Skip to main content

Add a printer attached to the network

Adding a printer to the network is a simple task to complete but you forgot this knowledge if you don't use it. So this is a simple guide on how you can add a printer to your network active directory.

I normally assign static IP Address to the printer to avoid conflict and management purpose. If you don't have this information you need the assistance of your IT Network Admin. For example, the IP Address is 192.168.10.210 assign to our new HP LaserJet printer. When you power-up your printer for the first time, it will pick-up an IP Address from the DHCP server. All you have to do is change this IP Address, and then we are ready to add the printer to the network.


In your Printer Server. For example, login to KINGNET003 Print Server using administrative privilege account and follow this procedure.

  1. Open the Printers and Faxes, double-click Add Printer, and then click Next.
  2. Click Local printer attached to this printer, clear the Automatically detect and install my Plug and Play printer check box, and click Next.
  3. In Select a Printer Port, click Create a new port, and choose Standard TCP/IP Port, click Next.
  4. Click Next again.
  5. In Add Port, type the IP Address 192.168.10.210 (the IP Address that we decided to use)
  6. Click Have a disk to install
  7. Accept by default to finish the setup, you may change this later.
The new printer comes with printer drivers CD, use this to add the printer drivers.

Now let's check our configuration, sharing name, location, comments, etc. In Printer and Faxes, select the new printer, right-click and select Properties. In the printer properties, here are some basic configuration to check.
  • In General tab, use the Location and Comment to help your users identify this printer. For example, Location is "Printer at Accounting Department" or "Printer at Legal Department", etc.
  • In Sharing tab, check the Share name. If you are using a standard naming convention, this is the time to update this share name. By default, the List in the directory is checked.
  • In Security tab, Group or user names, select the Everyone, the Print should be Allow. You can also remove Everyone, replace this using your approved network group, and assign Print Allow permission.
Use "Print Test Page" and see if successful. 

If you have questions, please leave me a comment or feedback here.
Thank you.

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp