Network connection established

Network Connection Trigger

Trigger Network Connection allows monitoring and managing access to wireless networks. The user can define rules regarding the types of networks that are allowed to connect to, as well as the configuration of exceptions, ensuring a high level of security for network connections.

Trigger configuration

1

Network Type

The user can specify the types of networks to be monitored by selecting one or both options:

  • Open: Networks without security that do not require a password or other authentication mechanisms.

  • Secured: Networks that require a password or use security mechanisms (e.g., WPA2, WPA3).

Operating principle:

  • If only the “Open” option is selected, the rule actions will apply exclusively to connections to unsecured networks.

  • If both options are selected, the rule will cover both open and secured networks.

2

Network Masks

Configuration of network masks operates analogously to process, path, and file masks:

  • Network mask: Specifying networks to be monitored. You can indicate specific SSIDs or their patterns (e.g. Hotel_WiFi, HomeNetwork_*).

  • Excluded network mask: Defining networks that will be ignored by the monitoring system (e.g. Trusted_Network, OfficeWiFi).

Example of use

Objective: Protection against connecting to unsecured networks while working remotely or on assignment.

  • Configuration:

    • Network type: Check “Open”.

    • Masks: Exclude corporate Wi‑Fi networks (OfficeWiFi), to allow connection only to them.

  • Effect:

    • Users will not be able to connect to unsecured networks (e.g., in hotels or airports).

    • Connection to corporate networks will remain available.

Summary

Trigger Network Connection provides effective monitoring and management of access to wireless networks. With the ability to choose network types, SSID masks, and define exceptions, this tool helps organizations enforce security and data protection policies when using Wi‑Fi connections.

Last updated

Was this helpful?