skip to Main Content

NoTouch Features: Painless Wireless Configuration

As wireless internet has become more prevalently used across all industries, NoTouch has evolved to operate seamlessly together with various Wireless LAN/WiFi/802.11/WLAN network scenarios, with or without personal or enterprise authentication methods. With NoTouch, configuration of WiFi networks is quick, easy and painless. Administrators can choose  settings within NoTouch Center, eliminating the need to visit the endpoint ever again.

Whenever a supported wireless network adapter is present, you can connect to available WiFi networks in your area. NoTouch offers three scenarios:

  1. A system administrator presets one (or multiple) allowed and configured wireless networks
  2. Users employ a graphical tool to connect to any available network that they may have access to, such as in a hotel, airplane or café
  3. A third-party tool, Network Manager, is used to bypass all of the regular NoTouch configuration methods.

How does wireless configuration work?

With NoTouch, it’s easy to setup a wireless connection. Simply open the local configuration application or go to the “Wireless LAN” tab within NoTouch Center.
Screenshot of NoTouch Wireless Configuration WindowThere are two parameters that must be set:
  1. Network name (SSID): Set this to the SSID of your wireless network.
  2. Security: Set this to your desired authentication/security method. If you just have a “WiFi password”, then select “WPA2 Personal”. If you have certificates or username/password then you’ll rather use “WPA2 Enterprise”.
Possible values include none (no security used), WEP, WPA Enterprise, WPA Personal, WPA2 Enterprise and WPA2 Personal. NoTouch supports whatever authentication method necessary for your use-case. For more information, please see the detailed article in our online knowledge base, or contact our team of dedicated support engineers at [email protected]. We are happy to help!

NoTouch Features: Painless Wireless Configuration

As wireless internet has become more prevalently used across all industries, NoTouch has evolved to operate seamlessly together with various Wireless LAN/WiFi/802.11/WLAN network scenarios, with or without personal or enterprise authentication methods. With NoTouch, configuration of WiFi networks is quick, easy and painless. Administrators can choose  settings within NoTouch Center, eliminating the need to visit the endpoint ever again.

Whenever a supported wireless network adapter is present, you can connect to available WiFi networks in your area. NoTouch offers three scenarios:

  1. A system administrator presets one (or multiple) allowed and configured wireless networks
  2. Users employ a graphical tool to connect to any available network that they may have access to, such as in a hotel, airplane or café
  3. A third-party tool, Network Manager, is used to bypass all of the regular NoTouch configuration methods.

How does wireless configuration work?

With NoTouch, it’s easy to setup a wireless connection. Simply open the local configuration application or go to the “Wireless LAN” tab within NoTouch Center.
Screenshot of NoTouch Wireless Configuration WindowThere are two parameters that must be set:
  1. Network name (SSID): Set this to the SSID of your wireless network.
  2. Security: Set this to your desired authentication/security method. If you just have a “WiFi password”, then select “WPA2 Personal”. If you have certificates or username/password then you’ll rather use “WPA2 Enterprise”.
Possible values include none (no security used), WEP, WPA Enterprise, WPA Personal, WPA2 Enterprise and WPA2 Personal. NoTouch supports whatever authentication method necessary for your use-case. For more information, please see the detailed article in our online knowledge base, or contact our team of dedicated support engineers at [email protected]. We are happy to help!
Endpoint Security and Network Monitoring News for the Week of August 26; Updates from Contrast Security, Tanium, NordLayer, and More | #cybersecurity | #cyberattack

Stratodesk Achieves VMware Ready Status for 12 Consecutive Years Stratodesk, an endpoint security solutions provider,…

Read more

Subscribe to our newsletter:

Back To Top
X