All Windows hosts, server and desktop, will attempt to update root certificates. There is a setting to prevent that specific communication.
https://woshub.com/updating-trusted-root-certificates-in-windows-10/#h2_2
Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication.
The Turn off Automatic Root Certificates Update option in this section allows you to disable automatic updating of root certificates through the Windows Update sites. By default, this policy is not configured and Windows always tries to automatically renew root certificates.
You can also use certutil to download the updated list of trusted root certificates, and store those locally in a path specified by Group Policy.
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn265983(v=ws.11)
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn265983(v=ws.11)#registry-settings-modified
Registry values:
HKLMSOFTWARE\Policies\Microsoft\SystemCertificates\AuthRoot!DisableRootAutoUpdate
A value of 1 disables the Windows AutoUpdate of the trusted CTL.
HKLM\SOFTWARE\Policies\Microsoft\SystemCertificates\AuthRoot!EnableDisallowedCertAutoUpdate
A value of 1 enables the Windows AutoUpdate of the untrusted CTL.
HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate!RootDirUrl
Configures the shared location (the HTTP or the FILE path).
Probably worth mentioning that this does not cover CRL/AIA access.