ANAVEM
Reference
Languagefr
How to Disable Wi-Fi When Ethernet is Connected Using Group Policy

How to Disable Wi-Fi When Ethernet is Connected Using Group Policy

Configure a Group Policy Object to automatically disable Wi-Fi connections when computers connect to wired Ethernet, preventing dual network connections and DNS conflicts in enterprise environments.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
March 17, 2026 15 min 6
mediumgroup-policy 9 steps 15 min

Why Automatically Disable Wi-Fi When Ethernet is Connected?

In enterprise environments, computers with both Wi-Fi and Ethernet capabilities often create dual network connections that cause significant problems. When both adapters are active simultaneously, Windows may route traffic unpredictably between the two interfaces, leading to DNS resolution conflicts, authentication issues, and degraded network performance. Users might unknowingly connect to unsecured guest Wi-Fi networks while still connected to the corporate network, creating security vulnerabilities and potential data leakage paths.

What Problems Does Dual Network Connection Cause?

Dual network connections create routing table conflicts where Windows cannot determine the optimal path for network traffic. This results in intermittent connectivity issues, slow response times, and failed authentication attempts to domain resources. DNS queries may be sent through the wrong interface, causing name resolution failures that appear as random application errors. Additionally, security policies become difficult to enforce when users can bypass corporate firewalls and content filters through alternative network paths.

How Does Group Policy Solve Wi-Fi Management Challenges?

Group Policy provides a centralized, automated solution that eliminates manual intervention and ensures consistent behavior across all domain-joined computers. The Windows Connection Manager policies introduced in Windows 10 specifically address dual connection scenarios by automatically prioritizing wired connections and disabling wireless adapters when Ethernet becomes available. This approach scales effectively across large organizations and provides administrators with granular control over network connection behavior without requiring individual computer configuration or user training.

Related: How to Execute PowerShell Scripts at Windows Startup Using

Related: How to Install Active Directory Domain Services on Windows

Related: How to Configure Automatic Session Lock via Group Policy in

Related: How to Customize Windows Login and Lock Screen Using Group

Implementation Guide

Full Procedure

01

Open Group Policy Management Console

Launch the Group Policy Management Console on your domain controller to begin creating the policy that will manage Wi-Fi behavior.

gpmc.msc

Navigate to your domain structure in the left panel. You'll see your domain name, followed by organizational units (OUs) where your computers are located.

Pro tip: If you don't have GPMC installed, add it through Server Manager > Add Roles and Features > Remote Server Administration Tools > Role Administration Tools > AD DS and AD LDS Tools.

Verification: The Group Policy Management window should open showing your domain forest structure with expandable nodes for each domain and OU.

02

Create and Link a New Group Policy Object

Create a dedicated GPO for managing Wi-Fi behavior. This keeps the policy organized and makes troubleshooting easier.

Right-click on the Organizational Unit containing your target computers and select Create a GPO in this domain, and Link it here. Name the GPO something descriptive like "Disable WiFi on Ethernet Connection".

For better targeting, configure Security Filtering to apply only to computers with Wi-Fi capabilities:

  1. Select your new GPO in the right panel
  2. Click the Scope tab
  3. Under Security Filtering, remove Authenticated Users
  4. Click Add and select specific computer groups or individual computers
Warning: Don't apply this policy to servers or computers without Wi-Fi adapters, as it may cause unnecessary processing overhead.

Verification: Your new GPO should appear under the selected OU with a link icon, and the Security Filtering should show your targeted computers or groups.

03

Navigate to Windows Connection Manager Settings

Edit the GPO to access the specific policy setting that controls network connection behavior.

Right-click your newly created GPO and select Edit. This opens the Group Policy Management Editor.

Navigate through the following path:

Computer Configuration
├── Policies
    ├── Administrative Templates
        ├── Network
            └── Windows Connection Manager

The Windows Connection Manager folder contains policies that control how Windows manages network connections, including the priority between wired and wireless connections.

You should see several policy settings in the right panel, including "Minimize the number of simultaneous connections to the Internet or a Windows Domain" which is the key setting we'll configure.

Verification: The right panel should display multiple policy settings related to connection management, with most showing "Not configured" status.

04

Configure the Primary Wi-Fi Disable Policy

Configure the main policy that automatically disables Wi-Fi when an Ethernet connection is established.

Double-click on Minimize the number of simultaneous connections to the Internet or a Windows Domain to open the policy configuration dialog.

Configure the policy as follows:

  1. Select Enabled radio button
  2. In the Options section, click the dropdown menu
  3. Select 3 = Prevent Wi-Fi when on Ethernet
  4. Click OK to save the configuration

This setting tells Windows to automatically disable Wi-Fi adapters when a wired Ethernet connection becomes active, preventing dual network connections that can cause routing conflicts.

Pro tip: Option 1 (Minimize simultaneous connections) is less aggressive and may allow brief dual connections. Option 3 provides the most reliable Wi-Fi disabling behavior.

The policy explanation shows: "This policy setting allows you to specify that computers should minimize the number of simultaneous connections to the Internet or to a Windows domain."

Verification: The policy should now show "Enabled" status and display "3 = Prevent Wi-Fi when on Ethernet" in the Setting column when you return to the main policy list.

05

Configure Additional Network Isolation Policy

Add a supplementary policy to prevent connections to non-domain networks when connected to domain-authenticated networks, providing additional network security.

In the same Windows Connection Manager folder, double-click Prohibit connection to non-domain networks when connected to domain authenticated network.

Configure this policy:

  1. Select Enabled
  2. Click OK

This policy works in conjunction with the primary setting to ensure that when users are connected to the corporate network via Ethernet, they cannot simultaneously connect to external Wi-Fi networks that might bypass security controls.

The policy description explains: "This policy setting prevents computers from connecting to both a domain based network and a non-domain based network at the same time."

Warning: This policy may prevent users from connecting to guest Wi-Fi networks while connected to corporate Ethernet. Consider your organization's requirements before enabling.

Verification: Both policies should now show "Enabled" status in the Windows Connection Manager policy list.

06

Apply and Force Group Policy Update

Close the Group Policy Management Editor and force an immediate policy update to test the configuration.

On the domain controller, open an elevated Command Prompt and run:

gpupdate /force

On target client computers, run the same command to immediately apply the new policy:

gpupdate /force

Alternatively, you can wait for the automatic Group Policy refresh cycle, which occurs every 90-120 minutes for client computers.

To verify policy application on client computers, run:

gpresult /r

Look for your GPO name in the "Applied Group Policy Objects" section under Computer Settings.

For detailed policy verification, use:

gpresult /h C:\GPResult.html

This creates an HTML report showing all applied policies and their settings.

Verification: The gpresult command should show your GPO listed under applied policies, and the HTML report should contain the Windows Connection Manager settings with your configured values.

07

Test Wi-Fi Automatic Disabling

Verify that the policy works correctly by testing the automatic Wi-Fi disabling behavior on a target computer.

On a test computer with both Wi-Fi and Ethernet capabilities:

  1. Ensure the computer is connected to Wi-Fi initially
  2. Connect an Ethernet cable to establish a wired connection
  3. Wait approximately 20-30 seconds for the policy to take effect
  4. Observe that the Wi-Fi connection automatically disconnects

Check the network status using PowerShell:

Get-NetAdapter | Where-Object {$_.Status -eq "Up"} | Select-Object Name, InterfaceDescription, LinkSpeed

This command shows only active network adapters. You should see only the Ethernet adapter listed when the cable is connected.

To monitor the connection changes in real-time, use:

Get-WinEvent -FilterHashtable @{LogName='System'; ID=10000} -MaxEvents 10 | Format-Table TimeCreated, Id, LevelDisplayName, Message -Wrap
Pro tip: Check Event Viewer under Windows Logs > System for network profile change events (Event ID 10000) to see detailed connection state changes.

Verification: When Ethernet is connected, only the wired adapter should show as "Up" status, and Wi-Fi should automatically show as "Disabled" or "Disconnected".

08

Configure Alternative Driver-Level Settings

For additional reliability or computers where GPO isn't sufficient, configure driver-level settings that provide hardware-based Wi-Fi disabling.

On target computers, access Device Manager:

devmgmt.msc

Navigate to Network adapters and locate the Wi-Fi adapter (usually contains "Wireless", "Wi-Fi", or "802.11" in the name).

Configure the adapter properties:

  1. Right-click the Wi-Fi adapter and select Properties
  2. Click the Advanced tab
  3. Look for a setting named "Disabled Upon Wired Connect" or similar
  4. If available, set the value to Enabled
  5. Click OK

Not all Wi-Fi adapters support this feature. Common adapters that do include Intel Wireless adapters and some Realtek models.

Warning: Driver-level settings are per-computer and won't be managed centrally. Use this as a supplement to GPO, not a replacement.

For adapters without this option, you can deploy a PowerShell script via GPO startup scripts:

# Check if Ethernet is connected and disable Wi-Fi
$ethernetAdapter = Get-NetAdapter | Where-Object {$_.MediaType -eq "802.3" -and $_.Status -eq "Up"}
$wifiAdapter = Get-NetAdapter | Where-Object {$_.Name -like "*Wi-Fi*" -or $_.Name -like "*Wireless*"}

if ($ethernetAdapter -and $wifiAdapter) {
    Disable-NetAdapter -Name $wifiAdapter.Name -Confirm:$false
}

Verification: Check Device Manager to confirm the "Disabled Upon Wired Connect" setting is enabled, or test the PowerShell script manually to ensure it properly detects and disables Wi-Fi when Ethernet is active.

09

Monitor and Troubleshoot Policy Application

Establish monitoring procedures to ensure the policy continues working correctly and troubleshoot any issues that arise.

Create a monitoring script to check policy compliance across multiple computers:

# Check GPO application status
$computers = Get-ADComputer -Filter "OperatingSystem -like '*Windows 10*' -or OperatingSystem -like '*Windows 11*'" | Select-Object -ExpandProperty Name

foreach ($computer in $computers) {
    if (Test-Connection -ComputerName $computer -Count 1 -Quiet) {
        $result = Invoke-Command -ComputerName $computer -ScriptBlock {
            gpresult /r | Select-String "Disable WiFi"
        }
        Write-Output "$computer: $result"
    }
}

Common troubleshooting steps for policy issues:

  1. Policy not applying: Verify GPO is linked to correct OU and security filtering includes target computers
  2. Delayed application: Run gpupdate /force and restart the computer
  3. Partial functionality: Check Windows version compatibility and ensure all Windows updates are installed

Use the Group Policy Results Wizard in GPMC for detailed troubleshooting:

  1. Right-click "Group Policy Results" in GPMC
  2. Select "Group Policy Results Wizard"
  3. Choose the target computer and user
  4. Review the generated report for policy application status
Pro tip: Set up a scheduled task to run the monitoring script weekly and email results to IT administrators for proactive policy compliance checking.

Verification: The monitoring script should show successful GPO application across target computers, and the Group Policy Results Wizard should display your Wi-Fi management policies as successfully applied with no errors.

Frequently Asked Questions

Does the Group Policy Wi-Fi disable setting work on Windows 11 24H2?+
Yes, the Windows Connection Manager policy setting works perfectly on Windows 11 24H2 and all current Windows versions as of 2026. The policy has been tested and confirmed compatible with Windows Server 2025 domain controllers managing Windows 10 and 11 clients. Microsoft has maintained this functionality consistently since Windows 10, with no reported compatibility issues in recent updates.
What happens if I set the policy to option 1 instead of option 3?+
Option 1 (Minimize simultaneous connections) is less aggressive and may allow brief periods where both Wi-Fi and Ethernet are active simultaneously. Option 3 (Prevent Wi-Fi when on Ethernet) provides immediate and complete Wi-Fi disabling when Ethernet connects. For enterprise environments requiring strict network control, option 3 is recommended to prevent any dual connection scenarios that could cause routing conflicts or security issues.
Can users manually re-enable Wi-Fi while Ethernet is connected after applying this policy?+
When the Group Policy is properly configured with option 3, users cannot manually re-enable Wi-Fi while Ethernet is connected. The policy continuously monitors network adapter states and automatically disables Wi-Fi whenever a wired connection is detected. However, users can still enable Wi-Fi immediately after disconnecting the Ethernet cable. This behavior ensures network security while maintaining user flexibility for legitimate wireless connectivity needs.
How long does it take for Wi-Fi to disable after connecting Ethernet cable?+
The Wi-Fi adapter typically disables within 20-30 seconds after establishing an Ethernet connection. This delay occurs because Windows needs to detect the new network connection, apply DHCP configuration, and then trigger the Group Policy enforcement. The exact timing depends on network infrastructure speed, DHCP response times, and computer performance. Some users may notice a brief period where both connections appear active before the policy takes effect.
What should I do if the Group Policy isn't working on some computers?+
First, verify the GPO is linked to the correct Organizational Unit containing the target computers and check security filtering to ensure the computers are included. Run 'gpupdate /force' on affected computers and restart them to force policy application. Use 'gpresult /r' to confirm the policy is being applied. Check that the computers are running supported Windows versions (Windows 10/11 Pro, Enterprise, or Education) and ensure they're properly joined to the domain with recent communication to domain controllers.
Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...