18.7.1.1 (L2) Ensure 'Turn off notifications network usage' is set to 'Enabled'

Information

This policy setting blocks applications from using the network to send notifications to update tiles, tile badges, toast, or raw notifications. This policy setting turns off the connection between Windows and the Windows Push Notification Service (WNS). This policy setting also stops applications from being able to poll application services to update tiles.
The recommended state for this setting is: Enabled.

Rationale:
Windows Push Notification Services (WNS) is a mechanism to receive 3rd-party notifications and updates from the cloud/Internet. In a high security environment, external systems, especially those hosted outside the organization, should be prevented from having an impact on the secure workstations.

Solution

To establish the recommended configuration via GP, set the following UI path to Enabled:
Computer Configuration\Policies\Administrative Templates\Start Menu and Taskbar\Turn off notifications network usage
Note: This Group Policy path may not exist by default. It is provided by the Group Policy template WPN.admx/adml that is included with the Microsoft Windows 8.0 & Server 2012 (non-R2) Administrative Templates (or newer).

Impact:
Applications and system features will not be able receive notifications from the network from WNS or via notification polling APIs.

Default Value:
Disabled.

See Also

https://workbench.cisecurity.org/files/2754

Item Details

Category: CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|CM-8, 800-53|SI-4, CSCv7|9.2, CSCv7|9.3, CSCv7|13.1

Plugin: Windows

Control ID: ea67833761406645045159f0b33e764e082e9df85db617469141205075acb489