Sunday, February 9, 2025
HomeTechnologyNetwork Adapter Priorities | Windows

Network Adapter Priorities | Windows

Published on

SIEM as a Service

Follow Us on Google News

 
Network Adapter :

Network adapter is nothing but an component associated with the Computer’s/Laptop Internal’s hardware which is used to communicate with other computers/appliances over the network.

Now normally we are using Multiple network Adapters, for an Ethernet Connection, VMware, Wireless Connections, we can apply considerations on which network to be used. In our guide we are to examine the behaviour by using an Windows 10 machine.

Windows 10 is good enough and help us in picking correct network adapter if multiple network adapter is available. Now in this guide consider we are having Multiple Network adapters like Ethernet, Wireless, Vmware and VPN.

To Change Network Adapter Priorities

We are having two options in hand to change the adapater priorities, either with powershell or Network Interface Menus. So let’s dive deeper.

Powershell

  • To Launch powershell, tap on Windows key, type powershell and click on Windows powershell that displayed.
  • Now run the Command Get-NetIPInterface which displays all network adapters, their interface index number, and interface metric.
  • Now to change the priority of the adapter run the command Set-NetIPInterface -InterfaceIndex “Index of the adapter you want to change the priority for” -InterfaceMetric “new priority of the adapter”.

             Example: Set-NetIPInterface -InterfaceIndex “11” -InterfaceMetric “90”  ‘

  • Adapters with a lower InterfaceMetric number are prioritized over adapters that have a higher number.
  • Now again you can run the command to view the adapter details.
Interface Method(GUI)      
 
  • Tap on Windows key, type ncpa.cpl and hit the Enter-key to open Network Connection Settings.
  • Right click on the adapter you like to modify and then go to Properties.
  • Locate Internet Protocol Version 4 (TCP/IPv4), select it, and click on the Properties button. Note: If your connection is IPv6, select Internet Protocol Version 6 (TCP/IPv6) instead.
  • Locate and hit the advanced button.
  • Then you can a Network metric box, uncheck Automatic metric box and and enter a new custom Interface metric number (Ensure that you are providing a vaule 2 or higher, becuase 1 is reserved for loopback ).
  • Click ok and repeat the steps if you are suppose to do for Multiple adapters.
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPF Flattening: What Is It? Pros and Cons

To understand what SPF flattening is, we should first understand the role of SPF...

ERP System Development: A Guide to Building Scalable Business Solutions

With increased business development speed, such ERP software development is not a trend anymore,...

How To Detect A Hidden GPS Tracker In 3 Easy Steps

Someone could be stealing your privacy right now—and you’d never even know it. Hidden...