4.12 Configure Microsoft Windows networking features on a client and desktop
Introduction
Imagine you're the guide helping others navigate a complex city. Their computers need the right paths (network connections), addresses (IP addresses), and security measures (VPNs and firewalls) to get where they need to go safely.
In this lesson, you'll learn how to assist others in connecting to networks, ensuring secure communication, and troubleshooting common issues. By mastering these tools, you'll be able to help people solve network problems quickly and keep their systems running smoothly, making you a valuable resource in any tech support role.
Windows Network Connection Types
A computer connects to a local network using a network adapter, also known as a network interface card (NIC). This adapter connects to either a wired switch or a wireless access point. For the connection to work properly, the settings on the NIC should match the network's capabilities.
Wired Network Connection
Most wired network connections use Ethernet. The network adapter's media type (copper wire or fiber optic cable) must match the switch it connects to. Copper wiring typically uses RJ45 jacks, but some corporate networks might use fiber optic cables and different connectors. The adapter and the switch need to have matching Ethernet settings, which are usually set to autonegotiate, meaning the link will establish automatically when the cable is plugged in.
In Windows, wired adapters are labeled as Ethernet (e.g., Ethernet, Ethernet2, Ethernet3). You can rename them if needed. To manually configure Ethernet settings:
Open Device Manager.
Right-click the adapter and choose Properties.
Update settings under the Advanced tab.
You can also access network adapter settings through the Network & Internet section in Windows Settings.
Wireless Network Connection
To connect to a wireless network, follow these steps:
Click the network status icon in the notification area.
Choose a network from the list of available networks.
If the network broadcasts its SSID (Service Set ID), it will appear in the list, showing signal strength with bars and indicating encryption with a lock icon.
Select the network and enter the required credentials (password).
To connect automatically when in range, check Connect automatically.
If the SSID is not broadcasted, you'll need to add the network manually by:
Going to Network & Internet settings.
Selecting Wi-Fi > Manage known networks > Add a new network.
Wireless adapter properties can also be accessed in Device Manager. The most important setting is compatibility with the 802.11 standards. Most modern adapters are backward-compatible with older standards. For example, an 802.11n adapter will work with 802.11g and 802.11b networks. You can also adjust settings like roaming aggressiveness and transmit power to improve connection quality.
This setup ensures that your computer stays connected, whether you're using a wired Ethernet connection or a wireless network.

IP Addressing Schemes
Before a device can connect to a network, it must have certain settings that allow it to communicate properly. These settings include something called an IP address and a subnet mask. Let's break down what these mean and how they are used.
Internet Protocol (IP) Addressing Scheme
An IP address is like a mailing address for your computer on a network. It helps other devices find and send information to it. There are two versions of IP addresses:
IPv4 (Internet Protocol version 4): This version uses a 32-bit address, which is usually written as four sets of numbers separated by dots, like this: 192.168.1.100. Along with the IP address, there's a subnet mask (like 255.255.255.0) that helps divide the network into two parts: one part identifies the network, and the other identifies the specific device (host) on that network.
IPv6 (Internet Protocol version 6): This is a newer version that uses 128-bit addresses, which are much longer and can handle more devices. This version is often used in larger networks like the internet.
Local Network Communication
When computers or devices are connected to the same network, they must use addresses from the same IP range. For example, if one device has an IP address like 192.168.1.100, all other devices on the same network will have similar addresses, like 192.168.1.101 or 192.168.1.102.
If two devices are on different networks, they need to communicate through a router. A router forwards information between networks. The default gateway is the address of the router on a local network. It's typically something like 192.168.1.1.
Domain Name System (DNS)
Another important setting is the Domain Name System (DNS). DNS is like a phonebook for the internet. It helps translate website names (like www.example.com) into IP addresses so that your computer knows where to find them. On most home networks, your router also serves as the DNS server, making things simple.
Sometimes, computers are also given a domain suffix, which helps identify the full name of a device on the network. For example, if your computer is called PC1 and the network is called company.example, your computer’s full name might be PC1.company.example.
Static vs. Dynamic Configuration
There are two ways to assign these IP addresses:
Static Configuration: This means manually assigning an IP address to each device. It works fine for small networks but can be a hassle when managing many devices.
Dynamic Configuration (DHCP): Most networks use Dynamic Host Configuration Protocol (DHCP) to automatically assign IP addresses to devices. This makes setup easier and allows devices to quickly connect to the network without needing manual input.
We’ll discuss these concepts in greater detail once we begin learning more about networking.
Windows Client Configuration
When setting up network connections in Windows, you often manage the IP configuration of the computer using graphical tools. These tools are easily accessed through Network & Internet settings or the Network Connections applet (which you can open by typing ncpa.cpl in the Run dialog). Here's what you need to know about configuring a Windows client:
Default Installed Components
For both Ethernet (wired) and Wi-Fi (wireless) adapters, Windows automatically installs several useful clients, protocols, and services:
Client for Microsoft Networks: This allows your computer to access shared files and printers on the network.
File and Print Sharing for Microsoft Networks: This allows other computers on the network to access your shared files and printers.
Internet Protocol (IP): Both IPv4 (the common 32-bit address version) and IPv6 (the newer, 128-bit version) are installed. The system will automatically choose the appropriate version based on the network it's connected to.
Link-layer Topology Discovery: This protocol helps map and discover other devices on the network, especially useful on networks that don't have dedicated name servers.
Configuring IP Addressing
By default, most Windows computers are set to Obtain an IP address automatically. This means they rely on Dynamic Host Configuration Protocol (DHCP) to automatically receive their network settings, including their IP address, subnet mask, and default gateway. However, there may be situations where you need to configure a static IP address (an address that doesn't change).
To configure a static IP:
Go to Network & Internet settings.
Select your network adapter (Ethernet or Wi-Fi) and go to its properties.
Under IP properties, choose to manually enter the IP address.
You'll need to enter:
IP address (e.g., 192.168.1.100)
Subnet mask (e.g., 255.255.255.0). In some dialogs, this will be entered as a prefix length (e.g., /24 for a 255.255.255.0 mask).
Default gateway (the router's IP, e.g., 192.168.1.1).
DNS server addresses (if not provided by DHCP).
Example of Static IP Configuration
When manually setting up a static IP address, the Internet Protocol Version 4 (TCP/IPv4) Properties dialog allows you to configure everything manually. If you're using the settings app, you will enter the subnet mask as a prefix length.
For example: A subnet mask of 255.255.255.0 is equivalent to a /24 prefix.
Recap:
DHCP is the default for assigning IP addresses.
Static IP addresses are manually set and are sometimes necessary for servers or devices that need a fixed address on the network.
The network adapter can support both IPv4 and IPv6, automatically selecting the appropriate protocol based on network conditions.
By knowing how to configure these settings, you can better manage how your Windows device connects to a network.
Network Location
When your computer connects to a network, its security settings are determined by the Windows Defender Firewall, based on the type of network connection. This is crucial for maintaining the right level of security depending on where you are connecting from.
Network Location Awareness (NLA)
The Network Location Awareness (NLA) service in Windows prompts you to choose the type of network you're connecting to:
Public Network: This is the most secure option, typically used for places like coffee shops or airports. Windows Firewall blocks most external access, and your computer will not be discoverable by other devices on the network. File and printer sharing is also disabled.
Private Network: This option is for trusted networks like your home or office. Your computer will be discoverable, meaning other devices on the network can see and access shared files or printers, and the firewall allows these connections.
Changing Network Location
If you ever need to change the network type, you can do so through Network & Internet settings. This allows you to switch between Public and Private settings based on where you're connected.
Domain Network: This is automatically selected if your computer is part of a domain (typically in corporate environments). The firewall and other settings for a domain network are controlled by Group Policy, which is set by the network administrators. You cannot change this setting manually.

Network Discovery
When your network location is set to Private, you can enable Network Discovery. This makes it easier to find other computers and devices on the network. You can access shared resources (like files and printers) through File Explorer using the Network object.
Universal Naming Convention (UNC) Syntax: Windows uses a UNC path to access network resources.
The format is:
Host: The name, FQDN (fully qualified domain name), or IP address of the computer you're accessing.
Path: The shared folder or file on the host computer.
Example of a UNC Path:
If you're accessing a shared folder named "Documents" on a computer with the hostname Server01, the UNC path would be:
This system allows you to access resources on other computers easily, while ensuring that your firewall settings are appropriate for the network you’re connected to.
Windows Defender Firewall Configuration
You can control the Windows Defender Firewall by turning it on or off and adjusting settings. This can be done in two places:
Firewall & Network Protection in Windows Defender Security Center
Windows Defender Firewall applet in Control Panel
Additionally, you can choose to block all incoming connections, which provides extra security by preventing unsolicited connections.
Allowing or Blocking Programs
To manage which programs are allowed through the firewall (called exception
Go to the Windows Firewall status page.
Select Allow an app through the firewall.
You can check the box next to the app for either or both network profile types (Public or Private).
If the app is not listed, use Allow another program to browse for its executable file and add it manually.
This ensures that only trusted programs have network access based on the settings you define.
VPN and WWAN Connection Types
In addition to traditional wired and wireless network adapters that connect to local networks, there are other methods to connect to networks, especially for remote work. These include Virtual Private Networks (VPN) and Wireless Wide Area Networks (WWAN) using cellular connections. These technologies allow users to connect remotely, whether working from home, on the road, or in locations with limited wired connectivity.
Establishing a Virtual Private Network (VPN) Connection
A VPN allows a user to securely connect to a private network over the Internet or another public network. It creates a "tunnel" using special protocols and encryption to keep the connection secure and ensure the user is authenticated. Once connected, the user's device behaves as though it is part of the local network, though the connection speed may be limited by the available bandwidth.
Windows supports several types of VPNs, which can be configured through the Network & Internet settings. If required, some VPNs may need third-party software.

Steps for VPN Connection:
Configure the VPN in Network & Internet settings.
After setup, access the connection via the network status icon.
Use the icon to Connect or Disconnect or modify the VPN properties.
Establishing a Wireless Wide Area Network (WWAN) Connection
A WWAN uses a cellular adapter to connect to the Internet via a provider's mobile network, such as 3G, 4G, or 5G. The speed depends on the technologies supported by both the adapter and the nearby cell tower. The adapter may come as a USB device or be internally installed in the computer.
For certain cellular services like GSM or 5G, the adapter also needs a SIM card issued by the provider. The connection can be enabled or disabled using the network status icon and configured via Network & Internet settings.
Important Notes for WWAN:
Data charges can accumulate quickly if you exceed your provider's data allowance.
You can set the connection as metered in Windows to monitor and manage data usage.
Data limits can be set to avoid extra charges, and you can track the usage of data by each app.
Proxy Settings
Some networks use a proxy server to manage Internet connections, which can enhance both performance and security. The proxy server acts as an intermediary between the client's device and the Internet. It forwards the client's web requests and can also cache frequently requested content, reducing the need to download the same data multiple times and thus saving bandwidth.
Analogy: A proxy server is like a middleman or a security guard at the entrance of a building. Imagine you’re trying to visit a store (the website) to buy something (get information), but instead of going directly, you send a friend (the proxy server) to make the purchase for you.
Your friend goes to the store, gets the item, and then brings it back to you. This way, the store doesn’t know who you are because it only interacted with your friend. Similarly, a proxy server acts as an intermediary between your device and the internet, fetching data on your behalf, masking your identity, and sometimes adding extra security.
Types of Proxies
Intercepting/Transparent Proxies: These do not require any configuration on the client side. The network automatically directs traffic through the proxy without the client needing to set anything up.
Autoconfiguring Proxies: Some proxies are designed to automatically configure themselves, making it easier for clients to connect without manual setup.
Manual Configuration: If neither of the above options is available, clients must manually configure the proxy settings by entering the IP address and TCP port that the proxy server uses.
Configuring Proxy Settings
To set up or change the proxy server, you can use the Network & Internet settings in Windows. If manual configuration is required, these settings allow you to input the necessary details so that your device can forward traffic through the proxy server.
Summary
This lesson covers essential networking concepts and tools that are important for ensuring smooth and secure network connections. From configuring wired and wireless network settings to understanding IP addressing schemes and setting up VPNs for remote access, you’ll gain practical knowledge for managing both local and remote networks. Whether you're connecting to a local network, using a cellular adapter for internet access, or setting up a proxy server for improved performance, these skills will empower you to handle a variety of networking scenarios. By mastering these tools, you’ll ensure that your systems remain connected, secure, and efficient.