SlideShare a Scribd company logo
1 of 11
Windows
Security
Microsoft windows has security features
that determine who can use and have
access to your computer.
2. Look for “User Accounts” icon or
category
3. In the User Accounts window, you
will see tasks that you can do with
your account.
1. Open user accounts in the control panel.
2. In the pick a task, select Change an
account
3. Pick an account to change
1.Computer Administrator – controls all the
contents and users of the computer, installs
programs, adds, and deletes users.
2.Limited account – has limited control and only
have access to the particular account.
3.Guest – accounts created for transient users and
do not have access to the other computer
accounts and their content.
Once you are in the account, you can pick any change that
you like:
1.Change my account name – if you want to change your name
displayed in your account
2.Create a password – provides security to new accounts or
accounts without existing password
3.Change my password – gives security to your account by
changing a previously created password.
4. Remove my password – you may remove an existing password if
you decide to do so
5. Change my picture – you can change your picture displayed
beside your name.
6. Change my account type – you can set an account either as
computer Administrator or limited.

More Related Content

Similar to ETECH

Netex learningMaker | Administrator Manual v3.0 [En]
Netex learningMaker | Administrator Manual v3.0 [En]Netex learningMaker | Administrator Manual v3.0 [En]
Netex learningMaker | Administrator Manual v3.0 [En]
Netex Learning
 
PM User Guide v1 Lot 4
PM User Guide v1 Lot 4PM User Guide v1 Lot 4
PM User Guide v1 Lot 4
agus kurniawan
 

Similar to ETECH (20)

Netex learningMaker | Administrator Manual v3.0 [En]
Netex learningMaker | Administrator Manual v3.0 [En]Netex learningMaker | Administrator Manual v3.0 [En]
Netex learningMaker | Administrator Manual v3.0 [En]
 
configuration ,management and troubleshooting of Group Accounts.
configuration ,management and troubleshooting of Group Accounts.configuration ,management and troubleshooting of Group Accounts.
configuration ,management and troubleshooting of Group Accounts.
 
4_5800969115594131707.pptx
4_5800969115594131707.pptx4_5800969115594131707.pptx
4_5800969115594131707.pptx
 
Magento 2 Review Reminder Extension By ITORIS INC
Magento 2 Review Reminder Extension By ITORIS INCMagento 2 Review Reminder Extension By ITORIS INC
Magento 2 Review Reminder Extension By ITORIS INC
 
Open mic user management_20_april2017
Open mic  user management_20_april2017Open mic  user management_20_april2017
Open mic user management_20_april2017
 
Admin process.pdf
Admin process.pdfAdmin process.pdf
Admin process.pdf
 
Admin process.pdf
Admin process.pdfAdmin process.pdf
Admin process.pdf
 
MS AD
MS ADMS AD
MS AD
 
Bulletin Boards - Quick Start Guide To User Management
Bulletin Boards - Quick Start Guide To User ManagementBulletin Boards - Quick Start Guide To User Management
Bulletin Boards - Quick Start Guide To User Management
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
ImplementationGuide-220920-101456.pdf
ImplementationGuide-220920-101456.pdfImplementationGuide-220920-101456.pdf
ImplementationGuide-220920-101456.pdf
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
 
Creating a Profile on Windows
Creating a Profile on WindowsCreating a Profile on Windows
Creating a Profile on Windows
 
Access Profiles in dinManage by dinCloud
Access Profiles in dinManage by dinCloudAccess Profiles in dinManage by dinCloud
Access Profiles in dinManage by dinCloud
 
PM User Guide v1 Lot 4
PM User Guide v1 Lot 4PM User Guide v1 Lot 4
PM User Guide v1 Lot 4
 
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
 
Bank record system
Bank record systemBank record system
Bank record system
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Magento 2 Questions And Answers Extension by IToris inc.
Magento 2 Questions And Answers Extension by IToris inc.Magento 2 Questions And Answers Extension by IToris inc.
Magento 2 Questions And Answers Extension by IToris inc.
 
How to add module user
How to add module userHow to add module user
How to add module user
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

ETECH

  • 2. Microsoft windows has security features that determine who can use and have access to your computer.
  • 3.
  • 4.
  • 5.
  • 6. 2. Look for “User Accounts” icon or category
  • 7. 3. In the User Accounts window, you will see tasks that you can do with your account.
  • 8. 1. Open user accounts in the control panel. 2. In the pick a task, select Change an account 3. Pick an account to change
  • 9. 1.Computer Administrator – controls all the contents and users of the computer, installs programs, adds, and deletes users. 2.Limited account – has limited control and only have access to the particular account. 3.Guest – accounts created for transient users and do not have access to the other computer accounts and their content.
  • 10. Once you are in the account, you can pick any change that you like: 1.Change my account name – if you want to change your name displayed in your account 2.Create a password – provides security to new accounts or accounts without existing password 3.Change my password – gives security to your account by changing a previously created password.
  • 11. 4. Remove my password – you may remove an existing password if you decide to do so 5. Change my picture – you can change your picture displayed beside your name. 6. Change my account type – you can set an account either as computer Administrator or limited.