This GPO does not solve the problem! You will continue to see mDNS traffic.
This person has created an extensive and helpful solution https://f20.be/blog/mdns
It involves setting a registry setting and mDNS parameters.
I've applied a GPO to disable mDNS. I've double-checked the GPO on the local client. The GPO is correct and applied to Computer settings.
Turn off smart multi-homed name resolution - enabled
Turn off multicast name resolution - enabled
I've also checked the TCP/IP WINS settings disable NetBT so no NetBIOS over TCP/IP. I've disabled this on both network adapters Wired and Wireless. I've removed IPv6 as it's not needed.
When I use Wireshark and ping bob.local I can see MDNS traffic. Why is this protocol still working !!!!
I've used this URL as a reference and have disabled and checked all settings according to this article, even checking the registry!!
http://woshub.com/how-to-disable-netbios-over-tcpip-and-llmnr-using-gpo/
I need to fully disable this protocol per our InfoSec Dept.
Hello,
If editing the JSON file is the only solution, is there any examples of the modification? Is there any impact to the user when deploying this modified JSON file or PS setting?