(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Tip of the Week: How to Manage Your Network Profiles

Tip of the Week: How to Manage Your Network Profiles

Your Windows computer has all kinds of different settings that let it connect to different networks. While this might not seem like major difference, it could have a drastic effect on your organization’s cybersecurity. This week’s tip is dedicated to helping you make sure that your network profile is as secure as possible.

What’s a Network Profile?
Every time a Windows 10 device connects to a new network, you’ll be asked if it should be discovered by other devices that are connected to the network. If you choose “Yes,” the network will be set to Private. If you choose “No,” it will be set to Public.

Private and Public settings are referred to the type of network that your device connects to, as well as what kind of security the device is responsible for. If you are connected to a company network, as well as all of its security measures and other users who collaborate, you’ll want to make sure it’s a Private network setting. If it’s a public device that is “publicly” accessible, you’ll be placed at more risk of a hacking attack.

Changing the Network Profile
Windows 10 provides your organization a few ways to change your device’s network profile. You can use the built-in Settings application to do this.

From the Start menu, access the Settings application. Next, you have to go to Network and Internet. Select the kind of connection that your device will be connected to from the left panel menu. If you are using a physical network connection, choose Ethernet. If you’re using a wireless router to access the network wirelessly, click on Wi-Fi. Once you’ve done this, click on Network in the right panel. You can choose to select either a Public or a Private network profile here.

Domain Networks
Enterprise workstations can also take advantage of a third network profile--the domain network option. Only a network administrator can set its use, making it distinctly different from the traditional Private or Public profiles. It can only be set, and accessed, while the device is in the workplace itself.

Does your business need a hand with managing its network settings? Give OnSite I.T. a call at (403) 210-2927.

Your Network is at Threat from the Inside, Too
How Alexa Can Become Your Most Valuable Employee


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, September 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Tech Term Privacy Smartphones Network Security Cybersecurity Malware Hardware Internet Passwords Cloud Managed IT services Ransomware Google Wi-Fi Microsoft Hosted Solutions Communication Data Communications User Tips Android Social Media Productivity Efficiency Mobile Devices IT Support Blockchain Email Small Business Software Browser Collaboration Business Intelligence Network Innovation Applications Business Management Backup Saving Money Employer-Employee Relationship Business Patch Management Data Breach Cost Management VPN Excel Wireless Virtualization Gmail Mobile Device BDR Router VoIP Cloud Computing Remote Computing Outsourced IT Save Money Data recovery Computer Internet of Things Government Managed IT Service Data Management Compliance Computers Wireless Charging Automation Cortana Analytics Tech Terms Marketing Networking Hackers Artificial Intelligence Data Backup Data Protection IT Services Smartphone Virtual Assistant Phishing Windows 10 Bandwidth Information PowerPoint Medical IT Vulnerability Staff Bring Your Own Device Operating System Internet Explorer Analysis RAM Authorization Laptop SSD Spam Sales Settings Trends Edge eCommerce Database Amazon Hard Drives Comparison Sports SaaS Spyware Chrome Environment Hybrid Cloud IT Management Threat Managed Service WannaCry Telecommute How To Microsoft Teams Facebook Tablet Workplace Tips Battery Server Management Server A.I. Touchscreen User Security Cybercrime Specifications GDPR HP Websites e-waste Cables Printing HIPAA Data loss Apple Telecommuting Company Culture Twitter Knowledge Tactics Plug-In Apps Safety Managed IT Services Movies Microsoft Office 365 Technology Tips Conferencing Connectivity Storage Document Management Law Enforcement Telephony disposal Voice over Internet Protocol Paper Hard Drive Virus iPhone Microsoft Office Workers Managing Stress IT budget Inventory Gadgets Proactive IT Lead Generation Tip of the week Access Control Business Technology Online Shopping Network Attached Storage Office Streaming Media Dark Web Paperless Office Dongle Big Data Voice over IP Value Users Ink Reporting Processors Antivirus Office 365 Millennials G Suite Mobile Security Maintenance Remote Monitoring and Management Machine Learning Miscellaneous User Tip Unified Communications Authentication Physical Security Backup and Disaster Recovery Password Content Filtering Downloads Error Digital File Sharing Holiday Remote Monitoring Domains Mobile Device Management Windows 10 Disaster Recovery Public Speaking Presentation Quick Tips Search Two-factor Authentication Lithium-ion battery Printers Augmented Reality Wireless Technology 5G Tech Support IBM Hacker The Internet of Things Productivity Budget Regulation Managed Service Provider Alert Competition Customer Relationship Management Hiring/Firing IP Address Website Fun Customer Service Mobile Office Upgrade