Contact us today!

Network Solutions Unlimited Blog

Tip of the Week: Changing Your Network Profile

Tip of the Week: Changing Your Network Profile

The Windows operating system has different settings for connecting to different networks. While this may seem like a minor detail, it actually can have considerable ramifications to your cybersecurity, not to mention that of your business. For this week’s tip, we’ll discuss how to use your network profile to stay secure, based on your situation.

Network Profile?
Each time a Windows 10 device connects to a new network, it will ask the user if it should be able to be discovered by other devices on that network. Selecting “Yes” will set your network profile to Private, and selecting “No” will set it to Public.

The Private and Public settings are referring to the kind of network your device is connecting to, and what level of security your individual device is responsible for. If you are connected to your company’s network, with all its protections and other users with whom you need to collaborate, the “Private” network setting is the one you want to use. However, if you’re using your device in a public setting, on a network that is “Public”-ally accessible, you don’t want any Tom, Dick, or Harry Hacker to be able to connect to you.

Switching the Network Profile
Windows 10 offers a few different methods of switching the network profile that a device uses. One way is to use the built-in Settings application.

From the Start menu, access the Settings application. Go to Network and Internet, and then select the kind of connection you have established from the left panel menu. If you’re physically connected to the network, select Ethernet, and if you’re using a wireless connection, select WiFi. Then, click on Network in the right panel. You can then switch between a Public network profile and a Private network profile.

Domain Networks
Alternatively, enterprise workplaces often leverage a third network profile - a domain network. Unlike the Private or Public profiles, only a network administrator can set its use, and it can only be applied while the device is in the workplace.

Want to know more about your network, or need more help managing it? Reach out to Network Solutions Unlimited at 217-428-6449.

Wireless Charging Just Got an Upgrade… But is That...
Could Your Router be Infected with Malware?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, February 18 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Apple Touchscreen Passwords Legislation Password Worker Commute SaaS Operating System Outsourced IT Proactive Customer Proactive IT Unsupported Software Charger Data Recovery Security Augmented Reality Ransomware Excel Data Information Techology Application IT Solutions Mobility IT Support Google Assistant Personal Information Mobile Device Assessment Data Theft Shadow IT Content Wireless Charging Employer Employee Relationship Flexibility End of Support Video Games Collaboration Windows Efficiency Payment Cards Spyware Social Engineering Language Server Cache Vendor Emergency MSP Hackers Recovery Data Breach Vendor Management Word Access Control Advertising Virtualization Network The Internet of Things Tech Term Document Management Printing Display Financial Licensing Data Backup Phone System Smart Tech Miscellaneous Company Culture IT budget SMB Gadgets Business Professional Services Webinar Information Technology Tablets Gamification Bring Your Own Device HaaS Colocation Monitoring Best Practices Cloud Computing Hosted Solutions Websites Data Management E-Commerce Cloud FAQ Automation Identity Theft Cybercrime Email Google Drive Data Security Government Browser Regulation Privacy USB Social Media Virtual Reality Chromebook Windows 10 Computing Managed Service Backup and Disaster Recovery Machine Learning Humor Screen Mirroring Alert Automobile Benefits Worker How To Solid State Drive Holiday Laptop Files Bluetooth Android Employee Computers Shortcut Battery Outlook How to File Storage Samsung IT Services Internet Exlporer Peripheral Data Privacy Virtual Private Network Comparison Wireless Technology Microsoft Word Business Owner Emails Cast Devices Public Computer Payroll Hiring/Firing Phishing Hacking Gmail Facebook Telephone Systems Mobile Device Management Software Device Security Productivity Employee-Employer Relationship Training Small Business Tip of the Week Smartphone Networking PowerPoint Admin Internet Public Cloud Windows 7 Project Management Thank You Office Tips Camera Update CrashOverride Congratulations Education Rootkit Upgrades Business Continuity Marketing Managed IT Service Disaster Recovery Wireless Internet Managed Service Provider Spam Printers Legal Compliance Mobile Devices Applications Updates Sales HBO Wasting Money Hard Disk Drive Entertainment Sync Computer Forensics IT Service Administration Downtime Hardware Hyperlink WPA3 Conferencing Upgrade Cleaning Accessory Specifications IoT Dark Web Scam Tech Support Storage Computer Care Internet exploMicrosoft HIPAA Patch Management Troubleshooting Firewall Two Factor Authentication eWaste Cybersecurity Ciminal Managed IT Services Evernote Co-Managed Services Computer Accessories Relocation Monitors Wasting Time Remote Computing Bandwidth Telephone OneNote Windows 10 Business Intelligence Content Filter Microsoft Office Spam Blocking Managed IT Services Physical Security Technology Utility Computing Remote Monitoring File Sharing Artificial Intelligence Blockchain Internet of Things Safety Unified Communications Financial Technology Lifestyle Settings Loyalty App store Fraud iOS Audiobook PDF Business Technology Best Practice Antivirus Hybrid Cloud Hard Drives Chrome Adobe Communications Maintenance Twitter Virus Electronic Medical Records Communication Innovation Keyboard Shortcuts Microsoft Google Maps Save Time Meetings Retail Quick Tips NFL Employer-Employee Relationship intranet WiFi Wi-Fi Encryption Data Loss Big Data Cortana Identities VoIP Travel Reputation Risk Management Alexa for Business Edge Managing Stress iPhone Backup Computing Infrastructure Students Money BYOD Politics User Error Vulnerability Windows Ink Gifts Save Money Mobile Security Budget WannaCry Content Filtering Work/Life Balance Google Users IT Management Apps Productivity Television Paperless Office History Smart Technology Network Security Unified Threat Management Router WIndows Server 2008 Computer Fan Hard Drive Streaming Media Office Smartphones Connectivity Mobile Security Cameras Microsoft Excel IT Support Root Cause Analysis Data Protection Business Management Data Storage Books Monitor Search Human Resources Workers Keyboard Redundancy Malware VPN Windows 10s Computer Black Market Law Enforcement hacker Hosted Solution Touchpad Credit Cards User Tips Memory Value Google Docs Identity Amazon Experience IT solutions Saving Money App Two-factor Authentication Commerce Avoiding Downtime Sports BDR Transportation Nanotechnology Testing Wireless Management Managed IT Instant Messaging Remote Workers Audit Going Green Scalability Virtual Assistant Robot Data storage Analysis Office 365 Consultant Workplace Tips Cost Management Projects Private Cloud Health Chromecast Software as a Service Saving Time Business Computing