Submit Search
Upload
Network Implementation and Support Lesson 04 Group and Computer Accounts - Eric Vanderburg
•
Download as PPT, PDF
•
2 likes
•
346 views
Eric Vanderburg
Follow
Network Implementation and Support Lesson 04 Group and Computer Accounts - Eric Vanderburg
Read less
Read more
Technology
Report
Share
Report
Share
1 of 17
Download now
Recommended
LAN Fundamentals
LAN Fundamentals
Steven Baule
Unit09
Unit09
Nurul Nadirah
The "Cloud" Services - DuraCloud and DuraCloud Vault
The "Cloud" Services - DuraCloud and DuraCloud Vault
DuraSpace
MCSA 70-412 Chapter 09
MCSA 70-412 Chapter 09
Computer Networking
The Future of Distributed Databases
The Future of Distributed Databases
NuoDB
Storing and processing data with the wso2 platform
Storing and processing data with the wso2 platform
WSO2
2012 10 24_briefing room
2012 10 24_briefing room
NuoDB
Introducing Node.js in an Oracle technology environment (including hands-on)
Introducing Node.js in an Oracle technology environment (including hands-on)
Lucas Jellema
Recommended
LAN Fundamentals
LAN Fundamentals
Steven Baule
Unit09
Unit09
Nurul Nadirah
The "Cloud" Services - DuraCloud and DuraCloud Vault
The "Cloud" Services - DuraCloud and DuraCloud Vault
DuraSpace
MCSA 70-412 Chapter 09
MCSA 70-412 Chapter 09
Computer Networking
The Future of Distributed Databases
The Future of Distributed Databases
NuoDB
Storing and processing data with the wso2 platform
Storing and processing data with the wso2 platform
WSO2
2012 10 24_briefing room
2012 10 24_briefing room
NuoDB
Introducing Node.js in an Oracle technology environment (including hands-on)
Introducing Node.js in an Oracle technology environment (including hands-on)
Lucas Jellema
Network Implementation and Support Lesson 03 User Accounts - Eric Vanderburg
Network Implementation and Support Lesson 03 User Accounts - Eric Vanderburg
Eric Vanderburg
9781111306366 ppt ch10
9781111306366 ppt ch10
Dr. Ahmed Al Zaidy
Secure active directory in one day without spending a single dollar
Secure active directory in one day without spending a single dollar
David Rowe
Lecture 8 permissions
Lecture 8 permissions
Wiliam Ferraciolli
chapter01-introductiontowindowsserver2003-090505014519-phpapp02.pdf
chapter01-introductiontowindowsserver2003-090505014519-phpapp02.pdf
KhadijaTahir29
itft_system admin
itft_system admin
Swati Aggarwal
Creating a fortress in your active directory environment
Creating a fortress in your active directory environment
David Rowe
Active directoryfinal
Active directoryfinal
Rafał Kucharski
MCSA Installing & Configuring Windows Server 2012 70-410
MCSA Installing & Configuring Windows Server 2012 70-410
omardabbas
Network operating system
Network operating system
John Carlo Catacutan
Anujit CV
Anujit CV
Anujit Dandapat
Anujit CV
Anujit CV
Anujit Dandapat
Net essentials6e ch9
Net essentials6e ch9
APSU
Net essentials6e ch9
Net essentials6e ch9
APSU
BSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming Workshop
Ajay Choudhary
Network Implementation and Support Lesson 09 Group Policy - Eric Vanderburg
Network Implementation and Support Lesson 09 Group Policy - Eric Vanderburg
Eric Vanderburg
Microsoft Offical Course 20410C_03
Microsoft Offical Course 20410C_03
gameaxt
Cloud stack for_beginners
Cloud stack for_beginners
Radhika Puthiyetath
CSD-2881 - Achieving System Production Readiness for IBM PureApplication System
CSD-2881 - Achieving System Production Readiness for IBM PureApplication System
Hendrik van Run
Active Directory Domain Services.pptx
Active Directory Domain Services.pptx
syedasadraza13
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
More Related Content
Similar to Network Implementation and Support Lesson 04 Group and Computer Accounts - Eric Vanderburg
Network Implementation and Support Lesson 03 User Accounts - Eric Vanderburg
Network Implementation and Support Lesson 03 User Accounts - Eric Vanderburg
Eric Vanderburg
9781111306366 ppt ch10
9781111306366 ppt ch10
Dr. Ahmed Al Zaidy
Secure active directory in one day without spending a single dollar
Secure active directory in one day without spending a single dollar
David Rowe
Lecture 8 permissions
Lecture 8 permissions
Wiliam Ferraciolli
chapter01-introductiontowindowsserver2003-090505014519-phpapp02.pdf
chapter01-introductiontowindowsserver2003-090505014519-phpapp02.pdf
KhadijaTahir29
itft_system admin
itft_system admin
Swati Aggarwal
Creating a fortress in your active directory environment
Creating a fortress in your active directory environment
David Rowe
Active directoryfinal
Active directoryfinal
Rafał Kucharski
MCSA Installing & Configuring Windows Server 2012 70-410
MCSA Installing & Configuring Windows Server 2012 70-410
omardabbas
Network operating system
Network operating system
John Carlo Catacutan
Anujit CV
Anujit CV
Anujit Dandapat
Anujit CV
Anujit CV
Anujit Dandapat
Net essentials6e ch9
Net essentials6e ch9
APSU
Net essentials6e ch9
Net essentials6e ch9
APSU
BSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming Workshop
Ajay Choudhary
Network Implementation and Support Lesson 09 Group Policy - Eric Vanderburg
Network Implementation and Support Lesson 09 Group Policy - Eric Vanderburg
Eric Vanderburg
Microsoft Offical Course 20410C_03
Microsoft Offical Course 20410C_03
gameaxt
Cloud stack for_beginners
Cloud stack for_beginners
Radhika Puthiyetath
CSD-2881 - Achieving System Production Readiness for IBM PureApplication System
CSD-2881 - Achieving System Production Readiness for IBM PureApplication System
Hendrik van Run
Active Directory Domain Services.pptx
Active Directory Domain Services.pptx
syedasadraza13
Similar to Network Implementation and Support Lesson 04 Group and Computer Accounts - Eric Vanderburg
(20)
Network Implementation and Support Lesson 03 User Accounts - Eric Vanderburg
Network Implementation and Support Lesson 03 User Accounts - Eric Vanderburg
9781111306366 ppt ch10
9781111306366 ppt ch10
Secure active directory in one day without spending a single dollar
Secure active directory in one day without spending a single dollar
Lecture 8 permissions
Lecture 8 permissions
chapter01-introductiontowindowsserver2003-090505014519-phpapp02.pdf
chapter01-introductiontowindowsserver2003-090505014519-phpapp02.pdf
itft_system admin
itft_system admin
Creating a fortress in your active directory environment
Creating a fortress in your active directory environment
Active directoryfinal
Active directoryfinal
MCSA Installing & Configuring Windows Server 2012 70-410
MCSA Installing & Configuring Windows Server 2012 70-410
Network operating system
Network operating system
Anujit CV
Anujit CV
Anujit CV
Anujit CV
Net essentials6e ch9
Net essentials6e ch9
Net essentials6e ch9
Net essentials6e ch9
BSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming Workshop
Network Implementation and Support Lesson 09 Group Policy - Eric Vanderburg
Network Implementation and Support Lesson 09 Group Policy - Eric Vanderburg
Microsoft Offical Course 20410C_03
Microsoft Offical Course 20410C_03
Cloud stack for_beginners
Cloud stack for_beginners
CSD-2881 - Achieving System Production Readiness for IBM PureApplication System
CSD-2881 - Achieving System Production Readiness for IBM PureApplication System
Active Directory Domain Services.pptx
Active Directory Domain Services.pptx
More from Eric Vanderburg
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
Mobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
Principles of technology management
Principles of technology management
Eric Vanderburg
Japanese railway technology
Japanese railway technology
Eric Vanderburg
Evaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
Japanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
Technology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
Incident response table top exercises
Incident response table top exercises
Eric Vanderburg
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
More from Eric Vanderburg
(20)
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Mobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Principles of technology management
Principles of technology management
Japanese railway technology
Japanese railway technology
Evaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Japanese current and future technology management challenges
Japanese current and future technology management challenges
Technology management in Japan: Robotics
Technology management in Japan: Robotics
Incident response table top exercises
Incident response table top exercises
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Recently uploaded
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Andrey Dotsenko
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
Precisely
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Competition Advisory Services (India) LLP
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
BookNet Canada
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Fwdays
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
The Digital Insurer
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
null - The Open Security Community
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Recently uploaded
(20)
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
The transition to renewables in India.pdf
The transition to renewables in India.pdf
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Network Implementation and Support Lesson 04 Group and Computer Accounts - Eric Vanderburg
1.
Network Implementation & Support Chapter
4 Group & Computer Accounts Eric Vanderburg © 2006
2.
Groups • Distribution Groups •
Security Groups – Local & Domain Local • For permissions to local resources • Other groups should be inside – Global Group • User accounts should go here – Universal Groups • Contains accounts/groups from entire forest • Native mode only Eric Vanderburg © 2006
3.
Resource 1 User 1 Resource
2 User 2 User 3 Resource 3 Eric Vanderburg © 2006
4.
Local Group Resource 1 Resource
2 User 1 Global Group User 2 User 3 Local Group Resource 3 Eric Vanderburg © 2006
5.
Local Group User 1 Resource
1 Global Group User 2 Resource 2 Universal Group User 3 Local Group Resource 3 Global Group User 1 User 2 Eric Vanderburg © 2006
6.
Group Tabs • General –
Type – Scope – Name • Members • Member Of • Managed By Eric Vanderburg © 2006
7.
Group Rules • Users
should be placed in groups • Permissions should be given to groups, not individual user accounts • Users can belong to many groups • Effective permissions – End result of all group memberships. All permissions from all groups are added together but deny overrides allow (use deny sparingly) Eric Vanderburg © 2006
8.
Built-in Groups • • • • • • • • • Administrators (Also
Domain & Enterprise) Account Operators - Create and manage user accounts Backup Operators - backup & restore Incoming Forest Trust Builders - make one way trusts to the root forest domain Network Configuration Operators - Change TCP/IP settings for DCs Performance Log Users - configure performance counters, logs, & alerts Performance Monitor Users - remotely view performance monitor Print Operators Remote Desktop Users Eric Vanderburg © 2006
9.
Built-in Groups • Replicator
- Can change the way AD data is sent between DC’s and can start the replicator • Server Operators - log onto DCs, start & stop services, backup & restore, format… • Cert Publishers - Publish CRL, CTL, & Templates • Enrollment Agent - Issue Certificates • DHCP Administrators • DNS Administrators • Group Policy Creator Owner • Schema Administrators • Help Services Group - Manage Help & Support center (remote assistance) • Guests Eric Vanderburg © 2006
10.
Automatic Groups • User
Groups • Everyone • Authenticated Users – non guest users • Interactive – local user • Network – logged onto domain • Creator / Owner • Anonymous Logon • Terminal Services User • Dialup Program/Service Groups • Service • Batch • System Eric Vanderburg © 2006
11.
Functional Levels Functional Level Supported
DC OS Windows 2000 Mixed Windows NT 4.0 Windows 2000 Windows Server 2003 Windows 2000 Native Windows 2000 Windows Server 2003 Windows Server 2003 Interim Windows NT 4.0 Windows Server 2003 Windows Server 2003 Windows Server 2003 • Can be a domain or forest functional level Eric Vanderburg © 2006
12.
Functional Levels Functional Level Options Windows
2000 Mixed No Universal Groups & Nesting Windows 2000 Native Universal Groups Allowed, Group Nesting Allowed, Group Conversion Allowed, SID History Win Server 2003 Interim No Universal Groups & Nesting Windows Server 2003 Universal Groups Allowed, Group Nesting Allowed, Group Conversion Allowed, SID History, Rename DC’s Eric Vanderburg © 2006
13.
Converting Groups • Groups
can be changed by type or scope • Cannot be changed in a way that would violate a rule. Ex: Universal group containing other universal groups is changed to a global group. (Global groups cannot contain Universal groups) • Global cannot be changed to domain local • Domain local cannot be changed to global Eric Vanderburg © 2006
14.
Computer Accounts • Used
to restrict access to the domain to certain computers • Must be Domain/Enterprise admin to add computers • Managed computer - connects with a RIS server to download a Windows installation tailored for that computer • Each one has a password. Must be synchronized at least every 30 days Eric Vanderburg © 2006
15.
Command Line • Commands
can work for the following: – User – Group – Computer – Contact – OU – Site Eric Vanderburg © 2006
16.
Command Line • Dsadd
group “ldap” –secgrp yes –scope u –memberof “ldap” –members “ldap” • Dsmod group “ldap” –desc “description” – rmmbr “ldap of member to remove” – addmbr “ldap of member to add” • Dsquery group –scope u –name “name” – desc “description” – Can also be used on quotas & partitions • Dsmove “ldap” –newparent “ldap” – newname “name” Eric Vanderburg © 2006
17.
Command Line • Dsrm
“ldap” – removes entries • Dsget group “ldap” –members -memberof – Get members or member of groups • Netdom reset computer /domain: domain – Reset a computer account Eric Vanderburg © 2006
Download now