Windows
 

Windows 8 : Sharing printers - Configuring shared printers, Configuring printing permissions

10/10/2014 4:08:31 AM

Configuring shared printers

Sharing printers on the network is an easy task that doesn’t take much time. You just need to think about whom you want to access your printer and which permissions are available.

To share a printer, complete the following steps:

  1. Open Control Panel.

  2. Change to Large Icons or Small Icons view.

  3. Select Devices And Printers.

  4. Locate the printer you want to share.

  5. Press and hold or right-click the printer and choose Printer Properties.

  6. Select the Sharing tab (Figure 1).

  7. Select the Share This Printer check box.

  8. Provide a name for the printer in the Share Name text box.

  9. Tap or click OK.

The Sharing tab in the My Printer Properties dialog box

Figure 1. The Sharing tab in the My Printer Properties dialog box

Other users can now connect to this printer and print to it just as if it were attached to their own computer.

UNDERSTANDING DRIVER ISSUES

Many administrators consider printers to be frustrating devices to work with, often for good reason. Printers are among the most visible devices on the network because people use them constantly, and when they’re not working, people’s work can come to a standstill. As you mix different versions of Windows in the environment, the printing situation can get even a bit trickier because different versions of Windows sometimes require you to load different versions of drivers on the print server. For example, if you share a printer on your Windows 8 desktop, that Windows 8 desktop has become a de facto print server. If a 32-bit Windows XP user connects to that shared printer, he might not be able to use the 64-bit Windows 8 drivers that you loaded.

If users are experiencing trouble printing to a Windows 8 shared printer, either load the appropriate drivers locally to the user’s machine or open the Printer Sharing tab in Windows 8 and tap or click the Additional Drivers button for more guidance.

Configuring printing permissions

Sometimes, however, you don’t want to share your printer. Perhaps, for example, you have an expensive color printer that is authorized for use by only certain people. You might find it necessary to implement restrictions on the ability to print to such devices. To set permissions on a printer, complete the following steps:

  1. Open Control Panel and select Printers.

  2. Locate the printer you want to share.

  3. Press and hold or right-click the printer and choose Printer Properties.

  4. Select the Security tab, as shown in Figure 2.

    Setting printer sharing permissions on the Security tab in the My Printer Properties dialog box

    Figure 2. Setting printer sharing permissions on the Security tab in the My Printer Properties dialog box

  5. Tap or click the Add button and select the user or group to which you’d like to grant printing permissions.

  6. Select the appropriate printing permissions for the selected user or group. The available permissions are described in Table 1.

Table 1. Printing permissions

Permission name

Description (folder)

Print

The selected user or group has the rights to send documents to the printer to be printed. By default, everyone can print to the printer if she knows how to connect to it.

Manage the printer

The selected user or group has the rights to send documents to the printer to be printed. In addition, the selected user or group can fully manage the printer. This management capability allows pausing and restarting the printer, changing spooler settings, sharing the printer with others, modifying printer permissions, and changing other printer properties.

Manage documents

The selected user or group has the rights to manage the print queue. This involves cancelling and reordering print jobs.

Special permissions

There are no printer-specific special permissions.

 
Others
 
- Windows 8 : Sharing files and folders (part 6) - Understanding NTFS permissions - Identifying permissions, Taking ownership of a resource
- Windows 8 : Sharing files and folders (part 5) - Understanding NTFS permissions - Creating advanced security settings
- Windows 8 : Sharing files and folders (part 4) - Understanding NTFS permissions - Modifying file or folder permissions
- Windows 8 : Sharing files and folders (part 3) - Sharing a folder
- Windows 8 : Sharing files and folders (part 2) - Enabling folder sharing using the Windows 8 interface, Enabling folder sharing using the traditional interface
- Windows 8 : Sharing files and folders (part 1) - Configuring the Network and Sharing Center
- Windows 8 : Configuring virtual machine networking and storage (part 3) - Assigning a virtual switch to a virtual machine , Assigning storage to a virtual machine
- Windows 8 : Configuring virtual machine networking and storage (part 2) - Hyper-V virtual switch
- Windows 8 : Configuring virtual machine networking and storage (part 1) - Introducing storage and networking for Hyper-V
- Windows 8 : Customizing the Lock Screen - Customizing the Lock Screen Background,Controlling the Apps Displayed on the Lock Screen, Disabling the Lock Screen
- Windows 8 for Business : Features Exclusive to Windows 8 Enterprise,Windows RT and Business
- Windows 8 for Business : Virtualization (part 4) - VHD Shell Integration,Remote Desktop and Remote Desktop Host
- Windows 8 for Business : Virtualization (part 3) - Using Hyper-V Virtual Machine Connection
- Windows 8 for Business : Virtualization (part 2) - Using Hyper-V Manager
- Windows 8 for Business : Virtualization (part 1) - Client Hyper-V
- Windows Server 2012 : Deploying Dynamic Access Control (part 4) - Validating the Configuration
- Windows Server 2012 : Deploying Dynamic Access Control (part 3) - Adding a Resource Property to the Global Resource Property List, Creating a New Central Access Rule
- Windows Server 2012 : Deploying Dynamic Access Control (part 2) - Configuring Resource Property for Files
- Windows Server 2012 : Deploying Dynamic Access Control (part 1) - Preparing Claims
- Windows Server 2012 : Managing Users and Data with Dynamic Access Control - The Building Blocks of DAC , Requirements and Predeployment Pointers
 
 
Most View
 
- Windows Server 2012 : Hyper-V - Performance and Virtual Network Management - Resource Metering
- Using the Windows 8 Interface : Taking a Tour of the Windows 8 Interface (part 2) - The App Bar,The Charms Menu
- SQL Server 2012 : Backing Up the Database (part 1) - Performing Backup with Management Studio
- Sharepoint 2013 : Managing and Configuring Profile Synchronization (part 3) - SharePoint Profile Synchronization
- Microsoft Access 2010 : Creating Your Own Databases and Tables - Working with Field Properties (part 1)
- Windows 8 : Sharing and Securing with User Accounts - Using User Accounts (part 1) - Understanding User Account Control
- Overview of Oauth in Sharepoint 2013 : Introduction to OAuth
- Exchange Server 2013 : Extending Exchange - Accessing Exchange Programmatically
- Windows 8 : Customizing the Lock Screen - Customizing the Lock Screen Background,Controlling the Apps Displayed on the Lock Screen, Disabling the Lock Screen
- Microsoft Access 2010 : Relating the Information in Your Database - Establishing Relationships in Access
 
 
Top 10
 
- Upgrading to Sharepoint 2013 : Upgrading Service Applications
- Upgrading to Sharepoint 2013 : Upgrading Site Collections
- Upgrading to Sharepoint 2013 : Upgrading Content (part 4) - Attaching the Content Database
- Upgrading to Sharepoint 2013 : Upgrading Content (part 3) - Fixing the Issues, Additional Parameters
- Upgrading to Sharepoint 2013 : Upgrading Content (part 2) - Running Test-SPContentDatabase
- Upgrading to Sharepoint 2013 : Upgrading Content - Creating the Web Application, Testing the Content Database
- Windows 8 : Introducing Storage Spaces - Creating storage spaces
- Windows 8 : Working with file systems (part 5) - Working with quotas, Working with quotas for user accounts
- Windows 8 : Working with file systems (part 4) - Understanding Encrypting File System, BitLocker
- Windows 8 : Working with file systems (part 3) - Auditing access to securable objects by using SACLs