Networking

Change the Binding Order in Windows 2000

How do I change the Binding Order in Windows 2000?

To change the Binding Order in Windows 2000:

  1. Start / Settings / Control Panel.
  2. Double-click Network and Dial-up Connections.
  3. On the Advanced menu, press Advanced Settings.

  4. Select the adapter whose Binding Order you wish to change in the Connections box.
  5. Use the arrows on the right side of the Binding for <Adapter Name> to order the protocols.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

Notice how NWLink (IPX/SPX compatible protocol) places itself on top of the binding order! This something you don’t want to keep if you’re on a strictly Windows 2000 network with some occasional NetWare access.

  1. You can also disable specific protocols. For example, if you have 2 NICs and you don’t need NWLink bound to the File and Print Service you can un-check the check box next to that protocol under the specific service.

Note that when you do so, the File and Print Sharing (and the Client for Microsoft Networks) services will have a gray check-box on the NIC’s properties box.

This is to indicate that the specific service has some un-bound protocols. If all protocols are bound to the service, the gray check-box disappears.

  1. Press OK.
  2. If you are prompted to restart, press Yes.

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: