Download presentation
Presentation is loading. Please wait.
Published byGerard Allen McKenzie Modified over 9 years ago
1
Working with Users and Groups Lesson 5
2
Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot User Account Control 3.1 Understanding User Account Control Configure and troubleshoot User Account Control 3.1 Understanding Recommended UAC Practices Configure user accounts to run as standard users 3.1
3
Skills Matrix Technology SkillObjective DomainObjective # Performing Administrative Tasks with a Standard User Account Elevate user privileges3.1 Configuring User Account Control Use local security policies to configure User Account Control Disable Secure Desktop 3.1
4
Chapter 5 Understanding Local and Domain Users Workgroups Domains
5
Chapter 5 Local User Accounts 5
6
Chapter 5 Domain User Accounts 6
7
Chapter 5 Introducing Built-In Local Users Administrator New User Account Guest
8
Chapter 5 Understanding Groups 8
9
Chapter 5 A collection of user accounts on a local computer Assign permissions to resources on that computer Created in the local security database Understanding Local Groups 9
10
Chapter 5 Using Built-In Local Groups Administrators Backup Operators Power Users Guests Remote Desktop Users Users
11
Chapter 5 Introducing Special Identities Everyone Interactive Network Anonymous Logon Authenticated Users Creator Owner Dialup
12
Chapter 5 Creating and Managing Users and Groups User Accounts control panel Local Users And Groups MMC snap-in
13
Chapter 5 Creating a New User Account - User Accounts Control Panel Intended for users with less experience Simplified interface Limited access Cannot create or manage groups
14
Chapter 5 Creating a New User Account – Local Users and Groups Snap-in Gives more access to user account properties Allows you to create and manage groups
15
Chapter 5 Creating a Local Group
16
Chapter 5 User Profile Types Local user profile Roaming user profile Mandatory user profile
17
Chapter 5 User Account Control (UAC) Because many users logon to the system using Administrative Accounts (leaving the system vulnerable to malware attacks) Microsoft implemented UAC Administrative accounts are required to confirm when they want to perform tasks that require administrative access
18
Chapter 5 Configuring UAC Local Security Policies You can configure the UAC Local Security Policy in Administrative Tools > Local Security Policy > Scroll down to the User Account Control policies
19
Chapter 5 Configuring Password Policies
20
Chapter 5 You Learned The user account is the fundamental unit of identity in the Windows operating systems. A group is an identifying token that Windows uses to represent a collection of users.
21
Chapter 5 You Learned (cont.) A workgroup is a collection of computers that are all peers. A peer network is one in which every computer can function as both a server, by sharing its resources with other computers, and a client, by accessing the shared resources on other computers. A domain is a collection of computers that all utilize a central directory service for authentication and authorization.
22
Chapter 5 You Learned (cont.) Windows Vista includes a number of built-in local groups that are already equipped with the permissions and rights needed to perform certain tasks. A special identity is essentially a placeholder for a collection of users with a similar characteristic.
23
Chapter 5 You Learned (cont.) Windows Vista provides two separate interfaces for creating and managing local user accounts: the User Accounts control panel and the Local Users And Group snap-in for the Microsoft Management Console (MMC). A roaming user profile is simply a copy of a local user profile that is stored on a network share so that the user can access it from any computer on the network.
24
Chapter 5 You Learned (cont.) A mandatory user profile is simply a read-only roaming user profile. On a Windows Vista computer running User Account Control (UAC), a standard user still receives a standard user token, but an administrative user receives two tokens: one for standard user access and one for administrative user access.
25
Chapter 5 You Learned (cont.) When a standard user attempts to perform a task that requires administrative privileges, the system displays a credential prompt, requesting that the user supply the name and password for an account with administrative privileges.
26
Chapter 5 You Learned (cont.) When an administrator attempts to perform a task that requires administrative access, the system switches the account from the standard user token to the administrative token. This is known as Admin Approval Mode.
27
Chapter 5 You Learned (cont.) Before the system permits the user to employ the administrative token, it requires the human user to confirm that he or she is actually trying to perform an administrative task. To do this, the system generates an elevation prompt.
28
Chapter 5 You Learned (cont.) The secure desktop is an alternative to the interactive user desktop that Windows normally displays. When Vista generates an elevation or credential prompt, it switches to the secure desktop, suppressing the operation of all other desktop controls and permitting only Windows processes to interact with the prompt.
29
Chapter 5 You Learned (cont.) User Account Control is enabled by default in all Windows Vista installations, but it is possible to configure several of its properties, or even disable it completely, using Local Security Policy.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.