Company LAN management, how to manage the local area network

Updated on technology 2024-02-08
12 answers
  1. Anonymous users2024-02-05

    Hello, let's first take a look at "how to set user permissions in the company's local area network", prompting "inaccessible" You may not have permission to use network resources.

    1. First of all, on the computer that has been set up to share, right-click the network icon in the lower right corner of the taskbar, open the "Network and Sharing Center", and enter the "Change Adapter Settings".

    2. On the adapter that is connected to the network, right-click and select "Properties", find the item "File and printer sharing on the Microsoft network", tick it, and then click "OK".

    3. Then, we open the start menu again and click "Run". In the Run Command box, enter ", and click OK.

    4. In the pop-up local group policyr, go to "Windows Settings" - "Security Settings" - "Local Policies" - "User Rights Assignment". Then double-click to open "Deny access to this computer from the network" and delete the "guest" account inside.

    5. After that, go to "Windows Settings" - "Security Settings" - "Local Policies" - "Security Options", find "Network Access: Sharing and Security Model for Local Accounts", and change it to "Guest Only".

    6. Finally, continue to the security options, find "Account: Local accounts with empty passwords are only allowed to log in to the console", and change it to "Disabled".

    After setting this up, access the LAN shared printer again, and you will find that the issue "You may not have access to network resources" has been resolved. Of course, this is only one of the problems in printer sharing, in fact, sometimes there are a lot of messy factors.

    How do I set permissions so that computer users can't access the Internet? It can be achieved with the help of some online behavior management software:

    2. The installation process is the same as that of ordinary programs, and you can install it step by step. After installation, run the management software, click on the "File" in the upper left corner of the boss window - >Add Employee" menu, and then fill in the name of the computer you want to monitor is the name, which can generally be set to the name of the person who uses the computer (such as: Wang Er), I used the default name "employee name" here.

    The port is set to the employee's remarks name, and this port must be consistent with the port set by the employee later, so that the employee's computer cannot access the Internet.

    I hope it helps you and I wish you a happy life.

  2. Anonymous users2024-02-04

    This is a super entry-level problem in the enterprise network management category

    Set up a domain server and add all the company's computers to the domain. Then you can modify or delete any file on any computer as long as you sit in front of the server in the future, you can also modify or add or delete any username and password on any computer, and you can set them on the server to prohibit them from logging in to the local computer, and can only log in to the domain. That way, it's up to you to decide whether you want them to change their password or username.

    There are many, many ways to restrict access to a portion of a computer on a local area network. Domain policy restrictions, router policy restrictions, firewall restrictions, registry restrictions, gateway restrictions, third-party software bypass restrictions, and so on.

  3. Anonymous users2024-02-03

    You can try to see a software called NetCat, which is the local area network of the Administration, which can restrict access to the Internet, and there is a trial version, but it is only seven days, and the official version is charged.

  4. Anonymous users2024-02-02

    Add domain control, or join a non-administrator group and set up some group policies by yourself. It needs to be done on every single station. This can be done on the gateway, which only allows the Internet to be bound to the MAC address.

  5. Anonymous users2024-02-01

    You can use third-party tools to manage the local area network, such as network post and workwin.

  6. Anonymous users2024-01-31

    Get the MAC address of each computer and set MAC address filtering on the router. You can also configure the permissions of the external and internal networks according to this need.

  7. Anonymous users2024-01-30

    How is the local area network administered? To control the students' online behavior, it is necessary to deploy the network manager LAN computer monitoring software in the students' computers, and after deployment, only one machine is needed to monitor the computer screen of all students in the LAN, and all computer operations after the employees are turned on.

    1. Remote file management

    3.Batch Upload: You can upload multiple folders or files from the administrator's computer to a specified controlled computer in batches.

    Click File Management, enter any directory, right-click on the blank space, and select Batch Upload, as shown below.

    4.Remote distribution: The files that need to be uploaded and the tasks that the manager needs to perform can be distributed in batches to any number of selected controlled computers and executed. Click File Management, enter any directory, right-click in the blank space, and select Batch Distribution, as shown below.

    2. Asset management

    1.Hardware asset management: Collects and lists the hardware information of the controlled computer, such as CPU, memory, hard disk, motherboard, graphics card, network card, etc. Click Software & Hardware Management - Hardware List to view the information of common hardware.

    2.Hardware changes: Control and count the changes in the hardware devices of the controlled computer.

    Click Software and Hardware Management - Hardware Change to view the hardware change.

    3.Software Asset Management: Collects and lists all installed software on the computer of the controlled end.

    Click Software & Hardware Management - Software List to view the information of the installed software.

    4.Software changes: Control and count the changes in the software of the controlled computer.

    Click Software and Hardware Management - Software Changes to view the software changes.

    3. Behavior control.

    1.Program Running Limitations.

    Click Restriction Settings - Program Running Restrictions.

    3. Program running records.

    In the "History" of the software, you can check the detailed program operation records, including: program operation records, program startup time, end time and usage time.

    3.Software whitelist: Only programs in the specified whitelist are allowed to run, and nothing else is allowed to run.

  8. Anonymous users2024-01-29

    One of the ways to control the LAN computer: use remote desktop management, very simple, assume: you want to use a computer A to control a computer B, then:

    1. There is a remote in the system property settings on computer B, which allows users to remotely link to the computer.

    2. Set the password of computer B superuser;

    3. Set the IP address of computer B.

    4. Run MSTSC on computer A and enter the IP address of computer B, fill in the superuser account and password, and press enter to enter the desktop of computer B, and then you can operate how you want.

    Methods of controlling LAN computers 2:

    Anqishen computer desktop monitoring software;

    Network manager LAN management and control software.

    Zhongke security enterprise LAN management system.

  9. Anonymous users2024-01-28

    Opmanger allows you to classify devices in your LAN based on their subnets. Once the devices are categorized, they are available in the corresponding location under the Subnets tab in the directory.

    Categorizing devices based on their subnets gives you more flexibility for your devices in the monitoring and management area network. Once LAN devices are grouped into a specific subnet, you can click on the subnet and do the following:

    View the details of all devices under the subnet, including their status and the number of connected interfaces.

    Manage devices under a subnet, generate reports for a specific set of devices under a subnet, change monitoring intervals, associate device templates and credentials to a single device or a group of devices under a specific subnet – all from a single screen.

    There is no need to manually classify devices into subnets, just specify a netmask during device discovery and OpManager will automatically classify them.

  10. Anonymous users2024-01-27

    P2P terminators can be used.

    However, if the other party has installed anti-ARP attack software.

    There's no way to control that.

    Of course, you can get the account number of the router and you can do it.

  11. Anonymous users2024-01-26

    You can try the Workwin management expert software, this software can prohibit the running of the software you specify, you can prohibit the use of chat software; Prohibition of the use of browsers, etc.; The software also sends all monitoring information (screenshots, activity window records, violation records, etc.) to the management computer, so that you can easily control the employee's computer.

  12. Anonymous users2024-01-25

    The management of the local area network, control the Internet behavior of students or employees, has nothing to do with what the Internet line is, try the workwin software to understand.

Related questions
11 answers2024-02-08

There are only 100 machines, and it is not very difficult to troubleshoot the problem. Judging from what you said about the drop, I don't think it's the ARP virus, because you've already taken measures to deal with ARP. >>>More

18 answers2024-02-08

1) First of all, set the host's ADSL [ Already set up is not used] network neighbor attributes. >>>More

17 answers2024-02-08

Yes, it's just that your machine can't be turned off.

5 answers2024-02-08

Hardware devices typically required for enterprise LAN installation: firewalls, routers, switches. >>>More

13 answers2024-02-08

I think there should be someone in the LAN who uses ARP to spoof Trojan programs (such as: World of Warcraft, Audition and other number-stealing software, and some plug-ins have also maliciously loaded this program). >>>More