Contact us today!

FRS Pros Blog

Tip of the Week: Changing Your Network Profile

Tip of the Week: Changing Your Network Profile

The Windows operating system has different settings for connecting to different networks. While this may seem like a minor detail, it actually can have considerable ramifications to your cybersecurity, not to mention that of your business. For this week’s tip, we’ll discuss how to use your network profile to stay secure, based on your situation.

Network Profile?
Each time a Windows 10 device connects to a new network, it will ask the user if it should be able to be discovered by other devices on that network. Selecting “Yes” will set your network profile to Private, and selecting “No” will set it to Public.

The Private and Public settings are referring to the kind of network your device is connecting to, and what level of security your individual device is responsible for. If you are connected to your company’s network, with all its protections and other users with whom you need to collaborate, the “Private” network setting is the one you want to use. However, if you’re using your device in a public setting, on a network that is “Public”-ally accessible, you don’t want any Tom, Dick, or Harry Hacker to be able to connect to you.

Switching the Network Profile
Windows 10 offers a few different methods of switching the network profile that a device uses. One way is to use the built-in Settings application.

From the Start menu, access the Settings application. Go to Network and Internet, and then select the kind of connection you have established from the left panel menu. If you’re physically connected to the network, select Ethernet, and if you’re using a wireless connection, select WiFi. Then, click on Network in the right panel. You can then switch between a Public network profile and a Private network profile.

Domain Networks
Alternatively, enterprise workplaces often leverage a third network profile - a domain network. Unlike the Private or Public profiles, only a network administrator can set its use, and it can only be applied while the device is in the workplace.

Want to know more about your network, or need more help managing it? Reach out to FRS Pros at 561-795-2000.

Wireless Charging Just Got an Upgrade… But is That...
Could Your Router be Infected with Malware?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Google Business Management Cloud Tech Term Business Computing Software User Tips Hackers Hardware Microsoft Computer Malware Browser Productivity Efficiency Cybersecurity Mobile Devices Windows Data Backup Hosted Solutions Innovation Cybercrime Apps Internet of Things Smartphone Windows 10 Data Recovery Office 365 IT Services Data Security Email Smartphones Operating System Outsourced IT Android Backup Mobile Device Management Business Continuity Vulnerability Data Business Money Upgrade Alert VoIP Phishing Disaster Recovery Law Enforcement IT Support Ransomware Chrome Microsoft Office Saving Money Collaboration Managed IT Services Network Server IT Support Best Practice Employer-Employee Relationship Applications Communications Information Small Business Two-factor Authentication App Google Drive Cloud Computing Spam Windows 10 Computers Virtualization Information Technology Passwords Miscellaneous Telephone Systems Tech Support Managed Service Provider Gadgets Managed IT Router Unsupported Software Blockchain Application Fraud Hosted Solution Avoiding Downtime Bring Your Own Device Hacking Mobile Security Encryption Safety Gmail Evernote User Error Save Money Proactive IT SaaS Google Assistant Communication Holiday Touchscreen Data Storage Artificial Intelligence Risk Management Cortana Networking Budget Government WiFi Word Wireless Technology Mobile Device OneNote Wi-Fi Robot Data Management Google Docs Project Management Audit Update Patch Management Wireless Charging Shortcut Productivity Devices Data Protection Politics The Internet of Things Social Media Workplace Tips VPN iPhone Sports BDR Data Breach Cost Management Managed IT Services Facebook Travel Password Automation Augmented Reality Users WannaCry Quick Tips Managed Service Excel Commerce Apple IT Solutions Wireless Legal Uninterrupted Power Supply Printing Settings Telephone Tablets Maintenance Webinar Mobility Antivirus Sales Proactive Search Projects Consultant Laptop PowerPoint Admin Storage Social Engineering Transportation Vendor Sync Edge Private Cloud FAQ Remote Monitoring Hyperlink NFL Files eWaste IT solutions Hybrid Cloud DDoS Retail Websites Identity Touchpad Wireless Internet Recovery Identities Going Green Social Employee-Employer Relationship Emergency Disaster Wasting Time Point of Sale Data Loss Ciminal iOS WIndows Server 2008 Charger Value Device Security Windows 10s HBO Amazon Conferencing Data Theft Data Privacy Windows 7 Screen Mirroring Humor Gamification Identity Theft Legislation Administrator Language Computer Care Nanotechnology Business Technology Adobe Workers Accessory Streaming Media Software as a Service Lithium-ion battery Unified Threat Management Windows Ink Solid State Drive Virtual Assistant Gifts Computing Meetings Hard Drive Display Updates Emails Cast Memory Vendor Management Comparison Access Root Cause Analysis Testing Licensing Computer Forensics Peripheral Scam Microsoft Excel Chromecast IT budget Computer Fan Reputation Bandwidth Outlook Upgrades Google Maps Spyware Hard Disk Drive IT Management History Alexa for Business Telephony Credit Cards App store Data storage Chromebook Co-Managed Services Microsoft Word Marketing BYOD Financial Samsung Internet Exlporer Specifications Virus Remote Computing Health Camera Management Access Control File Sharing Benefits Phone System Cache Save Time Office tips Computer Accessories Training Monitors Battery Smart Technology Compliance Flexibility Music Advertising Television CrashOverride Printers Instant Messaging Hacker Company Culture Regulation Scalability Analytics Keyboard HaaS Entertainment End of Support Relocation Black Market Cleaning Twitter Automobile Office Big Data Managing Stress Personal Information Thank You USB Worker PDF How To Books Education Hiring/Firing Mobile Computing Video Games Experience Congratulations Work/Life Balance Virtual Reality Text Messaging Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records es