Windows
 

Windows 8 : Sharing files and folders (part 1) - Configuring the Network and Sharing Center

10/10/2014 3:56:02 AM

Configuring the Network and Sharing Center

The Network and Sharing Center has been the primary location for managing networks in Windows for quite some time and remains available in Windows 8. This tool includes some high-level options for how sharing options operate in Windows 8.

You can access the Network and Sharing Center from the taskbar, Control Panel, or the Start screen.

Using the taskbar

At the lower-right corner of the desktop, press and hold or right-click the network icon and choose Open Network And Sharing Center, as shown in Figure 1.

Opening Network And Sharing Center from the taskbar

Figure 1. Opening Network And Sharing Center from the taskbar

Using Control Panel

To access Control Panel, either press and hold or right-click the lower-left corner of the desktop. This opens a shortcut menu that provides access to a number of system utilities, including Control Panel. From this shortcut menu, choose the Control Panel option. When Control Panel opens, choose the View Network Status And Tasks option, as shown in Figure 2. This opens the Network and Sharing Center.

Using Control Panel to access the Network and Sharing Center

Figure 2. Using Control Panel to access the Network and Sharing Center

Using the Start screen

You can also use the new Windows 8 interface to access the Network and Sharing Center. There are two ways to do so. First, with the Start screen open, start typing Control Panel. As you type, Windows narrows the results to match what you’ve typed. Figure 3 shows the results of this search.

Searching for Control Panel on the Start screen

Figure 3. Searching for Control Panel on the Start screen

Alternatively, from the Start screen, start typing Network and, in the Search bar, choose Settings to tell Windows that you’re looking for settings rather than apps. Tap or click Network And Sharing Center (Figure 4).

Finding settings that are related to the network by using the Start screen

Figure 4. Finding settings that are related to the network by using the Start screen

In the Network and Sharing Center, you have several options by which to make granular changes in how Windows 8 operates on the network.

 
Others
 
- Windows 8 : Configuring virtual machine networking and storage (part 3) - Assigning a virtual switch to a virtual machine , Assigning storage to a virtual machine
- Windows 8 : Configuring virtual machine networking and storage (part 2) - Hyper-V virtual switch
- Windows 8 : Configuring virtual machine networking and storage (part 1) - Introducing storage and networking for Hyper-V
- Windows 8 : Customizing the Lock Screen - Customizing the Lock Screen Background,Controlling the Apps Displayed on the Lock Screen, Disabling the Lock Screen
- Windows 8 for Business : Features Exclusive to Windows 8 Enterprise,Windows RT and Business
- Windows 8 for Business : Virtualization (part 4) - VHD Shell Integration,Remote Desktop and Remote Desktop Host
- Windows 8 for Business : Virtualization (part 3) - Using Hyper-V Virtual Machine Connection
- Windows 8 for Business : Virtualization (part 2) - Using Hyper-V Manager
- Windows 8 for Business : Virtualization (part 1) - Client Hyper-V
- Windows Server 2012 : Deploying Dynamic Access Control (part 4) - Validating the Configuration
- Windows Server 2012 : Deploying Dynamic Access Control (part 3) - Adding a Resource Property to the Global Resource Property List, Creating a New Central Access Rule
- Windows Server 2012 : Deploying Dynamic Access Control (part 2) - Configuring Resource Property for Files
- Windows Server 2012 : Deploying Dynamic Access Control (part 1) - Preparing Claims
- Windows Server 2012 : Managing Users and Data with Dynamic Access Control - The Building Blocks of DAC , Requirements and Predeployment Pointers
- Windows 7 : Using BitLocker Drive Encryption
- Windows 7 : Using System Protection (part 3) - Using previous versions
- Windows 7 : Using System Protection (part 2) - Creating a restore point, Returning to a Previous Restore Point, Undoing a System Restore
- Windows 7 : Using System Protection (part 1) - Turning System Protection on or off
- Windows 8 for Business : Disk Encryption - EFS, BitLocker and BitLocker To Go
- Windows 8 for Business : Domain Join and Group Policy
 
 
Most View
 
- Exchange Server 2013 : Exchange Clients - Design Considerations (part 1) - Supportability, Security
- Sharepoint 2013 : Building an Application with Access Services (part 4) - Adding, Removing, and Editing Tables
- Business Cases for Lync Server 2013 : Why Lync 2013 for Unified Communications
- Business Cases for Lync Server 2013 : Return on Investment (part 1)
- Microsoft Excel 2010 : Working with Graphics - Inserting Clip Art, Inserting a Picture from File
- Exchange Server 2013 : Exploring useful EMS examples (part 1) - Outputting a CSV file
- Exchange Server 2013 : The Exchange Management Shell - EMS basics (part 2) - Handling information EMS returns , Selective output
- Sharepoint 2013 : Community portals and sites - Tracking discussions in progress
- SQL Server 2012 : Executing Your Queries (part 2) - SQLOS - CPU Nodes, Schedulers, Tasks, Workers, Threads
- Windows Server 2012 : A complete virtualization platform (part 5) - Improved Live Migration - Live Migration using a shared folder
 
 
Top 10
 
- Upgrading to Sharepoint 2013 : Upgrading Service Applications
- Upgrading to Sharepoint 2013 : Upgrading Site Collections
- Upgrading to Sharepoint 2013 : Upgrading Content (part 4) - Attaching the Content Database
- Upgrading to Sharepoint 2013 : Upgrading Content (part 3) - Fixing the Issues, Additional Parameters
- Upgrading to Sharepoint 2013 : Upgrading Content (part 2) - Running Test-SPContentDatabase
- Upgrading to Sharepoint 2013 : Upgrading Content - Creating the Web Application, Testing the Content Database
- Windows 8 : Introducing Storage Spaces - Creating storage spaces
- Windows 8 : Working with file systems (part 5) - Working with quotas, Working with quotas for user accounts
- Windows 8 : Working with file systems (part 4) - Understanding Encrypting File System, BitLocker
- Windows 8 : Working with file systems (part 3) - Auditing access to securable objects by using SACLs