SlideShare uma empresa Scribd logo
1 de 36
MANAGING USERS AND GROUPS Chapter 13
OVERVIEW ,[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
USER ACCOUNTS ,[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
Extra ,[object Object],[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
GROUPS ,[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
Active Directory? ,[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
BUILT-IN USER ACCOUNTS ,[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
More detail… ,[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
More detail… ,[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
More detail… ,[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
BUILT-IN GROUPS ,[object Object],[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
IMPLICIT GROUPS ,[object Object],[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
SERVICE ACCOUNTS ,[object Object],[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
Built-In Service Accounts ,[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
DOMAIN ACCOUNTS AND GROUPS ,[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
LOCAL USERS AND GROUPS Chapter 13: MANAGING USERS AND GROUPS
CONTROL PANEL USER ACCOUNTS Chapter 13: MANAGING USERS AND GROUPS
ACTIVE DIRECTORY USERS AND COMPUTERS Chapter 13: MANAGING USERS AND GROUPS
MANAGING USERS WITH NET.EXE Chapter 13: MANAGING USERS AND GROUPS The  NET USER  command can be called from batch files to automate repetitive management tasks. It is useful for scripted user account additions and changes.
PLANNING USERS AND GROUPS Chapter 13: MANAGING USERS AND GROUPS
USER ACCOUNT NAMING CONVENTIONS Chapter 13: MANAGING USERS AND GROUPS
PASSWORD COMPLEXITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
CHANGING HOW USERS LOG ON OR LOG OFF Chapter 13: MANAGING USERS AND GROUPS
MANAGING USERS WITH LOCAL USERS AND GROUPS Chapter 13: MANAGING USERS AND GROUPS
USER RIGHTS ASSIGNMENT Chapter 13: MANAGING USERS AND GROUPS
MANAGING GROUPS WITH LOCAL USERS AND GROUPS Chapter 13: MANAGING USERS AND GROUPS
MANAGING GROUPS WITH NET.EXE Chapter 13: MANAGING USERS AND GROUPS
MANAGING USERS WITH USER ACCOUNTS Chapter 13: MANAGING USERS AND GROUPS
USER MANAGEMENT BEST PRACTICES ,[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
MANAGING USER RIGHTS ASSIGNMENTS Chapter 13: MANAGING USERS AND GROUPS
MANAGING PASSWORD POLICY Chapter 13: MANAGING USERS AND GROUPS
MANAGING ACCOUNT LOCKOUT POLICY Chapter 13: MANAGING USERS AND GROUPS
CACHED CREDENTIALS ,[object Object],[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
MANAGING CACHED CREDENTIALS Chapter 13: MANAGING USERS AND GROUPS
TROUBLESHOOTING CACHED CREDENTIALS ,[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS
SUMMARY ,[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 13: MANAGING USERS AND GROUPS

Mais conteúdo relacionado

Destaque

Parking hormigon prefabricado
Parking hormigon prefabricadoParking hormigon prefabricado
Parking hormigon prefabricadoCAMPUS11
 
IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16blusmurfydot1
 
Stay Out Please
Stay Out PleaseStay Out Please
Stay Out Pleaseefim13
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02blusmurfydot1
 
La energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoLa energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoEuler Ruiz
 
Assistive technology
Assistive technologyAssistive technology
Assistive technologykturne10
 
DTA 2011 REV B
DTA 2011 REV BDTA 2011 REV B
DTA 2011 REV Btynanderek
 
IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08blusmurfydot1
 
Building Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise WorldBuilding Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise Worldefim13
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07blusmurfydot1
 
IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07blusmurfydot1
 
Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06blusmurfydot1
 
La computadora
La computadoraLa computadora
La computadorasilovera
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10blusmurfydot1
 
El aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEl aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEuler Ruiz
 
Zonas erroneas y la salud mental
Zonas erroneas y la salud mentalZonas erroneas y la salud mental
Zonas erroneas y la salud mentalEuler Ruiz
 

Destaque (20)

Parking hormigon prefabricado
Parking hormigon prefabricadoParking hormigon prefabricado
Parking hormigon prefabricado
 
IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16
 
Stay Out Please
Stay Out PleaseStay Out Please
Stay Out Please
 
Javascript for Wep Apps
Javascript for Wep AppsJavascript for Wep Apps
Javascript for Wep Apps
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
 
Test bram
Test bramTest bram
Test bram
 
IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02
 
La energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoLa energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologico
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
 
DTA 2011 REV B
DTA 2011 REV BDTA 2011 REV B
DTA 2011 REV B
 
IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14
 
IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08
 
Building Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise WorldBuilding Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise World
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
 
IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07
 
Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06
 
La computadora
La computadoraLa computadora
La computadora
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
 
El aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEl aprendizaje y el cerebro humano
El aprendizaje y el cerebro humano
 
Zonas erroneas y la salud mental
Zonas erroneas y la salud mentalZonas erroneas y la salud mental
Zonas erroneas y la salud mental
 

Semelhante a IT103Microsoft Windows XP/OS Chap13

Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Sangeetha Rangarajan
 
Addmi 06-security mgmt
Addmi 06-security mgmtAddmi 06-security mgmt
Addmi 06-security mgmtodanyboy
 
Topic # 14 of outline Administer Local Users and Groups.pptx
Topic # 14 of outline Administer Local Users and Groups.pptxTopic # 14 of outline Administer Local Users and Groups.pptx
Topic # 14 of outline Administer Local Users and Groups.pptxAyeCS11
 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administratorAisha Talat
 
2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptxMitikuAbebe2
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerHitachi ID Systems, Inc.
 
Database_Security.ppt
Database_Security.pptDatabase_Security.ppt
Database_Security.pptmissionsk81
 
Chapter 6 Database Security and Authorization (4).pdf
Chapter 6 Database Security and Authorization (4).pdfChapter 6 Database Security and Authorization (4).pdf
Chapter 6 Database Security and Authorization (4).pdfabrehamcheru14
 
Standard IAM Business Processes: Corporate / Intranet Deployment
Standard IAM Business Processes: Corporate / Intranet DeploymentStandard IAM Business Processes: Corporate / Intranet Deployment
Standard IAM Business Processes: Corporate / Intranet DeploymentHitachi ID Systems, Inc.
 
Better access control of administrators
Better access control of administratorsBetter access control of administrators
Better access control of administratorsRahul Sisondia
 
Web–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive GraphsWeb–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive GraphsMike Taylor
 
Web–based crm application with interactive graphs
Web–based crm application with interactive graphsWeb–based crm application with interactive graphs
Web–based crm application with interactive graphsMike Taylor
 
Secure Code Warrior - Least privilege
Secure Code Warrior - Least privilegeSecure Code Warrior - Least privilege
Secure Code Warrior - Least privilegeSecure Code Warrior
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager IntroductionAidy Tificate
 

Semelhante a IT103Microsoft Windows XP/OS Chap13 (20)

Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
 
Addmi 06-security mgmt
Addmi 06-security mgmtAddmi 06-security mgmt
Addmi 06-security mgmt
 
Topic # 14 of outline Administer Local Users and Groups.pptx
Topic # 14 of outline Administer Local Users and Groups.pptxTopic # 14 of outline Administer Local Users and Groups.pptx
Topic # 14 of outline Administer Local Users and Groups.pptx
 
Less07 Users
Less07 UsersLess07 Users
Less07 Users
 
Presentation gggffggggg.pdf
Presentation                     gggffggggg.pdfPresentation                     gggffggggg.pdf
Presentation gggffggggg.pdf
 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administrator
 
70 271 Stu Chap03
70 271 Stu Chap0370 271 Stu Chap03
70 271 Stu Chap03
 
2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
70 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 04100970 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 041009
 
Database_Security.ppt
Database_Security.pptDatabase_Security.ppt
Database_Security.ppt
 
Chapter 6 Database Security and Authorization (4).pdf
Chapter 6 Database Security and Authorization (4).pdfChapter 6 Database Security and Authorization (4).pdf
Chapter 6 Database Security and Authorization (4).pdf
 
Standard IAM Business Processes: Corporate / Intranet Deployment
Standard IAM Business Processes: Corporate / Intranet DeploymentStandard IAM Business Processes: Corporate / Intranet Deployment
Standard IAM Business Processes: Corporate / Intranet Deployment
 
Better access control of administrators
Better access control of administratorsBetter access control of administrators
Better access control of administrators
 
Web–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive GraphsWeb–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive Graphs
 
Web–based crm application with interactive graphs
Web–based crm application with interactive graphsWeb–based crm application with interactive graphs
Web–based crm application with interactive graphs
 
Secure Code Warrior - Least privilege
Secure Code Warrior - Least privilegeSecure Code Warrior - Least privilege
Secure Code Warrior - Least privilege
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
 
70 640 Lesson06 Ppt 041009
70 640 Lesson06 Ppt 04100970 640 Lesson06 Ppt 041009
70 640 Lesson06 Ppt 041009
 

Mais de blusmurfydot1

IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05blusmurfydot1
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04blusmurfydot1
 
Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01blusmurfydot1
 
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01blusmurfydot1
 

Mais de blusmurfydot1 (14)

IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06
 
IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15
 
IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12
 
IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04
 
Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03
 
IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02
 
IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01
 
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
 
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
 
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
 
IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01
 

IT103Microsoft Windows XP/OS Chap13

Notas do Editor

  1. In this chapter, students learn how to put together users and groups. They are introduced to user accounts, groups, user rights assignment, account policy, and cached credentials. These slides illustrate some of the topics in more detail than in the text, showing students the dialog boxes and answering any questions they might have.
  2. User accounts are the basic unit of identity for a user. All processes in Windows XP run under the guise of a user account. System processes and service processes even run as users. You can grant users access to resources by associating their security identifier (SID), a part of their identity, with discretionary access control lists (DACLs) belonging to objects. This association, embodied in an access control entry (ACE), forms the foundation for security in Windows XP. In Active Directory, user accounts are even more important—they are the repository for data about the user. They can contain a user’s address, phone/fax numbers, and even personnel data.
  3. Users can be collected into groups to simplify assignment of permissions. By collecting users into a group, you can make a single assignment to grant permissions to all those users at once. In Active Directory, groups can be designated for security or distribution. Distribution groups are used to simplify messaging.
  4. Built-in accounts are created during setup of the operating system. The Administrator account is intended for system administration tasks and has the appropriate rights and permissions to perform any maintenance and configuration task on the system. The Guest account is for granting temporary access to guests. It is disabled by default. This account does not have any administrative function or permissions. Discuss the security implications of these two accounts. The Administrator account can be renamed, but it retains its distinctive SID and is a favorite target for hackers because it cannot be locked out. The Guest account is usually left disabled, and guests are instead added to the Guests local group. Mention the System account as well. It does not have interactive logon ability, but it is the account most system processes are executed under. It is equal in power and permissions to the Administrator account.
  5. Built-in groups are designed to allow users to be given specific rights and permissions based on their role. Placing users in certain built-in groups gives them specific administrative abilities on the system. Discuss the built-in groups listed in the textbook. Describe how some of these groups are used to define administrative roles in Windows XP. Give an example of when each group might be used.
  6. Implicit groups are an important tool that administrators can use to control access to resources based on how those resources are accessed. The list in the textbook describes how some of these groups are used. Be prepared to offer an anecdote about how you have used an implicit group to simplify a security issue.
  7. Service accounts allow system services and services required by installed applications to access resources. Permissions can be granted to the accounts as if they were real users. Discuss the built-in service accounts: Service, Local Service, and Network Service. Also discuss some of the user rights (such as Log On As A Service) required for a service to use a service account properly. Also mention that service accounts should be configured to not allow passwords to expire. Mention some of the service accounts (such as IUSR_ <system name> , used by Windows XP to support IIS and other applications). Open the Services console and show students how service accounts are assigned to services.
  8. When you discuss domain user accounts and groups, point out how users and groups from the domain can be placed into local groups to give them rights and permissions on the local system.
  9. This slide shows the Local Users and Groups snap-in, both in the Computer Management console and in a standalone console. If time permits, demonstrate how to create a custom user management console by adding the standalone Local Users and Groups snap-in to an empty Microsoft Management Console.
  10. This slide depicts the User Accounts tool in Control Panel. Point out that this tool creates only basic user accounts, placing them in the Users or Administrators built-in group. Managing user profile settings or assigning membership in other groups requires use of the Local Users and Groups snap-in or the Net User tool. However, the User Accounts tool is the only tool that allows you to designate the user’s logon icon.
  11. This slide depicts the Active Directory Users and Computers console, the principal user management tool for Active Directory domains. Mention other tasks you can perform with it, such as Group Policy management and management of domain computer accounts.
  12. The NET USER command can be called from batch files to automate repetitive management tasks. It is useful for scripted user account additions and changes. You can also create a batch file that uses command-line parameters to quickly add or remove specific user accounts. Point out the available command options in the textbook and, if time permits, demonstrate adding and removing a user using Net.exe.
  13. This slide shows the planning stages for users and groups. It begins with users and files. Users are collected into groups, and the files are collected into folders. Permissions are given to the group, and in the last frame, a new user gains access to the folder simply by being placed into the group. As you explain this approach, try to offer real-world examples.
  14. Use this slide to discuss how to provide the listed users with unique usernames. Discuss ways to ensure uniqueness, such as adding numbers to the end of the name or including the middle initial. Present a few real-world scenarios as well.
  15. Passwords are a weakness in many organizations. Discuss ways to create strong but memorable passwords. Discuss the use of nonalphanumeric characters in passwords. Describe the two main hacker attacks against passwords and how a long, complex password makes those attacks less likely to succeed. Dictionary attack, where the attacker uses word combinations to guess the password Brute force attack, where the attacker uses every combination of letter, number, and special characters until he guesses the password
  16. This slide depicts the selection of the Welcome screen and Classic logon dialog box in the User Accounts tool in Control Panel. Discuss when each logon method might be useful. Demonstrate the configuration of this option if time permits.
  17. This slide shows the Local Users and Groups snap-in being used to manage a user account from creation to deletion. As you step through the frames, discuss each dialog box and its options.
  18. This slide shows the Local Security Settings console displaying the User Rights Assignment section of Local Security Policy. Discuss the user rights listed in the textbook and describe how or where each might be used. Describe a real-world scenario such as a system that requires shutdown restrictions or a user who is responsible for backing up and restoring files.
  19. This slide depicts the management of a group using Local Users and Groups. If possible, walk through this process in class. Point out the warning at the end, and be sure to note its content—that a group created later with the same name will have a new SID and will not gain access to resources granted to this group.
  20. This slide depicts the management of the local group Finance using the Net command with the Localgroup option. If possible, discuss the management of users and groups using the Net command, and demonstrate the creation of a group. Also, mention the Group option of the Net command for domain global group management.
  21. This slide shows a user being created, managed, and deleted with the User Accounts tool in Control Panel. Discuss the limitations of this method—namely, the inability to work with any groups other than the built-in Users and Administrators groups.
  22. This list mirrors the best practices list in the textbook. Discuss the reasoning behind each point, and ask students for examples of when each item would apply.
  23. This slide depicts the addition of the user John to the list of users allowed to shut down the system. If possible, demonstrate this using a system in the classroom.
  24. Discuss the settings available in Local Security Policy to manage password strength. Demonstrate the configuration of these settings, if possible.
  25. Discuss the settings available in Local Security Policy to manage account lockouts. Demonstrate the configuration of these settings, if possible. Describe real-world scenarios where use of account lockouts can thwart an attacker.
  26. Cached credentials are used for mobile systems that are not always connected to a domain and to speed startup and logon by letting users log on before network services are fully started. Discuss the use of cached credentials and the following guidelines: Users must log on to the domain once to cache credentials for future logons. Users whose passwords were changed might be able to log on with their previous password. Disabled or deleted users can log on if their credentials have not been deleted.
  27. This slide depicts the Group Policy setting used to manage cached credentials in Windows XP. Describe the effects on a system if this value is set to 0 (cached credentials disabled).
  28. This slide lists three potential issues with cached credentials. Discuss the symptoms of each and see if students can offer the correct solution to each scenario. Be sure to discuss the necessity of logging on to a domain at least once to cache credentials for offline use.
  29. This slide follows the summary in the textbook. Discuss each item, emphasizing important points. Answer any final questions.