Unfortunately ARP poisoning can be done without being connected to the network which the host is connected to.
My WIFI network is MFP protected and it will take eons to brick the password as it is encrypted.
Even if the intent of the ARP spoofing is to force a disconnection like the deauth procedure to sniff the connection handshake packets the password is encrypted and the work will be useless.
The problem is that the default Windows firewall rules are too weak, just as usual if compared to the Linux counterpart.
What I am asking is to create a Windows firewall rule which will block ARP spoofing generated with the same mac address that I have.