SlideShare une entreprise Scribd logo
1  sur  19
   Create user objects to represent the employees, customers, or
    students in your environment.

   group :-
          is just a collection of things. Groups are used most frequently
    in a security context you set up a group of users and apply certain
    permissions or rights to that group. Using a group is much easier
    when applying security than using individual users because you
    have to apply the security only once instead of once per user.
A convention for naming user accounts should
accommodate:

  Employees with duplicate names

  Different types of employees, such as temporary
  or contract employees




                                          11/11/2008   3
Local user accounts
(stored on local computer)




Domain user accounts
(stored in Active Directory)

                               Windows Server 2003 Domain




                                               11/11/2008   4
   Two different types of user accounts can be created:
    1. local user accounts
    2. domain user accounts.

   Local user accounts :- are used to control access to the
    computer on which you are working. They are created on
    Windows Server 2003 by using the Local Users and Groups
   Domain accounts:- are created in Active Directory and are
    considerably different from local user accounts. Rather than
    storing information on the local machine, account information is
    stored in the directory and replicated to other DCs.
 Account  names can be between 1 and
  20 characters (letters and/or numbers).
 Account names are not case sensitive.
 The following characters cannot be

  used in the account name:
 ◦" /  [ ] : ; | , + = * ? < > @



                                    11/11/2008   6
Create a domain user account
Create a local user account




                               11/11/2008   7
11/11/2008   8
11/11/2008   9
   Using groups, you can perform a variety of tasks that will affect the
    accounts and groups that are members. These include:
    Assigning rights to a group account to authorize them to perform a
    certain task
    Assigning permissions on shared resources to a group, so that all
    members can access the resource in the same manner
    Distributing bulk e-mail to all members of the group
   There are two different types, which are used for two different
    purposes:
      1. Security groups
      2. Distribution groups

   Security Groups:-A security group is a collection of users who
    have specific rights and permissions to resources.
    Rights are assigned to users and groups, to control the actions a
    user or member of a group can take. rights are also sometimes
    called privileges.
    Permissions are used to control access to resources.
    When permissions are assigned to a group, it determines what
    the members of the group can do with a particular resource.
   Distribution groups:- are used for sharing information. This type of
    group has nothing to do with security. It is used for distributing e-
    mail messages to groups of users.
   Distribution groups allow applications such as Microsoft Exchange
    to send e-mails to collections of users.

   Active Directory provides three different scopes for groups:
     1. Universal
     2. Global
     3. Domain Local
◦ Global Groups :-
  Global security groups are most often used to organize users who
  share similar network access requirements. A global group has
  the following characteristics:

◦ Limited membership You can add members only from the
  domain in which you create the global group.

◦ Access to resources in any domain You can use a global
  group to assign permissions to gain access to resources that are
  located in any domain in the tree or forest.
   Domain Local Groups :-
    Domain local security groups are most often used to assign
    permissions to resources. A domain local group has the following
    characteristics:
   Open membership You can add members from any domain.
   Access to resources in one domain You can use a domain local
    group to assign permissions to gain access to resources that are
    located only in the same domain where you create the domain local
    group.
   Universal Groups
    Universal security groups are most often used to assign permissions
    to related resources in multiple domains. A universal security group
    has the following characteristics:
   Open membership You can add members from any domain in the
    forest.
   Access to resources in any domain You can use a universal
    group to assign permissions to gain access to resources that are
    located in any domain in the forest.
2.1 users & groups

Contenu connexe

Tendances

Active directory architecture
Active directory architectureActive directory architecture
Active directory architecturerahuldaredia21
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Tuan Yang
 
User account (Windows)
User account (Windows)User account (Windows)
User account (Windows)Dev Dorse
 
Users and groups in Linux
Users and groups in LinuxUsers and groups in Linux
Users and groups in LinuxKnoldus Inc.
 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administratorAisha Talat
 
Windows Server 2012 Managing Active Directory Domain
Windows Server 2012 Managing  Active Directory DomainWindows Server 2012 Managing  Active Directory Domain
Windows Server 2012 Managing Active Directory DomainNapoleon NV
 
Domain name server
Domain name serverDomain name server
Domain name serverMobile88
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network conceptsDuressa Teshome
 
Network and System Administration
Network and System AdministrationNetwork and System Administration
Network and System AdministrationIgguuMuude
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name SystemChinmay Joshi
 
Resource Monitoring and management
Resource Monitoring and management  Resource Monitoring and management
Resource Monitoring and management Duressa Teshome
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual MachineRubal Sagwal
 

Tendances (20)

Active directory architecture
Active directory architectureActive directory architecture
Active directory architecture
 
Windows server
Windows serverWindows server
Windows server
 
Active directory slides
Active directory slidesActive directory slides
Active directory slides
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)
 
DNS (Domain Name System)
DNS (Domain Name System)DNS (Domain Name System)
DNS (Domain Name System)
 
User account (Windows)
User account (Windows)User account (Windows)
User account (Windows)
 
Users and groups in Linux
Users and groups in LinuxUsers and groups in Linux
Users and groups in Linux
 
Dns ppt
Dns pptDns ppt
Dns ppt
 
Linux commands
Linux commandsLinux commands
Linux commands
 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administrator
 
Windows Server 2012 Managing Active Directory Domain
Windows Server 2012 Managing  Active Directory DomainWindows Server 2012 Managing  Active Directory Domain
Windows Server 2012 Managing Active Directory Domain
 
FILE SERVER
FILE SERVERFILE SERVER
FILE SERVER
 
Domain name server
Domain name serverDomain name server
Domain name server
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network concepts
 
Network and System Administration
Network and System AdministrationNetwork and System Administration
Network and System Administration
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name System
 
Resource Monitoring and management
Resource Monitoring and management  Resource Monitoring and management
Resource Monitoring and management
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
 
Windows file system
Windows file systemWindows file system
Windows file system
 

En vedette

1.1 windows server 2003
1.1 windows server 20031.1 windows server 2003
1.1 windows server 2003Muuluu
 
Dns server
Dns serverDns server
Dns serverMuuluu
 
Switch function
Switch functionSwitch function
Switch functionMuuluu
 
Lecture 5
Lecture 5Lecture 5
Lecture 5Muuluu
 
2.2 determining trust relationships
2.2 determining trust relationships2.2 determining trust relationships
2.2 determining trust relationshipsMuuluu
 
User account policy
User account policyUser account policy
User account policyMuuluu
 
2.1 user practical
2.1 user practical2.1 user practical
2.1 user practicalMuuluu
 
Lecture 3
Lecture 3Lecture 3
Lecture 3Muuluu
 
Switch configuration
Switch configurationSwitch configuration
Switch configurationMuuluu
 
Лекц 11
Лекц 11Лекц 11
Лекц 11Muuluu
 
Лекц 11
Лекц 11Лекц 11
Лекц 11Muuluu
 
Лекц 9
Лекц 9Лекц 9
Лекц 9Muuluu
 
1.2 ad installation
1.2 ad installation1.2 ad installation
1.2 ad installationMuuluu
 
Лекц 10
Лекц 10Лекц 10
Лекц 10Muuluu
 
Lecture 2
Lecture 2Lecture 2
Lecture 2Muuluu
 
1.2 active directory
1.2 active directory1.2 active directory
1.2 active directoryMuuluu
 
Лекц 12
Лекц 12Лекц 12
Лекц 12Muuluu
 
Лекц 13
Лекц 13Лекц 13
Лекц 13Muuluu
 

En vedette (18)

1.1 windows server 2003
1.1 windows server 20031.1 windows server 2003
1.1 windows server 2003
 
Dns server
Dns serverDns server
Dns server
 
Switch function
Switch functionSwitch function
Switch function
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
2.2 determining trust relationships
2.2 determining trust relationships2.2 determining trust relationships
2.2 determining trust relationships
 
User account policy
User account policyUser account policy
User account policy
 
2.1 user practical
2.1 user practical2.1 user practical
2.1 user practical
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Switch configuration
Switch configurationSwitch configuration
Switch configuration
 
Лекц 11
Лекц 11Лекц 11
Лекц 11
 
Лекц 11
Лекц 11Лекц 11
Лекц 11
 
Лекц 9
Лекц 9Лекц 9
Лекц 9
 
1.2 ad installation
1.2 ad installation1.2 ad installation
1.2 ad installation
 
Лекц 10
Лекц 10Лекц 10
Лекц 10
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
1.2 active directory
1.2 active directory1.2 active directory
1.2 active directory
 
Лекц 12
Лекц 12Лекц 12
Лекц 12
 
Лекц 13
Лекц 13Лекц 13
Лекц 13
 

Similaire à 2.1 users & groups

Discuss the two group classifications that exist in Windows Server 2.pdf
Discuss the two group classifications that exist in Windows Server 2.pdfDiscuss the two group classifications that exist in Windows Server 2.pdf
Discuss the two group classifications that exist in Windows Server 2.pdfkesav24
 
Administer Active Directory
Administer Active DirectoryAdminister Active Directory
Administer Active DirectoryHameda Hurmat
 
Users and groups in xp
Users and groups in xpUsers and groups in xp
Users and groups in xpRauf Wani
 
Activedirecotryfundamentals
ActivedirecotryfundamentalsActivedirecotryfundamentals
ActivedirecotryfundamentalsShekhar Singh
 
Chapter04 Implementing And Managing Group And Computer Accounts
Chapter04      Implementing And  Managing  Group And  Computer  AccountsChapter04      Implementing And  Managing  Group And  Computer  Accounts
Chapter04 Implementing And Managing Group And Computer AccountsRaja Waseem Akhtar
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9APSU
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9APSU
 
report on network security fundamentals
report on network security fundamentalsreport on network security fundamentals
report on network security fundamentalsJassika
 
Chapter01 Introduction To Windows Server 2003
Chapter01     Introduction To  Windows  Server 2003Chapter01     Introduction To  Windows  Server 2003
Chapter01 Introduction To Windows Server 2003Raja Waseem Akhtar
 
IRJET- Research Paper on Active Directory
IRJET-  	  Research Paper on Active DirectoryIRJET-  	  Research Paper on Active Directory
IRJET- Research Paper on Active DirectoryIRJET Journal
 
06 users groups_and_permissions
06 users groups_and_permissions06 users groups_and_permissions
06 users groups_and_permissionsShay Cohen
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003rafiq123
 
Exploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systemsExploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systemsZero Science Lab
 
Active directory interview questions
Active directory interview  questionsActive directory interview  questions
Active directory interview questionsAnand Dhouni
 

Similaire à 2.1 users & groups (20)

Presentation gggffggggg.pdf
Presentation                     gggffggggg.pdfPresentation                     gggffggggg.pdf
Presentation gggffggggg.pdf
 
70 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 04100970 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 041009
 
Discuss the two group classifications that exist in Windows Server 2.pdf
Discuss the two group classifications that exist in Windows Server 2.pdfDiscuss the two group classifications that exist in Windows Server 2.pdf
Discuss the two group classifications that exist in Windows Server 2.pdf
 
Administer Active Directory
Administer Active DirectoryAdminister Active Directory
Administer Active Directory
 
Users and groups in xp
Users and groups in xpUsers and groups in xp
Users and groups in xp
 
Activedirecotryfundamentals
ActivedirecotryfundamentalsActivedirecotryfundamentals
Activedirecotryfundamentals
 
Chapter04 Implementing And Managing Group And Computer Accounts
Chapter04      Implementing And  Managing  Group And  Computer  AccountsChapter04      Implementing And  Managing  Group And  Computer  Accounts
Chapter04 Implementing And Managing Group And Computer Accounts
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
Lecture 8 permissions
Lecture 8   permissionsLecture 8   permissions
Lecture 8 permissions
 
report on network security fundamentals
report on network security fundamentalsreport on network security fundamentals
report on network security fundamentals
 
9781111306366 ppt ch10
9781111306366 ppt ch109781111306366 ppt ch10
9781111306366 ppt ch10
 
G Mac Chapter04
G Mac Chapter04G Mac Chapter04
G Mac Chapter04
 
Chapter01 Introduction To Windows Server 2003
Chapter01     Introduction To  Windows  Server 2003Chapter01     Introduction To  Windows  Server 2003
Chapter01 Introduction To Windows Server 2003
 
IRJET- Research Paper on Active Directory
IRJET-  	  Research Paper on Active DirectoryIRJET-  	  Research Paper on Active Directory
IRJET- Research Paper on Active Directory
 
06 users groups_and_permissions
06 users groups_and_permissions06 users groups_and_permissions
06 users groups_and_permissions
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003
 
Exploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systemsExploitation and distribution of setuid and setgid binaries on Linux systems
Exploitation and distribution of setuid and setgid binaries on Linux systems
 
Active directory interview questions
Active directory interview  questionsActive directory interview  questions
Active directory interview questions
 
70 271 Stu Chap03
70 271 Stu Chap0370 271 Stu Chap03
70 271 Stu Chap03
 

Plus de Muuluu

Өгөгдлийн бүтэц
Өгөгдлийн бүтэцӨгөгдлийн бүтэц
Өгөгдлийн бүтэцMuuluu
 
Basic software
Basic software Basic software
Basic software Muuluu
 
Wide area networks
Wide area networksWide area networks
Wide area networksMuuluu
 
NAT and PAT
NAT and PATNAT and PAT
NAT and PATMuuluu
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocolMuuluu
 
Firewall
FirewallFirewall
FirewallMuuluu
 
User practical
User practicalUser practical
User practicalMuuluu
 
Active directory
Active directoryActive directory
Active directoryMuuluu
 
Hardware
HardwareHardware
HardwareMuuluu
 
windows server 2003
 windows server 2003 windows server 2003
windows server 2003Muuluu
 
Процессорын архитектур
Процессорын архитектурПроцессорын архитектур
Процессорын архитектурMuuluu
 
6 network devices
6 network devices6 network devices
6 network devicesMuuluu
 
Бие даалт
Бие даалтБие даалт
Бие даалтMuuluu
 
Лекц 15
Лекц 15Лекц 15
Лекц 15Muuluu
 
Лекц 14
Лекц 14Лекц 14
Лекц 14Muuluu
 
Лекц 16
Лекц 16Лекц 16
Лекц 16Muuluu
 
Лекц 15
Лекц 15Лекц 15
Лекц 15Muuluu
 
Лекц 14
Лекц 14Лекц 14
Лекц 14Muuluu
 
Лекц 13
Лекц 13Лекц 13
Лекц 13Muuluu
 
Лекц 12
Лекц 12Лекц 12
Лекц 12Muuluu
 

Plus de Muuluu (20)

Өгөгдлийн бүтэц
Өгөгдлийн бүтэцӨгөгдлийн бүтэц
Өгөгдлийн бүтэц
 
Basic software
Basic software Basic software
Basic software
 
Wide area networks
Wide area networksWide area networks
Wide area networks
 
NAT and PAT
NAT and PATNAT and PAT
NAT and PAT
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Firewall
FirewallFirewall
Firewall
 
User practical
User practicalUser practical
User practical
 
Active directory
Active directoryActive directory
Active directory
 
Hardware
HardwareHardware
Hardware
 
windows server 2003
 windows server 2003 windows server 2003
windows server 2003
 
Процессорын архитектур
Процессорын архитектурПроцессорын архитектур
Процессорын архитектур
 
6 network devices
6 network devices6 network devices
6 network devices
 
Бие даалт
Бие даалтБие даалт
Бие даалт
 
Лекц 15
Лекц 15Лекц 15
Лекц 15
 
Лекц 14
Лекц 14Лекц 14
Лекц 14
 
Лекц 16
Лекц 16Лекц 16
Лекц 16
 
Лекц 15
Лекц 15Лекц 15
Лекц 15
 
Лекц 14
Лекц 14Лекц 14
Лекц 14
 
Лекц 13
Лекц 13Лекц 13
Лекц 13
 
Лекц 12
Лекц 12Лекц 12
Лекц 12
 

2.1 users & groups

  • 1.
  • 2. Create user objects to represent the employees, customers, or students in your environment.  group :- is just a collection of things. Groups are used most frequently in a security context you set up a group of users and apply certain permissions or rights to that group. Using a group is much easier when applying security than using individual users because you have to apply the security only once instead of once per user.
  • 3. A convention for naming user accounts should accommodate: Employees with duplicate names Different types of employees, such as temporary or contract employees 11/11/2008 3
  • 4. Local user accounts (stored on local computer) Domain user accounts (stored in Active Directory) Windows Server 2003 Domain 11/11/2008 4
  • 5. Two different types of user accounts can be created: 1. local user accounts 2. domain user accounts.  Local user accounts :- are used to control access to the computer on which you are working. They are created on Windows Server 2003 by using the Local Users and Groups  Domain accounts:- are created in Active Directory and are considerably different from local user accounts. Rather than storing information on the local machine, account information is stored in the directory and replicated to other DCs.
  • 6.  Account names can be between 1 and 20 characters (letters and/or numbers).  Account names are not case sensitive.  The following characters cannot be used in the account name: ◦" / [ ] : ; | , + = * ? < > @ 11/11/2008 6
  • 7. Create a domain user account Create a local user account 11/11/2008 7
  • 10.
  • 11.
  • 12.
  • 13. Using groups, you can perform a variety of tasks that will affect the accounts and groups that are members. These include:  Assigning rights to a group account to authorize them to perform a certain task  Assigning permissions on shared resources to a group, so that all members can access the resource in the same manner  Distributing bulk e-mail to all members of the group
  • 14. There are two different types, which are used for two different purposes: 1. Security groups 2. Distribution groups  Security Groups:-A security group is a collection of users who have specific rights and permissions to resources. Rights are assigned to users and groups, to control the actions a user or member of a group can take. rights are also sometimes called privileges. Permissions are used to control access to resources. When permissions are assigned to a group, it determines what the members of the group can do with a particular resource.
  • 15. Distribution groups:- are used for sharing information. This type of group has nothing to do with security. It is used for distributing e- mail messages to groups of users.  Distribution groups allow applications such as Microsoft Exchange to send e-mails to collections of users.  Active Directory provides three different scopes for groups: 1. Universal 2. Global 3. Domain Local
  • 16. ◦ Global Groups :- Global security groups are most often used to organize users who share similar network access requirements. A global group has the following characteristics: ◦ Limited membership You can add members only from the domain in which you create the global group. ◦ Access to resources in any domain You can use a global group to assign permissions to gain access to resources that are located in any domain in the tree or forest.
  • 17. Domain Local Groups :- Domain local security groups are most often used to assign permissions to resources. A domain local group has the following characteristics:  Open membership You can add members from any domain.  Access to resources in one domain You can use a domain local group to assign permissions to gain access to resources that are located only in the same domain where you create the domain local group.
  • 18. Universal Groups Universal security groups are most often used to assign permissions to related resources in multiple domains. A universal security group has the following characteristics:  Open membership You can add members from any domain in the forest.  Access to resources in any domain You can use a universal group to assign permissions to gain access to resources that are located in any domain in the forest.