Contact us today!

Network Solutions Unlimited Blog

Tip of the Week: Changing Your Network Profile

Tip of the Week: Changing Your Network Profile

The Windows operating system has different settings for connecting to different networks. While this may seem like a minor detail, it actually can have considerable ramifications to your cybersecurity, not to mention that of your business. For this week’s tip, we’ll discuss how to use your network profile to stay secure, based on your situation.

Network Profile?
Each time a Windows 10 device connects to a new network, it will ask the user if it should be able to be discovered by other devices on that network. Selecting “Yes” will set your network profile to Private, and selecting “No” will set it to Public.

The Private and Public settings are referring to the kind of network your device is connecting to, and what level of security your individual device is responsible for. If you are connected to your company’s network, with all its protections and other users with whom you need to collaborate, the “Private” network setting is the one you want to use. However, if you’re using your device in a public setting, on a network that is “Public”-ally accessible, you don’t want any Tom, Dick, or Harry Hacker to be able to connect to you.

Switching the Network Profile
Windows 10 offers a few different methods of switching the network profile that a device uses. One way is to use the built-in Settings application.

From the Start menu, access the Settings application. Go to Network and Internet, and then select the kind of connection you have established from the left panel menu. If you’re physically connected to the network, select Ethernet, and if you’re using a wireless connection, select WiFi. Then, click on Network in the right panel. You can then switch between a Public network profile and a Private network profile.

Domain Networks
Alternatively, enterprise workplaces often leverage a third network profile - a domain network. Unlike the Private or Public profiles, only a network administrator can set its use, and it can only be applied while the device is in the workplace.

Want to know more about your network, or need more help managing it? Reach out to Network Solutions Unlimited at 217-428-6449.

Wireless Charging Just Got an Upgrade… But is That...
Could Your Router be Infected with Malware?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, November 21 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Computer Accessories Adobe Touchscreen Business Owner Managing Stress Testing Sales Device Security Content Filtering File Storage Passwords Managed IT Services PDF Managed Service Provider Business Continuity Information Saving Money Instant Messaging Laptop Remote Monitoring USB Comparison Admin Mobility Black Market Encryption Touchpad Update Saving Time Employee-Employer Relationship Collaboration Patch Management Cybercrime Data Loss Mobile Device Management Wasting Money Cortana Nanotechnology Training Wireless Technology Word Augmented Reality Monitors IT Solutions Applications Email User Tips Emergency Streaming Media Hiring/Firing Hard Disk Drive IT solutions Windows Compliance Workplace Tips Wi-Fi Malware Personal Information Bluetooth Business Management Software Vendor IT budget Virtualization Politics Windows 7 Operating System Experience Websites Automation Virtual Assistant iPhone IT Management MSP Printing Hardware Managed Service Microsoft Office Productivity Licensing How to File Sharing Emails Assessment Printers Internet Education Bandwidth BYOD Hosted Solutions Peripheral Travel Router Maintenance Google Maps FAQ Keyboard Shortcuts Spam Legal Computer Forensics intranet Upgrade Gamification Tip of the Week Colocation Monitoring HaaS Automobile Virtual Reality Physical Security Wireless Charging Computer Care Mobile Device Windows 10s Spyware Hackers Tech Support Worker Identities Data Miscellaneous Business Intelligence Commerce Disaster Recovery Internet of Things Users Cloud Computing Keyboard Shadow IT VPN Hacking Proactive Government Root Cause Analysis VoIP Congratulations Access Control Customer Big Data Computer Audit Outlook WIndows Server 2008 SaaS Entertainment Video Games Legislation Phishing Scalability Windows 10 Data Storage Identity Theft Redundancy Conferencing Business Administration Social Media Microsoft Excel Data Breach Meetings Blockchain Employer-Employee Relationship HBO Outsourced IT Social Engineering HIPAA iOS BDR WPA3 Proactive IT Downtime Alexa for Business Unsupported Software Hard Drives Server Identity Avoiding Downtime Analysis Sports Marketing Innovation Amazon CrashOverride Troubleshooting Public Cloud Communication Android Updates Sync Monitor Antivirus Worker Commute Cloud Telephone Chromecast Webinar Co-Managed Services PowerPoint Hard Drive Business Computing App store Tech Term Managed IT Services Going Green Microsoft Smartphone Cast Privacy Ciminal Firewall Tablets Excel Flexibility Samsung How To WannaCry Wireless Internet Law Enforcement eWaste Television Best Practices Windows 10 Apps Transportation IT Support Data Theft Holiday Recovery Quick Tips Lifestyle Health Budget Retail OneNote Artificial Intelligence Browser Application Cybersecurity Phone System Mobile Devices Language Managed IT Alert Data Backup App Backup Google Audiobook Network Data Privacy Hybrid Cloud Thank You Techology Mobile Security Windows Ink Software as a Service NFL Upgrades Advertising Data Management Cleaning Twitter Network Security Office Office 365 Work/Life Balance Smartphones Document Management Small Business Wireless Loyalty Internet Exlporer Financial Technology Utility Computing Productivity Telephone Systems Mobile Devices Office Tips Consultant IoT Spam Blocking Management Benefits IT Support Google Docs Relocation hacker Best Practice Project Management Financial Networking Professional Services Reputation Business Technology History Content Filter Google Assistant Memory Public Computer Chromebook Smart Technology Credit Cards Shortcut Two Factor Authentication Robot User Error Two-factor Authentication Data Protection Hosted Solution Files Rootkit Unified Threat Management Humor Security Save Money Dark Web Computing Infrastructure Battery Regulation Display Unified Communications Charger Internet exploMicrosoft Smart Tech Evernote Data Security Computing Value Risk Management Technology Settings Wasting Time Save Time Company Culture Apple Chrome Gifts Hyperlink Projects Connectivity Ransomware Books Bring Your Own Device Fraud Solid State Drive Virus Vulnerability Information Technology Electronic Medical Records Facebook Efficiency The Internet of Things IT Services End of Support Employer Employee Relationship Cache Gmail Screen Mirroring Money Scam Search Data Recovery Data storage Microsoft Word Managed IT Service Camera Computer Fan Communications Computers WiFi Password Private Cloud Workers Remote Computing Google Drive Edge Accessory Content Storage Safety Cost Management Specifications Vendor Management Gadgets Students