当前位置:网站首页>What should I do if my computer sharing printer refuses access
What should I do if my computer sharing printer refuses access
2022-07-04 20:41:00 【Xiaobai one click reinstallation system】
Why is access denied when connecting a shared printer to a computer ? Friends who often use printers , Often share a printer with multiple computers , What should I do if the computer sharing printer refuses access ? Here is a way to share with you .
There are more details System reassembly Tutorials are available for reference
1、 With win10 Take the system as an example , Right click the start menu icon on the desktop , Then select run to open the run window , Or you can go directly through win+r Shortcut key to open .
2、 Then enter gpedit.msc Press enter again .
3、 In the window of local security policy , In the left column, follow the security settings - The local policy - Click to open the configuration of user permission assignment .
4、 Then find the service item of accessing this computer from the network in the expanded right window , Right click and then click properties .
5、 Then click add user or group in the properties window of accessing this computer from the network .
6、 Click Advanced... In the window that appears to select users or groups .
7、 Then see this interface and click find now , Then click the user name as Guest Users of , Then click ok .
8、 Then double click to open the service item of denying access to this computer from the network .
9、 Then click the user name again Guest Users of , Click delete and then click OK to complete .
Why is access denied when connecting a shared printer to a computer ? Friends who often use printers , Often share a printer with multiple computers , What should I do if the computer sharing printer refuses access ? Here is a way to share with you .
1、 With win10 Take the system as an example , Right click the start menu icon on the desktop , Then select run to open the run window , Or you can go directly through win+r Shortcut key to open .
2、 Then enter gpedit.msc Press enter again .
3、 In the window of local security policy , In the left column, follow the security settings - The local policy - Click to open the configuration of user permission assignment .
4、 Then find the service item of accessing this computer from the network in the expanded right window , Right click and then click properties .
5、 Then click add user or group in the properties window of accessing this computer from the network .
6、 Click Advanced... In the window that appears to select users or groups .
7、 Then see this interface and click find now , Then click the user name as Guest Users of , Then click ok .
8、 Then double click to open the service item of denying access to this computer from the network .
9、 Then click the user name again Guest Users of , Click delete and then click OK to complete .
边栏推荐
- 托管式服务网络:云原生时代的应用体系架构进化
- B2B mall system development of electronic components: an example of enabling enterprises to build standardized purchase, sale and inventory processes
- 九齐NY8B062D MCU规格书/datasheet
- 什么叫内卷?
- Jiuqi ny8b062d MCU specification /datasheet
- Regular replacement [JS, regular expression]
- Neural network IOT platform construction (IOT platform construction practical tutorial)
- 电脑页面不能全屏怎么办?Win11页面不能全屏的解决方法
- #夏日挑战赛#带你玩转HarmonyOS多端钢琴演奏
- 1500万员工轻松管理,云原生数据库GaussDB让HR办公更高效
猜你喜欢
如何让你的小游戏适配不同尺寸的手机屏幕
Practical examples of node strong cache and negotiation cache
Qt编写物联网管理平台38-多种数据库支持
紫光展锐完成全球首个 5G R17 IoT NTN 卫星物联网上星实测
科普达人丨一文看懂阿里云的秘密武器“神龙架构”
Form组件常用校验规则-1(持续更新中~)
How to adapt your games to different sizes of mobile screen
Qt五子棋人机对战画棋子之QPainter的使用误区总结
[ismb2022 tutorial] the picture shows the precision medicine of learning. Marinka zitnik, Harvard University, keynote speaker, with 87 ppt
Common verification rules of form components -1 (continuously updating ~)
随机推荐
Informatics Olympiad 1336: [example 3-1] find roots and children
实践示例理解js强缓存协商缓存
In operation (i.e. included in) usage of SSRs filter
复杂因子计算优化案例:深度不平衡、买卖压力指标、波动率计算
Flet教程之 08 AppBar工具栏基础入门(教程含源码)
强化学习-学习笔记2 | 价值学习
Optimize if code with policy mode [policy mode]
Application practice | Shuhai supply chain construction of data center based on Apache Doris
Offset function and windowing function
Flet教程之 06 TextButton基础入门(教程含源码)
FS8B711S14电动红酒开瓶器单片机IC方案开发专用集成IC
【历史上的今天】7 月 4 日:第一本电子书问世;磁条卡的发明者出生;掌上电脑先驱诞生
Dynamic memory management
软件客户端数字签名一定要申请代码签名证书吗?
Hash quiz game system development how to develop hash quiz game system development (multiple cases)
Huawei Nova 10 series supports the application security detection function to build a strong mobile security firewall
长城证券开户安全吗 股票开户流程网上开户
Integritee通过XCM集成至Moonriver,为其生态系统带来企业级隐私解决方案
Ziguang zhanrui completed the first 5g R17 IOT NTN satellite on the Internet of things in the world
[Beijing Xunwei] i.mx6ull development board porting Debian file system