Deduplication on Windows Server Windows Server
WinRM and Kerberos Delegation troubleshooting Troubleshooting WinRM and Kerberos Delegation for WAC Network | Monitoring
1 kajkbmlyehn0inifwrh 8w How to install Kerberos packages with Cygwin on Windows Windows Server
qAS How to disable the Microsoft Deployment Toolkit Task Sequence property sheet Windows Server
How to disable web console in Cisco switches Network | Monitoring

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • Featured image  Install new fonts
    How to install new fonts in Microsoft Office Windows
  • How to Manage Azure Virtual Machines with Windows Admin Center and Serial Console​
    Manage Azure Virtual Machine with Windows Admin Center and Serial Console AWS/Azure/OpenShift
  • no pg hba
    Resolve “no pg_hba.conf entry for host on PostgreSQL Oracle/MSSQL/MySQL
  • https   blogs images.forbes.com jasonevangelho files 2018 06 windows 7 2018 edition 1200x676 1
    Windows deployment cannot continue, the operating system is missing via MDT deployment Windows Server
  • Featured image Microsoft Outlook
    How to Recall an Email in Microsoft Outlook Network | Monitoring
  • 7164 1024x575 1
    How to install MDT PowerShell module on Windows Scripts
  • ADDS vs AD LDS
    Differences between AD LDS and AD DS Windows
  • settings app not working featured 800x400 1
    How to search through the Windows registry Windows Server

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,814 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive