I search a way to prevent network access to devices not belonging to our corporate Active Directory domain.
Some people connect their personnal laptops to our corporate network, and some of them unintentionnally cause problems.
I aleady use a DHCP policy to give them a separate DNS name (aliens.contoso.com), allowing me to quickly see if such a device is connected (I just have a look at the DNS console). This policy is activated when the client does not belong to our contoso.com domain.
The problem with this method is: the unwanted laptop has perfectly corrects IP settings, so the user can use it.
This only allow to have a separate DNS name. I can't specify a different router or an unusable IP address.
We'd like to assign unusable IP settings to those laptops. So the users won't use it, or phone us. This will allow us to ensure the laptop is clean, and to give directions to the users.
Of course they can manually enter the correct settings, but few of our users can do that, and this will considerably reduce the problems.
I don't plan to enforce network access with 802.1X. I know the DHCP method is weaker.
I think we can do it with Network Protection Server (we use Windows 2012 R2 for our server), but I didn't understood how.