Chapter 1 - 3
Chapter 1 - 3
Users
Hardware resources
Software resources
challenges?
The key roles of network & system administrator
o It involves:
Once the users logon, they can access resources based on the
permissions that have been assigned by the network
administrator.
Built-in Users in AD
Administrator account: created locally when we install windows server OS
and has full control over the computer or domain. Its default settings are: full
rights (controlling users and computers) and assigning users’ access rights.
The administrator account cannot be deleted /removed; for a security purpose
it is recommended to rename than disabling. If the administrator account is
disabled it can still be used when the server is booted in safe mode that is why
renaming the administrator account increase computers’ security level.
Guest account: allows users to access the computer even if they do not have
a unique username and password. Because of a security risk associated with
this account, this account is disabled by default. This account is given very
limited privileges.
Windows Server OS Username and Password Rules
Username rules:
Password policies:
password
Options that can be enabled when password is given for
new users:
account is disabled
Disabling / Deleting user account:
The disabled account can be enabled later, but the deleted account can never be
recovered.
We should delete a user account if we are sure that the account will never be
needed again.
Reasons for disabling user account are:
• If the user will not be using it for a period of time.
• If the network administrator planning to put another user in the same
function with the same user account.
• For the security mechanism at special situations.
We disable the user account by right clicking on the user account and
selecting the disable account option.
After an account has been disabled it will be displayed with a red circle and
an X-sign over the user account icon-within the active directory.
Configuring user properties which consists of 13 main tabs in
the properties dialog box of which General tab and Account tab
are the major ones.
• Account lockout duration: Specify how long the account will be locked in
the event that the account lockout threshold is exceeded (after invalid
attempts).
• Account lockout threshold: Specify that the user gets (permitted with) a
specific number of invalid log in attempts before the account is locked.
Invalid log on attempts are decided by Network administrator.
• Account lockout counter after: Specify how long the account lockout
threshold will be tracked (blocked) after the invalid logon attempts. Account
lockout counter starts after the last invalid logon attempt and used to display
the remaining time for the next threshold (specify after how many minutes the
user can attempt to logon for the second round).
Troubleshooting User Authentication
incorrect password
Backup operators – backup and restore file system but can’t modify
them.
2) modify
5) read
6) write
Level 1 – Full control:
If we select full control permission, all permissions will be checked by
default.
If we unchecked any lower level permission (such as read, or others) the
full control allow check box will be automatically unchecked.
Level 2 – Modify:
If we select modify permission the following will be checked/allowed:
o Read and execute
o List folder content
o Read
o Write
Level 3 – Read and Execute:
Ifwe select the read and execute permission the following will be allowed
automatically:
o List folder contents
o Read permission
Level 4 – List Folder Contents:
This permission allows the following rights:
o List the content of folders.
o See files/folders attributes.
Level 5 – Read:
This permission allows the following rights:
o List the content of folder
o Read the data in a folder’s files
Level 6 – Write:
Thispermission allows the following rights:
o Create new folder/file
o Write data to the file
o Overwrite a file(modify a file)
o Change files/folder’s attribute
User’s effective permission:
refers to the right the user actually has to access file or folder.
To determine user’s effective permission combine all
permissions that have been allowed to the user through user name
or group association and subtract/remove/ all permissions that
have been denied to the user.
e.g. find Alemu’s effective permissions as shown below:
Accounting Group IT Group
Modify √ Modify √
Read and Execute √ Read and Execute
o If we move a file from one folder to another folder on the same NTFS
volume, the file will retain the original NTFS permissions (NTFS
permissions of the source folder).
o If we move file from one folder to other folder b/n different NTFS volumes,
the file is treated as a copy and will have the same permissions as the
destination folder.
o If we copy a file from one folder to another folder on the same NTFS
volume or on different volume the file will have the same permission as the
destination folder.
It also lets us to set printing preferences and print test pages to check
our printer connectivity.
This dialog box will allow us to specify the layout of the paper
(orientation: portrait or vertical, Landscape or horizontal), number of
page per sheet, and page order.
c. Configuring Port properties – will allow us to configure all of the ports that
have been defined for printer use.
Local ports are used when the printer attaches directly to the computer.
Logical ports are used when the printer is attached to the network by
installing a network card in the printer.
The advantage of network printers is that they are faster than local printers
and can be located anywhere on the network.
Printer pools are used to associate multiple physical print devices with a
single logical printer.
The advantage of configuring and using a printer pool is that the first
available print device will print our job.
d. Security Properties – Print Permission – The network
administrator can allow or deny access to a printer using
security tab from printer properties dialog box.
• Followings are the print permissions assigned by windows server:
print,
manage printers, and
manage documents.
End of Chapter 3