C UNIT 4. Active Directory User Accounts

Size: px
Start display at page:

Download "C UNIT 4. Active Directory User Accounts"

Transcription

1 UN 4 Active irectory User Accounts

2 efinitions User individual granted access to the system with the following User properties Groups associated with the user Profile path Login script Home directory Groups logical collection of users Accounts Logical construct containing all information that defines a user to the 2008 environment

3 efinitions esources All equipment attached to the workstation or network Home irectories dedicated locations on a file server for a specific user to store files Policy a set of configurations that allows an administrator to restrict a user s access and rights ih Profile file containing a user s environmental settings and preferences

4 Local User Accounts Used to access the local computer only and are stored in the local Security Account Manager (SAM) database on the local computer Never replicated to other computers N have domain access

5 User omain Accounts Accounts used to access Active irectory or network based resources, such as shared folders or printers Account information i for these users is stored in the Active irectory database and replicated to all domain controllers within the same domain A subset of the domain user account information is replicated to the global catalog, which is then replicated to other global catalog servers throughout the forest

6 User/Group Name ules he name must be unique to the machine for local l accounts (or unique to the domain in the case of domain accounts) he username cannot be the same as a group name he name may be up to 20 characters, upper or lowercase or a combination of both

7 User/Group Name ules o avoid confusion with special syntax characters, names may not include any of the following: " / \[]:; =, + *? < > he name may include spaces and periods, but may not consist entirely of spaces or periods N: Names including spaces have to be enclosed in quotes forbothscriptingor command line use. Better to avoid using spaces

8 Accounts User and group accounts are managed using the Active irectory Users and omputers snap in omputer Management snap ins Account operations opy elete isable ename

9 User Account ptions User Must hange Password at Next Logon Forces a user to change their password the next time they log on and afterward the box will be unchecked. User annot hange Password f checked, prevents the user from changing the account s password.

10 User Account ptions Password Never xpires f checked, the user account ignores the password expiration policy, and thepassword for the account never expires Account s isabled f checked, the account is disabled and no one can log on to it until it is enabled (it is not, however, removed from the database)

11 Built in User Accounts Automatically created during the install Built in in user accounts can be local accounts or domain accounts, depending on whether the server is configured as a standalone server or a domain controller When you install a domain controller, the ability to create and manipulate local accounts is disabled By default, two built in user accounts are created on a Windows Server 2008 computer Administrator account Guest account

12 AMNSA Full control of computer, domain or forest depending on thecontext Used to establish administrative structure and createotheraccounts accounts Should be renamed Should be secured with iha complex password an be disabled, d but cannot be dl deletedd Should not be used for every day user tasks

13 GUS AUN esigned to allow temporary access to the network isabled by default, but cannot be deleted Should be secured with a complex password if enabled

14 AUHNAN

15 Group Accounts Groups are implemented to allow administrators to assign rights and permissions tomultiple users simultaneously A group can be defined as a collection of user or computer accounts that is used to simplify the assignment of rights or permissions to network resources

16 Group Accounts When a user logs on, an access token is created that identifies the user and all of the user s s group memberships his access token is used to verify a user s permissions i when the user attempts t to access a local l or network resource By using groups, multiple users can be given the same permission level for resources on the network Since a user s access token is only generated when they first log on to the network from their workstation, if you add a user to a group, they will need to log off and log back on again for that change to take effect

17 istribution groups Group ypes Non security related groups created for the distribution of information ypically used with applications to provide a list of users (Microsoft xchange) annot be used to assign access permissions Applications must be able to work with Active directory Security groups reated for purposes of granting resource access permissions to multiple users Primarily used to grant access to resources an also be used like a distribution group for e mail, if the group has an e mail address assigned Groups can be converted from security to distribution and back again as long a functional level is set to windows 2003 native or higher

18 Group Nesting Users can be members of more than one group. Groups can contain other Active irectory objects, such as computers, and other groups. Groups containing groups is called group nesting.

19 LAL GUPS nly on non Active irectory databases SAM database omain members local security databases ypically used in peer to peer (workgroup) networks Used to grant system rights and access to resources available on the local computer

20 MAN LAL GUPS alid members user accounts, computer accounts, global groups, universal groups fromany domain, and domain local groups from the same domain. Used to assign permissions to resources in the local domain. nce you assign permissions i to this group, you can use it to grant those permissions to other groups or users.

21 GLBAL GUPS alid members User accounts, computer accounts, and other global lgroups Used primarily to organize users Users are typically assigned to global groups based on job role, task, or title ou can use them to organize users who have similar il functions and therefore similar requirements on the network.

22 UNSAL GUPS alid members user accounts, computer accounts, global lor universal groups Used to organize users or groups of users in global groups Larger organizations typically y use universal groups to group accounts from different domains hanges to universal group membership lists are replicated to all global catalog servers throughout the forest

23 FAUL GUPS Built in security groups Pre defined permissions Administrators, Backup perators, Guests, Power Users, emote esktop, Network onfiguration and Users Placed in Built in and Users containers by default Groups are sometimes added when services are installed such as: HP Admins and HP Users NSAdmins and NS UpdateProxy

24 SPAL N GUPS Anonymous Logon no used id or password required veryone means everyone Authenticated Users logon with valid user id and password nteractive currently logged on the local computer Network all currently connected network users

25 Group Scope

26 AGULP Microsoft approach tousing groups: add Accounts to Global groups. add those global groups to Universal groups. Add universal groups to omain Local groups. Finally, assign Permissions to the domain local groups.

27 efault Groups Account perators an create, modify and deleteaccounts forusers, groups, and computers in all containers and Us annot modify administrators, i domain admins and enterprise admin groups Administrators i t omplete and unrestricted access to the computer or domain controller Backup perators an bypass security and back up and restore all files on the computer

28 efault Groups Guests Same privileges as members of the Users group isabled by default Print perators an manage printers and document queues Server perators an log on a server interactively, create and delete shares, start and stop some services, back up and restore files, format the disk, shutdown the computer and modify the system date and time

29 efault Groups Users Allows general access to run applications, i use printers, shut down and start the computer and use network shares for which h they are assigned permissions i NSAdmins Permits administrative access to the NS server service omain Admins an perform administrative tasks on any computer anywhere in the domain

30 efault Groups omain omputers ontains all computers and is used tomake computer management easier through group policies omain ontrollers ontains all computers installed in the domain as a domain controller omain Guests Members include all domain guests omain Users Members include all domain users Used to assign permissions to all users in the domain.

31 efault Groups nterprise Admins Allows the global administrative privileges associated with this group, such as the ability to create and delete domains Schema Admins Members can manage and modify the Active irectory schema controlled access to resources throughout h the forest or domain. Authenticated Users allow controlled access to resources throughout the forest or domain veryone allow access to resources to al users and guests

32 reating and Managing Groups reating and managing groups is usually done with Active Ati irectory Users and omputers Batch files omma Separated alue irectory xchange (S) LAP ata nterchange Format irectory xchange (LF) Windows Script Host (WSH)

33 USNG S omma separated values. Header record must be defined using a distinguished name and schema attributes. ntries in the remainder of the file must follow the order of the header record. nce the file is created, use csvde ii ff file.txt to import the users. annot createusers with passwords. annot modify existing user accounts.

34 USNG LF Line separated values. bject entries are separated by a hyphen. nce the file is created, use ldifde i i f f file.txt to import the users. annot create users with ihpasswords. an modify passwords once users are created. an be used to import, export, and modify Active irectory objects.

35 USNG WSH Allows you towritescripts tocreateusers and other Active irectory objects. Scripts can be BScript or Jscript. Allows for highly customized solutions that automate the creation of user accounts.

36 Special dentity Groups and Local Groups Authenticated Users Used to allow controlled access to resources throughout the forest or domain. veryone Used to provide access to resource for all users and guest. Not recommended to not assign this group to resources.

37 Group mplementation Plan A plan that states who has the ability and responsibility to create, delete, and manage groups. A policy that states how domain local, global, and universal groups are to be used. A policy that states guidelines for creating new groups and deleting old groups. A naming standards document to keep group names consistent. A standard for group nesting.

38 Summary hree types of user accounts exist in Windows Server 2008: Local user accounts reside on a local computer and are not replicated to other computers by Active irectory. omain user accounts are created and stored in Active irectory and replicated to all domain controllers within a domain. Built in user accounts are automatically created when the operating system is installed and when a member server is promoted to a domain controller.

39 Summary he Administrator account is a built in in domain account that serves as the primary supervisory account in Windows Server t can be renamed, but it cannot be deleted. he Guest account is a built in account used to assign temporary access to resources. t can be renamed, but it cannot be deleted. his account is disabled by default and the password can be left blank.

40 Summary Windows Server 2008 group options include two types (security and distribution) and three scopes (domain local, global, and universal). omain local groups are placed on the AL of resources and assigned permissions. hey typically contain global groups in their membership list.

41 Summary Global groups are used to organize domain users according to their resource access needs. Global groups are placed in the membership list of domain local groups, which arethen assigned the desired permissions to resources.

42 Summary Universal groups are used to provide access to resources anywhere in the forest. heir membership lists can contain global groups and users from any domain. hanges to universal group membership lists are replicated to all global catalog servers throughout the forest.

43 Summary herecommended permission assignment strategy (AGULP) places users needing access permissions in a global group, the global group in a universal group, and the universal group in a domain local group and then assigns permissions to the domain local group.

44 Summary Group nesting is the process of placing group accounts in the membership of othergroup accounts forthepurpose of simplifying permission assignments. Multiple users and groups can be created in Active irectory by using several methods. Windows Server 2008 offers the ability to use batch files, S, LF, and WSH to accomplish your administrative goals.

45 Lab 4 n this lab you will: 1. reate Administrative Accounts 2. est Group Memberships Abilities 3. reateglobal and Universal Groups 4. Use dsadd.exe 5. Answer the Lab Questions

Introduction to Active Directory

Introduction to Active Directory UT ntroduction to Active irectory 5-1 Topics for this Unit irectory ervices Active irectory Forests omains rganizational Units Groups A features ites Accounts 5-1 irectory ervice A directory service is

More information

Updating The Operating System & User Accounts

Updating The Operating System & User Accounts U Updating he perating ystem & User Accounts P PAG YM UPA Update A minor revision to a software product, usually intended to address specific performance issues rather than add new features Upgrade A major

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 5 Managing Groups

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 5 Managing Groups Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Lab # 5 Managing Groups Network Lab # 5 Managing Groups Objective: Learn about groups and where to create

More information

8 Administering Groups

8 Administering Groups 8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you

More information

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,

More information

C UNIT 7. Using Group Policy

C UNIT 7. Using Group Policy UN 7 Using Group Policy 2005-2010 opics for this Unit Group policy security settings Audit policies in Windows Server 2008 Folder redirection Managing software using Group Policy he software life cycle

More information

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

Windows 7 Users, Groups and Security

Windows 7 Users, Groups and Security U indows Users, Groups and ecurity P P onna arren nstalling opics for this Unit Homegroups, workgroups, and domains reate user and group accounts User Account ontrol panel User authentication and authorization

More information

Managing & Supporting Windows XP

Managing & Supporting Windows XP UI 9 Managing & Supporting Windows X Definitions User - individual granted access to the system roups - logical collection of users Accounts - ogical construct containing all information that defines a

More information

C UNIT 3. Global Catalog & Flexible Single Master Operations (FSMO)

C UNIT 3. Global Catalog & Flexible Single Master Operations (FSMO) UN 3 Global atalog & Flexible Single Master perations (FSM) PW PW onna Warren 2005-2010 opics for this Unit Functions of the Global atalog Functions of Universal Group Membership aching he Five FSM roles

More information

CISNTWK-11. Microsoft Network Server. Chapter 4

CISNTWK-11. Microsoft Network Server. Chapter 4 CISNTWK-11 Microsoft Network Server Chapter 4 User and Group Accounts 1 Usage Notes Throughout these slides, the term Active Directory Domain implies Domains Based on Windows Server 2008 Based on Windows

More information

Computer Networks Lab Lab 4 Managing Groups

Computer Networks Lab Lab 4 Managing Groups Islamic University of Gaza College of Engineering Computer Department Computer Networks Lab Prepared By: Eng.Ola M. Abd El-Latif Mar. /2010 0 :D Objectives Learn about groups and where to create it. Explain

More information

5 MANAGING USER ACCOUNTS AND GROUPS

5 MANAGING USER ACCOUNTS AND GROUPS MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content

More information

Introduction to LAN Introduction to TDC 363 Lecture 05 Course Outline What is NOS?

Introduction to LAN Introduction to TDC 363 Lecture 05 Course Outline What is NOS? Introduction to LAN TDC 363 Lecture 05 Nt Network rkoprti Operating Systems tm Windows Based Networking NetWare Based Networking Book Reading: Chapters 8 1 Course Outline Network operating system (NOS)

More information

6 Months Training Module in MS SQL SERVER 2012

6 Months Training Module in MS SQL SERVER 2012 6 Months Training Module in MS SQL SERVER 2012 Module 1 Installing and Configuring Windows Server 2012 Installing and Managing Windows Server 2012 Windows Server 2012 Overview Installing Windows Server

More information

Lesson 3: Identifying Key Characteristics of Workgroups and Domains

Lesson 3: Identifying Key Characteristics of Workgroups and Domains 1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users

More information

x CH03 2/26/04 1:24 PM Page

x CH03 2/26/04 1:24 PM Page 03 078973107x CH03 2/26/04 1:24 PM Page 45 3............................................. Setting Up, Managing, and Troubleshooting Security Accounts and Policies 1. You re a help desk technician for your

More information

Ebook : Overview of application development. All code from the application series books listed at:

Ebook : Overview of application development. All code from the application series books listed at: Ebook : Overview of application development. All code from the application series books listed at: http://www.vkinfotek.com with permission. Publishers: VK Publishers Established: 2001 Type of books: Develop

More information

Module 3: Managing Groups

Module 3: Managing Groups Module 3: Managing Groups Contents Overview 1 Lesson: Creating Groups 2 Lesson: Managing Group Membership 20 Lesson: Strategies for Using Groups 27 Lesson: Using Default Groups 44 Lab: Creating and Managing

More information

Windows Server 2008 Administration

Windows Server 2008 Administration Hands-On Course Description This course provides hands on experience installing and configuring Windows Server 2008 to work with clients including Windows Vista. Students will perform full and core CD-based

More information

UNIT 1. Introduction to Microsoft Active Directory

UNIT 1. Introduction to Microsoft Active Directory UN 1 ntroduction to Microsoft Active irectory 2005-2010 ducation onna P. Warren AS Accounting BS lectrical ngineering MS omputer Science ndustry ertifications MS, NA W Master esigner +, M and W nstructor

More information

Microsoft - Configuring Windows Server 2008 Active Directory Domain Services (M6425)

Microsoft - Configuring Windows Server 2008 Active Directory Domain Services (M6425) Microsoft - Configuring Windows Server 2008 Active Directory Domain Services (M6425) Code: 6123 Lengt h: URL: 5 days View Online In this comprehensive course you will not only discuss the crucial concepts

More information

Windows Server 2008 Active Directory Resource Kit

Windows Server 2008 Active Directory Resource Kit Windows Server 2008 Active Directory Resource Kit Stan Reimer, Mike Mulcare, Conan Kezema, Byron Wright w MS AD Team PREVIEW CONTENT This excerpt contains uncorrected manuscript from an upcoming Microsoft

More information

NOVELL NETWARE 5.1 ADMINISTRATION CONTENTS

NOVELL NETWARE 5.1 ADMINISTRATION CONTENTS CNA Certification Guide: Novell NetWare 5.1 Administration CERTIFICATION GUIDE: NOVELL NETWARE 5.1 ADMINISTRATION CONTENTS AUTHOR ACKNOWLEDGEMENTS... XIII INTRODUCTION... XV UNIT 1 NETWARE ACCESS... 1-1

More information

Backup using Quantum vmpro with Symantec Backup Exec release 2012

Backup using Quantum vmpro with Symantec Backup Exec release 2012 Backup using Quantum vmpro with Symantec Backup Exec release 2012 Step 1) If the vmpro appliance name and IP address are not resolved through DNS, update the Windows hosts file to include the IP address

More information

Inmagic Genie 2.10 Installation Notes, Revision 3, for New and Upgrade Installations

Inmagic Genie 2.10 Installation Notes, Revision 3, for New and Upgrade Installations Inmagic Genie 2.10 Installation Notes, Revision 3, for New and Upgrade Installations Thank you for purchasing Inmagic Genie. This document is intended for the following installations: New Genie installations

More information

VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database

VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database For multiple versions Have documentation feedback? Submit a Documentation Feedback support ticket using

More information

INSTALLATION INSTRUCTIONS

INSTALLATION INSTRUCTIONS INSTALLATION INSTRUCTIONS The DPA program must be updated annually for tax, law, and system changes. We recommend that you always back up and/or copy the program s folder to another location prior to installation.

More information

Windows Access Control List (ACL) 5

Windows Access Control List (ACL) 5 Windows Access Control List (ACL) 5 What do we have in this session? 1. More on SID Strings 2. More on SID Components 3. Well-known SIDs The expected abilities that supposed to be acquired in this session

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services 6425 - Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Microsoft Windows Server

More information

System Table of Contents:

System Table of Contents: Table of Contents: User Settings Preferences User Security Orgs / Groups / Depts Customize Database Access 2 Chapter 9 - Sadjadi et al. Introduction True automated system administration is only possible

More information

User Manual. ARK for SharePoint-2007

User Manual. ARK for SharePoint-2007 User Manual ARK for SharePoint-2007 Table of Contents 1 About ARKSP (Admin Report Kit for SharePoint) 1 1.1 About ARKSP 1 1.2 Who can use ARKSP? 1 1.3 System Requirements 2 1.4 How to activate the software?

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

User Profile Central Management Center User guide User Profile Central - User guide for remote backup and restore of user profiles.

User Profile Central Management Center User guide User Profile Central - User guide for remote backup and restore of user profiles. User Profile Central - User guide for remote backup and restore of user profiles. What is User Profile Central or UPC as we call it? UPC is an easy way to manage User Profiles over network. Simply put

More information

Install and Configure Active Directory Domain Services

Install and Configure Active Directory Domain Services Active Directory 101 Install and Configure Active Directory Domain Services Sander Berkouwer CTO at SCCT 10-fold Microsoft MVP Active Directory aficionado Daniel Goater Systems Engineer Netwrix Active

More information

What is orbac? ability to group several authorizations in to profiles to easily add/remove a set of authorizations to an employee

What is orbac? ability to group several authorizations in to profiles to easily add/remove a set of authorizations to an employee What is orbac? orbac orbac (opns Role Based Access Control) is a IT security solution that enables a structured, centralized, hierarchical and delegated management of IT privileges. orbac is based on the

More information

User Migration Tool. User Migration Tool Prerequisites

User Migration Tool. User Migration Tool Prerequisites Prerequisites, page 1 Features, page 2 Migration Scenarios, page 2 Internationalization (I18n) and Localization (L10n) Considerations, page 3 Security Considerations, page 3 User Migration Steps, page

More information

ClonePrincipal User Guide

ClonePrincipal User Guide ClonePrincipal User Guide Document version 2.1 November 9, 1999 Customers deploying Microsoft Windows 2000 might want to migrate users and resources incrementally to a new Windows 2000 environment in order

More information

EcoprintQ Student User Guide

EcoprintQ Student User Guide EcoprintQ Student User Guide EcoprintQ Student User Guide Table of Contents: 1.0 How to send a Print Job from a workstation to a network printer 2.0 User s Web interface 3.0 Account Summary 4.0 User s

More information

Installing the PC-Kits SQL Database

Installing the PC-Kits SQL Database 1 Installing the PC-Kits SQL Database The Network edition of VHI PC-Kits uses a SQL database. Microsoft SQL is a database engine that allows multiple users to connect to the same database. This document

More information

Published By Imanami Corporation 5099 Preston Ave. Livermore, CA 94551, United States. Copyright 2008 by Imanami Corporation.

Published By Imanami Corporation 5099 Preston Ave. Livermore, CA 94551, United States. Copyright 2008 by Imanami Corporation. Installation Guide Published By Imanami Corporation 5099 Preston Ave. Livermore, CA 94551, United States Copyright 2008 by Imanami Corporation. All rights reserved. No part of the contents of this document

More information

29 March 2017 SECURITY SERVER INSTALLATION GUIDE

29 March 2017 SECURITY SERVER INSTALLATION GUIDE 29 March 2017 SECURITY SERVER INSTALLATION GUIDE Contents 1. Introduction... 2 1.1 Assumptions... 2 1.2 Prerequisites... 2 2. Required setups prior the Security Server Installation... 3 1.1 Create domain

More information

70-742: Identity in Windows Server Course Overview

70-742: Identity in Windows Server Course Overview 70-742: Identity in Windows Server 2016 Course Overview This course provides students with the knowledge and skills to install and configure domain controllers, manage Active Directory objects, secure

More information

TestOut Server Pro 2016: Identity - English 4.0.x LESSON PLAN. Revised

TestOut Server Pro 2016: Identity - English 4.0.x LESSON PLAN. Revised TestOut Server Pro 2016: Identity - English 4.0.x LESSON PLAN Revised 2018-08-06 Table of Contents Introduction Section 0.1: Server Pro 2016: Identity Introduction... 4 Section 0.2: The TestOut Lab Simulator...

More information

Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2)

Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2) Web 2 Policy Settings for (including SP1) and XP (including SP2) This document was written by Conan Kezema. and XP together introduce more than 270 new administrative template policy settings for you to

More information

1. ECI Hosted Clients Installing Release 6.3 for the First Time (ECI Hosted) Upgrading to Release 6.3SP2 (ECI Hosted)

1. ECI Hosted Clients Installing Release 6.3 for the First Time (ECI Hosted) Upgrading to Release 6.3SP2 (ECI Hosted) 1. ECI Hosted Clients........................................................................................... 2 1.1 Installing Release 6.3 for the First Time (ECI Hosted)...........................................................

More information

Computer Networks Lab Lab 3 Managing User and Computer Accounts. Prepared By: Eng.Ola M. Abd El-Latif

Computer Networks Lab Lab 3 Managing User and Computer Accounts. Prepared By: Eng.Ola M. Abd El-Latif Islamic University of Gaza College of Engineering Computer Department Computer Networks Lab Lab 3 Prepared By: Eng.Ola M. Abd El-Latif Mar. /2010 0 :D Objectives Define user and computer account. Describe

More information

Baseline Windows Vista Enterprise Computer Setup

Baseline Windows Vista Enterprise Computer Setup Baseline Windows Vista Enterprise Computer Setup Version: 0.1.0 May 5, 2008 This documents the procedure that is recommended to enhance the security of a computer running Windows Vista Enterprise. These

More information

All About Mapped Drives

All About Mapped Drives All About Mapped Drives All About Mapped Drives Intro to Mapped Hard Drives Mapped drives can be very useful when it comes to moving data around on an office or home network and they do have their usefulness.

More information

Managing User Accounts

Managing User Accounts Contents User Accounts 2 Passwords 3 Home Folders 4 The Anonymous User 5 User Accounts And The Web File Manager 5 Maxum Development Corp. ! Managing User Accounts The basic operation of a file transfer

More information

Remote Authentication

Remote Authentication Authentication Services, page 1 Guidelines and Recommendations for Providers, page 2 User Attributes in Providers, page 2 Two-Factor Authentication, page 4 LDAP Providers and Groups, page 5 RADIUS Providers,

More information

Configuring User Profiles and User Groups for Cisco Unified MeetingPlace

Configuring User Profiles and User Groups for Cisco Unified MeetingPlace Configuring User Profiles and User Groups for Cisco Unified MeetingPlace Release 7.1 Revised: April 6, 2011 12:15 pm How to Configure User Groups, page 1 How to Configure User Profiles, page 5 How to Configure

More information

Good management is essential for all modern networks. Active Directory

Good management is essential for all modern networks. Active Directory CHAPTER 3 CREATING AND MANAGING USER ACCOUNTS After reading this chapter and completing the exercises, you will be able to: Understand the purpose of user accounts Understand the user authentication process

More information

HP OpenVMS CIFS Version 1.2 Migration Guide

HP OpenVMS CIFS Version 1.2 Migration Guide HP OpenVMS CIFS Version 1.2 Migration Guide Copyright 2010 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent

More information

Administrator Accounts

Administrator Accounts Administrator Accounts Contents Overview... 2 ACL Permissions Overview... 3 Changing the Default Admin Password... 3 ACL Permission Levels... 4 Creating an Adminstrator Class... 4 Administrator Class Examples...

More information

REST API Operations. 8.0 Release. 12/1/2015 Version 8.0.0

REST API Operations. 8.0 Release. 12/1/2015 Version 8.0.0 REST API Operations 8.0 Release 12/1/2015 Version 8.0.0 Table of Contents Business Object Operations... 3 Search Operations... 6 Security Operations... 8 Service Operations... 11 Business Object Operations

More information

Prepared By Imanami Technical Communications Team

Prepared By Imanami Technical Communications Team User Manual Published By Imanami Corporation 2301 Armstrong St. Suite 211 Livermore, CA 94551, United States Copyright 2010 by Imanami Corporation. All rights reserved. No part of this document may be

More information

Windows Server 2003 { Domain Controller Installation and Configuration}

Windows Server 2003 { Domain Controller Installation and Configuration} Windows Server 2003 { Domain Controller Installation and } Benedikt Riedel MCSE + Messaging www.go-unified.com www.siemens.com/open Benedikt.riedel@siemens.com Start up the prepared Windows Server 2003

More information

SnapCenter Software 4.0 Concepts Guide

SnapCenter Software 4.0 Concepts Guide SnapCenter Software 4.0 Concepts Guide May 2018 215-12925_D0 doccomments@netapp.com Table of Contents 3 Contents Deciding whether to use the Concepts Guide... 7 SnapCenter overview... 8 SnapCenter architecture...

More information

Installing and Administering a Satellite Environment

Installing and Administering a Satellite Environment IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00 IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00

More information

EMC SourceOne Discovery Manager Version 6.5

EMC SourceOne Discovery Manager Version 6.5 EMC SourceOne Discovery Manager Version 6.5 Installation and Administration Guide 300-008-569 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION

More information

Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or

Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or 7.93 Update Guide 092513 2013 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying,

More information

Administrator for Enterprise Clients: User s Guide. Second Edition

Administrator for Enterprise Clients: User s Guide. Second Edition Administrator for Enterprise Clients: User s Guide Second Edition The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2002. Administrator for Enterprise Clients: User s

More information

How to create a System Logon Account in Backup Exec for Windows Servers

How to create a System Logon Account in Backup Exec for Windows Servers How to create a System Logon Account in Backup Exec for Windows Servers Problem How to create a System Logon Account in Backup Exec for Windows Servers Solution The Backup Exec System Logon Account (SLA)

More information

Local Area Networks (LAN s)

Local Area Networks (LAN s) Local Area Networks (LAN s) Local area networks are computers connected together in a single location. They vary in size from two computers connected together to share a printer, to hundreds of computers

More information

Vault Backup Reference -Basic, Workgroup and Professional

Vault Backup Reference -Basic, Workgroup and Professional Vault Backup Reference -Basic, Workgroup and Professional Contents Introduction... 1 Example backup routine... 2 Explanation of backup routine... 3 Testing... 4 User permissions... 4 Vault Professional

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

Chapter 1: Windows Platform and Architecture. You will learn:

Chapter 1: Windows Platform and Architecture. You will learn: Chapter 1: Windows Platform and Architecture Windows 2000 product family. New features/facilities of. Windows architecture. Changes to the kernel and kernel architecture. New features/facilities. Kernel

More information

Xerox Document Centre 220/230/332/340ST. Companion to Getting Started with Scanning Services 701P99853

Xerox Document Centre 220/230/332/340ST. Companion to Getting Started with Scanning Services 701P99853 Xerox Document Centre 220/230/332/340ST Companion to Getting Started with Scanning Services 701P99853 In The USA: - Calling for Service and ordering Replaceable Units: 1-800-821-2797 - Ordering Supplies:

More information

Windows Server 2008 Security

Windows Server 2008 Security UT 11 indows erver ecurity 5-1 hat is Group Policy? A group of policies applied directly to Active irectory bjects Policies can be linked to: ites omains Us Policies are applied by assigning them to the

More information

SYSTEM ADMINISTRATION GUIDE VERSION 14

SYSTEM ADMINISTRATION GUIDE VERSION 14 SYSTEM ADMINISTRATION GUIDE VERSION 14 Copyright 2014 FileHold Systems Inc. All rights reserved. For further information about this manual or other FileHold Systems products, contact us at Suite 250-4664

More information

Automating the Windows 2000 Installation

Automating the Windows 2000 Installation Chapter 2 Automating the Windows 2000 Installation MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Perform an unattended installation of Windows 2000 Professional. Install Windows 2000 Professional by

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

UTILITY FUNCTION 1 PROGRAMS: GETTING STARTED

UTILITY FUNCTION 1 PROGRAMS: GETTING STARTED UTILITY FUNTION 1 PROGRAMS: GETTING STARTED hapter SYS-ED/ OMPUTER EDUATION TEHNIQUES, IN. Objectives You will learn: To identify the tasks which can be performed by the utility functions. Utility control

More information

SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5. System Administrator s Guide

SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5. System Administrator s Guide SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5 System Administrator s Guide January 2015 PREPARATION, REVIEW AND AUTHORISATION Revision # Date Prepared by Reviewed by Approved for Issue by 1 21-Jan-2015

More information

Contents. Why You Should Read This Manual...ix. 1. Introduction... 1

Contents. Why You Should Read This Manual...ix. 1. Introduction... 1 Contents Why You Should Read This Manual...ix 1. Introduction... 1 Understanding Security... 2 Group and User Accounts... 2 Application Features... 3 Security Areas... 3 Using Windows Security... 7 Synchronizing

More information

Authentication, Authorization, and Accounting

Authentication, Authorization, and Accounting Authentication, Authorization, and Accounting LESSON 2 OBJECTIVE DOMAIN MATRIX SKILLS/CONCEPTS MTA EXAM OBJECTIVE MTA EXAM OBJECTIVE NUMBER Starting Security with Understand user authentication. 2.1 Authentication

More information

Browser-based Access and Management

Browser-based Access and Management Browser-based Access and Management Old Content - see latest equivalent Modified by on 13-Sep-2017 In addition to connecting to an Altium Vault through Altium Designer, and interfacing to it through the

More information

Network+ Guide to Networks, Fourth Edition. Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking

Network+ Guide to Networks, Fourth Edition. Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks, Fourth Edition Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking Objectives Discuss the functions and features of a network operating system Define

More information

Ten Things to Know Before Deploying Active Directory. written by Dmitry Sotnikov. White Paper

Ten Things to Know Before Deploying Active Directory. written by Dmitry Sotnikov. White Paper Ten Things to Know Before Deploying Active Directory written by Dmitry Sotnikov White Paper Abstract Active Directory migration raises many questions about the design of your new directory. As you attempt

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm Page 1 of 14 Windows 2000 Server Step-by-Step Guide to Encrypting File System (EFS) Abstract This document provides sample procedures that demonstrate the end-user and administrative capabilities of the

More information

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team Kennesaw State University Information Technology Services Introduces Files.Kennesaw.Edu Presented by the ITS Technology Outreach Team Last Updated 08/12/13 Powered by Xythos Copyright 2006, Xythos Software

More information

Course Outline. Pearson: MCSA Cert Guide: Identity with Windows Server 2016 (Course & Lab)

Course Outline. Pearson: MCSA Cert Guide: Identity with Windows Server 2016 (Course & Lab) Course Outline Pearson: MCSA 70-742 Cert Guide: Identity with Windows Server 2016 (Course & Lab) 27 Jun 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary

More information

Designing and Operating a Secure Active Directory.

Designing and Operating a Secure Active Directory. Designing and Operating a Secure Active Directory Introduction Gil Kirkpatrick, CTO, NetPro Architect of NetPro Active Directory products Author of Active Directory Programming from SAMS Founder of the

More information

Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000

Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Define and set DAC policy (define group membership, set default DAC attributes, set DAC on files systems) Modify

More information

DOWNLOAD PDF SQL SERVER 2012 STEP BY STEP

DOWNLOAD PDF SQL SERVER 2012 STEP BY STEP Chapter 1 : Microsoft SQL Server Step by Step - PDF Free Download - Fox ebook Your hands-on, step-by-step guide to building applications with Microsoft SQL Server Teach yourself the programming fundamentals

More information

Project management integrated into Outlook

Project management integrated into Outlook Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: November 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com

More information

IT222 Microsoft Network Operating Systems II

IT222 Microsoft Network Operating Systems II 1 ITT Technical Institute IT222 Microsoft Network Operating Systems II Unit 1: Chapters 1 & 2 2 Chapter 1 OVERVIEW OF ACTIVE DIRECTORY Chapter 1: Overview of Active Directory, pp. 1 23 Chapter 2, Implementing

More information

Welcome To Account Manager 2.0

Welcome To Account Manager 2.0 Account Manager 2.0 Manage Unlimited FileMaker Servers, Databases, Privileges, and Users Effortlessly! The ultimate tool for FileMaker Database Administrators. Welcome To Account Manager 2.0 What Is Account

More information

User Guide. Created: Tuesday, August 06, OCI ChequeWriter System

User Guide. Created: Tuesday, August 06, OCI ChequeWriter System User Guide Created: Tuesday, August 06, 2013 Copyright OC Innovations Pte Ltd. All rights reserved. http://www.ocisystem.com/ The information contained in this document is subject to change without notice.

More information

LepideAuditor. Installation and Configuration Guide

LepideAuditor. Installation and Configuration Guide Installation and Configuration Guide Table of Contents 1. Introduction... 6 2. Requirements and Prerequisites... 6 2.1 System Requirements... 6 2.2 Supported Servers for Auditing... 7 2.3 Prerequisites

More information

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft

More information

Dell PowerVault Best Practices Series. Deploying the Dell PowerVault NX3500 in a CIFS Environment A Dell Technical White Paper

Dell PowerVault Best Practices Series. Deploying the Dell PowerVault NX3500 in a CIFS Environment A Dell Technical White Paper Dell PowerVault Best Practices Series Deploying the Dell PowerVault NX3500 in a CIFS Environment A Dell Technical White Paper Enterprise Storage Solutions Engineering Dell Product Group June 2012 THIS

More information

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved.

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved. Lasso CDP Client Guide August 2005, Version 1.6.8 Lasso CDP Client Guide Page 1 of 32 Copyright Copyright 2005 Lasso Logic, LLC. All Rights Reserved. No part of this publication may be reproduced, stored

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Configure advanced audit policies

Configure advanced audit policies 7 LESSON Configuring Advanced Audit Policies 70-411 EXAM OBJECTIVE Objective 2.4 Configure advanced audit policies. This objective may include but is not limited to: implement auditing using Group Policy

More information

Logi Ad Hoc Reporting System Administration Guide

Logi Ad Hoc Reporting System Administration Guide Logi Ad Hoc Reporting System Administration Guide Version 12 July 2016 Page 2 Table of Contents INTRODUCTION... 4 APPLICATION ARCHITECTURE... 5 DOCUMENT OVERVIEW... 6 GENERAL USER INTERFACE... 7 CONTROLS...

More information

Sage Installation and Administration Guide. May 2018

Sage Installation and Administration Guide. May 2018 Sage 300 2019 Installation and Administration Guide May 2018 This is a publication of Sage Software, Inc. 2018 The Sage Group plc or its licensors. All rights reserved. Sage, Sage logos, and Sage product

More information

WebsitePanel User Guide

WebsitePanel User Guide WebsitePanel User Guide User role in WebsitePanel is the last security level in roles hierarchy. Users are created by reseller and they are consumers of hosting services. Users are able to create and manage

More information