How to Configure your Network Location in Windows 8 and Windows 8.1

Home > Blogs > Windows 8 > How to Configure your Network Location in Windows 8 and Windows 8.1

How to Configure your Network Location in Windows 8 and Windows 8.1

Like This Blog 0Rick Trader
Added by June 22, 2016


In this video, Windows Server instructor Rick Trader demonstrated how to configure your network locations by using Windows 8 and 8.1.

Rick also presented how to establish and configure network locations in Windows 10. You can watch this video on our Webinars Training website. How to Configure a Network Location in Windows 10.

In a previous blog, Rick wrote about how the Windows Firewall Profiles and how the firewall profiles are controlled through your Network Location Services.

In this video, Rick will show how to configure the Network Location Service in a Windows 8 or a Windows 8.1 machine which will control your Windows Profile your computer will be using.

Until next time – Ride Safe!

Rick Trader
Windows Server Instructor – Interface Technical Training
Phoenix, AZ

You may also like:  BitLocker to Go READER in Windows 10

Videos You May Like

Windows 10 Managing, Deploying and Configuring – December 2, 2015

0 237 1

In this recorded Windows 10 training webinar from December 2, 2015, Windows Server instructor Rick Trader presents the deployment and management of Windows 10 Enterprise and the new Provisioning capability in Windows 10. Learn how to manage Windows 10 deployments using System Center Configuration Manager, Mobile Device Management and Intune. Also included in his presentation … Continue reading Windows 10 Managing, Deploying and Configuring – December 2, 2015

Configuring Network Locations in Windows 7

0 2 0

In this IT Training video, Windows Server instructor Rick Trader demonstrated how to configure your network locations by using Windows 7.

Detailed Forensic Investigation of Malware Infections – April 21, 2015

2 271 3

In this IT Security training video, Security expert Mike Danseglio (CISSP / CEH) will perform several malware investigations including rootkits, botnets, viruses, and browser toolbars.

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.