For an environment isolated from the Internet, we recommend the Internet Connection Prohibited security settings.
These security settings enable you to implement basic security measures only. Because connectivity within an isolated network is prioritized, there are no limits on the use of information devices using conventional encryption/protocols.