当前位置:网站首页>What should I do if my computer sharing printer refuses access
What should I do if my computer sharing printer refuses access
2022-07-04 20:41:00 【Xiaobai one click reinstallation system】
Why is access denied when connecting a shared printer to a computer ? Friends who often use printers , Often share a printer with multiple computers , What should I do if the computer sharing printer refuses access ? Here is a way to share with you .
There are more details System reassembly Tutorials are available for reference
1、 With win10 Take the system as an example , Right click the start menu icon on the desktop , Then select run to open the run window , Or you can go directly through win+r Shortcut key to open .
2、 Then enter gpedit.msc Press enter again .
3、 In the window of local security policy , In the left column, follow the security settings - The local policy - Click to open the configuration of user permission assignment .
4、 Then find the service item of accessing this computer from the network in the expanded right window , Right click and then click properties .
5、 Then click add user or group in the properties window of accessing this computer from the network .
6、 Click Advanced... In the window that appears to select users or groups .
7、 Then see this interface and click find now , Then click the user name as Guest Users of , Then click ok .
8、 Then double click to open the service item of denying access to this computer from the network .
9、 Then click the user name again Guest Users of , Click delete and then click OK to complete .
Why is access denied when connecting a shared printer to a computer ? Friends who often use printers , Often share a printer with multiple computers , What should I do if the computer sharing printer refuses access ? Here is a way to share with you .
1、 With win10 Take the system as an example , Right click the start menu icon on the desktop , Then select run to open the run window , Or you can go directly through win+r Shortcut key to open .
2、 Then enter gpedit.msc Press enter again .
3、 In the window of local security policy , In the left column, follow the security settings - The local policy - Click to open the configuration of user permission assignment .
4、 Then find the service item of accessing this computer from the network in the expanded right window , Right click and then click properties .
5、 Then click add user or group in the properties window of accessing this computer from the network .
6、 Click Advanced... In the window that appears to select users or groups .
7、 Then see this interface and click find now , Then click the user name as Guest Users of , Then click ok .
8、 Then double click to open the service item of denying access to this computer from the network .
9、 Then click the user name again Guest Users of , Click delete and then click OK to complete .
边栏推荐
- C language - Introduction - Foundation - grammar - process control (VII)
- [today in history] July 4: the first e-book came out; The inventor of magnetic stripe card was born; Palm computer pioneer was born
- 记一次 .NET 某工控数据采集平台 线程数 爆高分析
- Informatics Olympiad 1336: [example 3-1] find roots and children
- Related concepts of federal learning and motivation (1)
- word中使用自动插入题注功能
- Win11无法将值写入注册表项如何解决?
- Integritee通过XCM集成至Moonriver,为其生态系统带来企业级隐私解决方案
- NetCore3.1 Json web token 中间件
- 针对深度学习的“失忆症”,科学家提出基于相似性加权交错学习,登上PNAS
猜你喜欢
Flet教程之 05 OutlinedButton基础入门(教程含源码)
Decryption function calculates "task state and lifecycle management" of asynchronous task capability
Pytoch learning (4)
Jiuqi ny8b062d MCU specification /datasheet
Optimization cases of complex factor calculation: deep imbalance, buying and selling pressure index, volatility calculation
针对深度学习的“失忆症”,科学家提出基于相似性加权交错学习,登上PNAS
Wireshark network packet capture
Understand the reading, writing and creation of files in go language
Win11亮度被锁定怎么办?Win11亮度被锁定的解决方法
Managed service network: application architecture evolution in the cloud native Era
随机推荐
Practical examples of node strong cache and negotiation cache
Template_ Judging prime_ Square root / six prime method
In operation (i.e. included in) usage of SSRs filter
NLP, vision, chip What is the development direction of AI? Release of the outlook report of Qingyuan Association [download attached]
Decryption function calculates "task state and lifecycle management" of asynchronous task capability
【ISMB2022教程】图表示学习的精准医疗,哈佛大学Marinka Zitnik主讲,附87页ppt
六石编程学:关于代码,有六个得意
2022 version of stronger jsonpath compatibility and performance test (snack3, fastjson2, jayway.jsonpath)
NetCore3.1 Json web token 中间件
idea插件
剑指 Offer II 80-100(持续更新)
电脑页面不能全屏怎么办?Win11页面不能全屏的解决方法
科普达人丨一文看懂阿里云的秘密武器“神龙架构”
go语言笔记(4)go常用管理命令
Oracle database, numbers Force 2 decimal places to display-Alibaba Cloud
PHP pseudo original API docking method
软件客户端数字签名一定要申请代码签名证书吗?
idea大小写快捷键
What is the application technology of neural network and Internet of things
In the first month of its launch, the tourist praise rate of this campsite was as high as 99.9%! How did he do it?