SlideShare una empresa de Scribd logo
1 de 20
Module 2: Setting Up
  User Accounts
Overview


     Introduction to User Accounts
     Requirements for New User Accounts
     Creating a Domain User Account
     Setting Password Requirements
     Setting Properties for User Accounts
     Best Practices
 Introduction to User Accounts


     Domain User Accounts
     Local User Accounts
     Built-in User Accounts
Domain User Accounts

      Provides Access to Network Resources
      Created on a Domain Controller

                                     Dom
                                          ai
                                     Use n
                                   Acc r
                                      oun
          Domain Controller              t     Active Directory




                              Domain                         Network Resources

Domain User                     Access
Local User Accounts

    Provides Access to Resources on the Local Computer
    Create Only on Computers That Are Not in a Domain
    Created in the Local Security Database




                                         Local
                                         User
                                        Account
                                      Local Security
                                        Database
               Local User
Built-in User Accounts


       Administrator      Manages:
                             User accounts and groups

                             Security policies

                             File and print resources




          Guest           Disabled by Default
                          Used for Occasional Access
                          Limited Access to Resources
 Requirements for New User Accounts


     Naming Conventions
     Secure Password
     Account Options to Set
Naming Conventions

    User Logon Names and Full Names Must Be Unique
        Domain user accounts must be unique to Active Directory
        Local user accounts must be unique on the computer
    User Logon Names Can Contain up to 20 Characters
    Consider a Naming Convention That:
        Accommodates duplicate employee names
        Identifies temporary employees
Secure Password


     Assign a Password for the Administrator Account
     Determine Who Has Control Over Passwords
     Educate Users on How to Use Passwords
         Avoid obvious associations, such as a family name
         Use long passwords
         Use a combination of uppercase and lowercase
          characters
Account Options to Set


     Set Logon Hours to Users’ Work Hours
     Specify the Computers from Which a User Can Log On
         Domain users can log on at any computer in the domain,
          by default
         Restrict domain users to specific computers to increase
          security
     Determine Whether a User Account Should Expire
Creating a Domain User Account
 dsa - [Active Directory Users and Computers]
  Console     Window    Help

Active View


 Active Directory      Delegate control…
     nwtraders         Find….            Create New Object (User)
        Accounts
        Builtin        New
        Computers      New                        Create in:     nwtraders.msft/Users
        Information    All Tasks
        Users          View
                       New Window from Here name:
                                        First                  Judy
                                          Last name:           Lew
                       Refresh
                       Export List…       Name:                Judy Lew

                                          User logon name:
                       Properties
                                           judy1                          @nwtraders.msft
                       Help               Downlevel logon name:
                                           NWTRADERS



                                                                          < Back   Next >   Cancel
Setting Password Requirements
       Create New Object (User)


               Create in:   nwtraders.msft/Users



        Password:              ********
        Confirm Password:      ********

            User must change password at next logon
            User cannot change password
            Password never expires
            Account disabled




                                          < Back   Next >   Cancel
 Setting Properties for User Accounts

     Setting Personal Properties
     Setting Account Properties
     Setting Logon Hours
     Setting the Computers from Which Users Can Log On
     Configuring Dial-up Settings
Setting Personal Properties


     Add Personal Information About
                                                   Active Directory
      Users
     Use Personal Properties to Search
      Active Directory

           Amy Jones Properties

            Telephone/Notes   Organization     Member Of
             General     Address     Account     General
Setting Account Properties
                                    Judy Lew Properties
Judy Lew            User             Telephone/Notes Organization Member Of   Dial-in
User Two            User              General       Address      Account    Profile
User Three
User Four                            User logon name:1
User Five                             Judyl                            nwtraders.msft
User SixAdd members to a Group...    Downlevel logon name:
        Disable Account
                                      NWTRADERS
        Reset Password…
        Move…                         Logon Hours...     Logon To...
        Open home page
        Send mail                      Account locked out
                                     Account options:
       All Tasks
                                         User must change password at next logon
       Delete
                                         User cannot change password
       Rename
                                         Password never expires
       Refresh
                                         Save password as encrypted clear text

       Properties
       Properties                      Account expires
                                          Never
       Help                              End of:        Saturday ,     May     01, 1999


                                                                OK            Cancel      Apply
Setting Logon Hours
  Logon Hours for Judy Lew



                . . . 6 .8 .10.12. 2 .4 . 6 . 8 .10.12
               12 2 4
                                                          OK

                                                         Cancel

    Sunday
    Monday
                                                          Logon Permitted
    Tuesday
   Wednesday                                              Logon Denied

    Thursday
     Friday
    Saturday
Setting the Computers from Which Users Can Log On

     Judy Lew - Logon Workstations                                       ?

         User may log on to all workstations       Default
         User may log on to these workstations:
       Enter the computer’s NetBIOS name:
       Brisbane                                                  Add

       Perth                                                    Remove

                                                                Change




       Note: the NetBIOS protocol is needed for this feature.

                                                  Close          Cancel
Configuring Dial-up Settings
                          User1 Properties

                           General Address Account Profile Telephones/Notes Organization
                             Member Of       Dial-in      Environment       Timeouts

                             Remote Access Permission (Dial-in or VPN)

                                Allow access

                                Deny access

  User Can Work                 Control access through Remote Access Policy

  Remotely by
                  Setup         Verify Caller-ID:
  Using Dial-Up               Callback Options
  Connections                   No Callback
                                Set by Caller (RAS only)

                                Always Callback to:


                                Assign Static IP Address
                                Apply Static Routes

                             Define routes to enable for this Dial-in
                                                                        Static Routes...
                             connection.




                                                            OK          Cancel             Apply
Best Practices

   Rename the Administrator Account

   Create a User Account with Administrative Rights

   Create a User Account for Non-Administrative Tasks

   Enable the Guest Account Only in Low Security Networks

   Create Random Initial Passwords

   Require New Users to Change Their Passwords

   Set Account Expiration Dates for Temporary Employees
Review


     Introduction to User Accounts
     Requirements for New User Accounts
     Creating a Domain User Account
     Setting Password Requirements
     Setting Properties for User Accounts
     Best Practices

Más contenido relacionado

Similar a 1556 a 02

10 necto administration_ready
10 necto administration_ready10 necto administration_ready
10 necto administration_ready
www.panorama.com
 
System Hardening Recommendations_FINAL
System Hardening Recommendations_FINALSystem Hardening Recommendations_FINAL
System Hardening Recommendations_FINAL
Martin Evans
 
Chapter03 Creating And Managing User Accounts
Chapter03      Creating And  Managing  User  AccountsChapter03      Creating And  Managing  User  Accounts
Chapter03 Creating And Managing User Accounts
Raja Waseem Akhtar
 
Microsoft Offical Course 20410C_03
Microsoft Offical Course 20410C_03Microsoft Offical Course 20410C_03
Microsoft Offical Course 20410C_03
gameaxt
 
md UI spec demo
md UI spec demomd UI spec demo
md UI spec demo
yiwensyao
 

Similar a 1556 a 02 (20)

UNIT 6-EXPLAINING THE ROLE OF THE NETWORK ADMINISTRATOR AND SUPPORT.pptx
UNIT 6-EXPLAINING THE ROLE OF THE NETWORK ADMINISTRATOR AND SUPPORT.pptxUNIT 6-EXPLAINING THE ROLE OF THE NETWORK ADMINISTRATOR AND SUPPORT.pptx
UNIT 6-EXPLAINING THE ROLE OF THE NETWORK ADMINISTRATOR AND SUPPORT.pptx
 
Where should I be encrypting my data?
Where should I be encrypting my data? Where should I be encrypting my data?
Where should I be encrypting my data?
 
Windows Server 2012 Managing Active Directory Domain
Windows Server 2012 Managing  Active Directory DomainWindows Server 2012 Managing  Active Directory Domain
Windows Server 2012 Managing Active Directory Domain
 
10 necto administration_ready
10 necto administration_ready10 necto administration_ready
10 necto administration_ready
 
Credential provider
Credential providerCredential provider
Credential provider
 
System Hardening Recommendations_FINAL
System Hardening Recommendations_FINALSystem Hardening Recommendations_FINAL
System Hardening Recommendations_FINAL
 
Chapter03 Creating And Managing User Accounts
Chapter03      Creating And  Managing  User  AccountsChapter03      Creating And  Managing  User  Accounts
Chapter03 Creating And Managing User Accounts
 
1556 a 01
1556 a 011556 a 01
1556 a 01
 
Windows Small Business Server 2011 Nasıl Kullanılır
Windows Small Business Server 2011 Nasıl KullanılırWindows Small Business Server 2011 Nasıl Kullanılır
Windows Small Business Server 2011 Nasıl Kullanılır
 
SBS 2011 Kullanimi
SBS 2011 KullanimiSBS 2011 Kullanimi
SBS 2011 Kullanimi
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directory
 
Microsoft Offical Course 20410C_03
Microsoft Offical Course 20410C_03Microsoft Offical Course 20410C_03
Microsoft Offical Course 20410C_03
 
1556 a 03
1556 a 031556 a 03
1556 a 03
 
Chromium OS - User Accounts and Management
Chromium OS - User Accounts and ManagementChromium OS - User Accounts and Management
Chromium OS - User Accounts and Management
 
md UI spec demo
md UI spec demomd UI spec demo
md UI spec demo
 
Cl212
Cl212Cl212
Cl212
 
Rakesh New Resume
Rakesh New ResumeRakesh New Resume
Rakesh New Resume
 
Moodle + Adobe Connect
Moodle + Adobe Connect Moodle + Adobe Connect
Moodle + Adobe Connect
 

Más de Lê Liêu

Part05 communication security
Part05 communication securityPart05 communication security
Part05 communication security
Lê Liêu
 
Part04 key exchange protocols
Part04 key exchange protocolsPart04 key exchange protocols
Part04 key exchange protocols
Lê Liêu
 
Part04 basic cryptography
Part04 basic cryptographyPart04 basic cryptography
Part04 basic cryptography
Lê Liêu
 
Part02 access control authentication
Part02 access control   authenticationPart02 access control   authentication
Part02 access control authentication
Lê Liêu
 
Part01 general security concepts
Part01 general security conceptsPart01 general security concepts
Part01 general security concepts
Lê Liêu
 
Part06 infrastructure security
Part06 infrastructure securityPart06 infrastructure security
Part06 infrastructure security
Lê Liêu
 

Más de Lê Liêu (12)

1556 a 09
1556 a 091556 a 09
1556 a 09
 
1556 a 08
1556 a 081556 a 08
1556 a 08
 
1556 a 07
1556 a 071556 a 07
1556 a 07
 
1556 a 06
1556 a 061556 a 06
1556 a 06
 
1556 a 00
1556 a 001556 a 00
1556 a 00
 
1556 a 10
1556 a 101556 a 10
1556 a 10
 
Part05 communication security
Part05 communication securityPart05 communication security
Part05 communication security
 
Part04 key exchange protocols
Part04 key exchange protocolsPart04 key exchange protocols
Part04 key exchange protocols
 
Part04 basic cryptography
Part04 basic cryptographyPart04 basic cryptography
Part04 basic cryptography
 
Part02 access control authentication
Part02 access control   authenticationPart02 access control   authentication
Part02 access control authentication
 
Part01 general security concepts
Part01 general security conceptsPart01 general security concepts
Part01 general security concepts
 
Part06 infrastructure security
Part06 infrastructure securityPart06 infrastructure security
Part06 infrastructure security
 

Último

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

1556 a 02

  • 1. Module 2: Setting Up User Accounts
  • 2. Overview  Introduction to User Accounts  Requirements for New User Accounts  Creating a Domain User Account  Setting Password Requirements  Setting Properties for User Accounts  Best Practices
  • 3.  Introduction to User Accounts  Domain User Accounts  Local User Accounts  Built-in User Accounts
  • 4. Domain User Accounts  Provides Access to Network Resources  Created on a Domain Controller Dom ai Use n Acc r oun Domain Controller t Active Directory Domain Network Resources Domain User Access
  • 5. Local User Accounts  Provides Access to Resources on the Local Computer  Create Only on Computers That Are Not in a Domain  Created in the Local Security Database Local User Account Local Security Database Local User
  • 6. Built-in User Accounts Administrator  Manages:  User accounts and groups  Security policies  File and print resources Guest  Disabled by Default  Used for Occasional Access  Limited Access to Resources
  • 7.  Requirements for New User Accounts  Naming Conventions  Secure Password  Account Options to Set
  • 8. Naming Conventions  User Logon Names and Full Names Must Be Unique  Domain user accounts must be unique to Active Directory  Local user accounts must be unique on the computer  User Logon Names Can Contain up to 20 Characters  Consider a Naming Convention That:  Accommodates duplicate employee names  Identifies temporary employees
  • 9. Secure Password  Assign a Password for the Administrator Account  Determine Who Has Control Over Passwords  Educate Users on How to Use Passwords  Avoid obvious associations, such as a family name  Use long passwords  Use a combination of uppercase and lowercase characters
  • 10. Account Options to Set  Set Logon Hours to Users’ Work Hours  Specify the Computers from Which a User Can Log On  Domain users can log on at any computer in the domain, by default  Restrict domain users to specific computers to increase security  Determine Whether a User Account Should Expire
  • 11. Creating a Domain User Account dsa - [Active Directory Users and Computers] Console Window Help Active View Active Directory Delegate control… nwtraders Find…. Create New Object (User) Accounts Builtin New Computers New Create in: nwtraders.msft/Users Information All Tasks Users View New Window from Here name: First Judy Last name: Lew Refresh Export List… Name: Judy Lew User logon name: Properties judy1 @nwtraders.msft Help Downlevel logon name: NWTRADERS < Back Next > Cancel
  • 12. Setting Password Requirements Create New Object (User) Create in: nwtraders.msft/Users Password: ******** Confirm Password: ******** User must change password at next logon User cannot change password Password never expires Account disabled < Back Next > Cancel
  • 13.  Setting Properties for User Accounts  Setting Personal Properties  Setting Account Properties  Setting Logon Hours  Setting the Computers from Which Users Can Log On  Configuring Dial-up Settings
  • 14. Setting Personal Properties  Add Personal Information About Active Directory Users  Use Personal Properties to Search Active Directory Amy Jones Properties Telephone/Notes Organization Member Of General Address Account General
  • 15. Setting Account Properties Judy Lew Properties Judy Lew User Telephone/Notes Organization Member Of Dial-in User Two User General Address Account Profile User Three User Four User logon name:1 User Five Judyl nwtraders.msft User SixAdd members to a Group... Downlevel logon name: Disable Account NWTRADERS Reset Password… Move… Logon Hours... Logon To... Open home page Send mail Account locked out Account options: All Tasks User must change password at next logon Delete User cannot change password Rename Password never expires Refresh Save password as encrypted clear text Properties Properties Account expires Never Help End of: Saturday , May 01, 1999 OK Cancel Apply
  • 16. Setting Logon Hours Logon Hours for Judy Lew . . . 6 .8 .10.12. 2 .4 . 6 . 8 .10.12 12 2 4 OK Cancel Sunday Monday Logon Permitted Tuesday Wednesday Logon Denied Thursday Friday Saturday
  • 17. Setting the Computers from Which Users Can Log On Judy Lew - Logon Workstations ? User may log on to all workstations Default User may log on to these workstations: Enter the computer’s NetBIOS name: Brisbane Add Perth Remove Change Note: the NetBIOS protocol is needed for this feature. Close Cancel
  • 18. Configuring Dial-up Settings User1 Properties General Address Account Profile Telephones/Notes Organization Member Of Dial-in Environment Timeouts Remote Access Permission (Dial-in or VPN) Allow access Deny access User Can Work Control access through Remote Access Policy Remotely by Setup Verify Caller-ID: Using Dial-Up Callback Options Connections No Callback Set by Caller (RAS only) Always Callback to: Assign Static IP Address Apply Static Routes Define routes to enable for this Dial-in Static Routes... connection. OK Cancel Apply
  • 19. Best Practices Rename the Administrator Account Create a User Account with Administrative Rights Create a User Account for Non-Administrative Tasks Enable the Guest Account Only in Low Security Networks Create Random Initial Passwords Require New Users to Change Their Passwords Set Account Expiration Dates for Temporary Employees
  • 20. Review  Introduction to User Accounts  Requirements for New User Accounts  Creating a Domain User Account  Setting Password Requirements  Setting Properties for User Accounts  Best Practices