Windows Client OS

Add Volume Control in Windows XP

Where did the volume control icon disappear in Windows XP?

This is another stupid "feature" of Windows XP. I usually restore the volume control icon back to where it belongs: The notification area of the tray.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

To display the volume control icon in the notification area:

  1. Open Sounds and Audio Devices in Control Panel.

  2. On the Volume tab, under Device volume, select the Place volume icon in the taskbar notification area check box.

If your sound card volume can be changed using software, a speaker icon appears in the notification area. You can change the volume by clicking the icon and adjusting the slider.

Just like in Windows 2000, you can also use Volume Control to adjust the volume, balance, bass, and treble settings for sounds played on your computer or by multimedia applications. You can also use Volume Control to adjust the level of system sounds, microphones, CD audio, line-in, synthesizer, and wave output.

To open Volume Control, click Start, point to All Programs, point to Accessories, point to Entertainment, and then click Volume Control.

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: