

Keep your PSKs secure to avoid unauthorized access.Ĭompany proxy settings: Select to use the proxy settings within your organization. If the key is compromised, it can be used by any device to connect to the Wi-Fi network. The PSK is the same for all devices you target the profile to. Enter an ASCII string that is 8-63 characters long or use 64 hexadecimal characters.
#Text with wifi password
Enter this password or network key for the PSK value. When your organization's network is set up or configured, a password or network key is also configured. Shown when you choose WPA/WPA2-Personal as the security type. For more security, you can also enter a pre-shared key password or network key.

WPA/WPA2-Personal: A more secure option, and is commonly used for Wi-Fi connectivity. Open (no authentication): Only use this option if the network is unsecured. Wireless Security Type: Enter the security protocol used to authenticate devices on your network. Variable: Used this option if network traffic is charged per byte (cost per byte).After this limit is reached, network access is prohibited. Fixed: Use this option if the network is configured with fixed limit for network traffic.The connection isn't metered and there are no restrictions on traffic. Applications can then adjust their network traffic behavior based on this setting. Metered Connection Limit: An administrator can choose how the network's traffic is metered. Select No if you don't want this configuration profile to connect to your hidden network. Meaning, its service set identifier (SSID) isn't broadcast publicly. In this scenario, set the Connect to more preferred network if available property to No.Ĭonnect to this network, even when it is not broadcasting its SSID: Select Yes to automatically connect to your network, even when the network is hidden. When your corporate devices are within range, you want them to automatically connect to ContosoCorp. You also have a ContosoGuest Wi-Fi network within range. Select No to use the Wi-Fi network in this configuration profile.įor example, you create a ContosoCorp Wi-Fi network, and use ContosoCorp within this configuration profile. When No, devices don't automatically connect.Ĭonnect to more preferred network if available: If the devices are in range of a more preferred network, then select Yes to use the preferred network. For example, enter ContosoWiFi.Ĭonnect automatically when in range: When Yes, devices connect automatically when they're in range of this network.


The text you enter is the name users see when they browse the available connections on their device. However, users only see the Connection name you configure when they choose the connection.Ĭonnection name: Enter a user-friendly name for this Wi-Fi connection. This value is the real name of the wireless network that devices connect to. Wi-Fi name (SSID): Short for service set identifier. You can also add a pre-shared key to authenticate the connection. Typically, WPA/WPA2 is used on home networks or personal networks. Basic profileīasic or personal profiles use WPA/WPA2 to secure the Wi-Fi connection on devices.
#Text with wifi windows
Before you beginĬreate a Windows 10/11 Wi-Fi device configuration profile. This article describes some of these settings. Microsoft Intune offers many features, including authenticating to your network, using a pre-shared key, and more. Then, deploy this profile to your Windows client devices. You can create a profile with specific WiFi settings. For more information, see Settings catalog. To see the settings you can configure, create a device configuration profile, and select Settings Catalog. Not all settings are documented, and won’t be documented. Intune may support more settings than the settings listed in this article.
