SlideShare a Scribd company logo
NETWORK
POLICIES
NETWORK
POLICIES
Prepared by: Ms. Mildred DO. Rodriguez
Subject Teacher
NETWORK
POLICIES
Network policies are sets
of conditions,
constraints, and settings
that allow you to
designate who is
authorized to connect to
the network and the
circumstances under which
they can or cannot
connect.
WHY IS IT IMPORTANT FOR A
NETWORK TO FOLLOW POLICIES?
A network that follows well-defined
policies capably fills business needs
that it is designed to support. Think
of network policies as objectives or
goals. Without clear objectives, your
network can't be set up to deliver
optimally, and without goals, its
performance can't be measured.
BUSINESS INTENT AND AGILITY
Network policies reflect business
intent. Network controllers ingest
business intent and create policies
that help achieve the desired
business outcomes. Policies are
enforced and carried out by network
equipment such as switches,
routers, wireless access points,
and wireless LAN controllers.
Networks operated in an ad hoc
fashion, without guiding policies,
will likely fail to deliver
optimally.
CONSISTENCY OF EXPERIENCE
Well-executed policies in the
network provide consistency of
service throughout it,
regardless of locations, means
of connectivity, or devices in
use. This means users and
things can use the network from
anywhere and still have the
same access privileges and
quality of network experience.
NETWORK
AUTOMATION
NETWORK DEVICES AND THEIR
OPERATIONS CAN BE BETTER
AUTOMATED WHEN GUIDANCE
EXISTS. WITH POLICIES,
CONFIGURATIONS CAN BE
AUTOMATED AND
ORCHESTRATED SO THAT EACH
DEVICE DOES WHAT'S
REQUIRED TO ACHIEVE THE
LARGER OBJECTIVES.
Performance Monitoring
Once well-understood goals are defined, metrics
can be established to measure how the network is
delivering. Continuous analysis of performance
helps ensure that policies are being followed
and business objectives are being met.
NETWORK
SECURITY
WITH POLICIES IN PLACE,
ANY VIOLATIONS CAN BE
EASIER TO DETECT.
SECURITY IS MORE EASILY
ENFORCED, THREATS MORE
QUICKLY CONTAINED, AND
RISK RAPIDLY REDUCED WITH
SECURITY-RELATED
POLICIES.
IT IS IMPORTANT TO
UNDERSTAND THE TYPES
OF USER ACCOUNTS AND
THE INFORMATION
NECESSARY TO CREATE
THEM.
USER ACCOUNTS
A user account is a record that consists
of user name and password required for the
user to log on, the groups in which the
user account belongs and the rights and
permission the user has for using the
computer and network resources. Each end
user who regularly uses a computer or the
network should have a unique user account.
LOCAL USER
ACCOUNTS
DOMAIN USER
ACCOUNTS
BUILT-IN USER
ACCOUNTS
User Account Types
LOCAL USER
ACCOUNT
LOCAL USER
ACCOUNTS
WHEN THIS ACCOUNT IS CREATED, THE OS
CREATES THE ACCOUNT ONLY IN THAT
COMPUTERS SECURITY DATABASE. THE OS
DOES NOT REPLICATE LOCAL USER ACCOUNT
INFORMATION TO DOMAIN CONTROLLERS.
AFTER A LOCAL USER ACCOUNT IS CREATED,
THE COMPUTER USES ITS LOCAL SECURITY
DATABASE TO AUTHENTICATE THE LOCAL
USER ACCOUNT THAT ALLOWS THE USER TO
LOG ON TO THAT COMPUTER.
DOMAIN USER ACCOUNT
In this account, the user is
allowed to gain access to
resources anywhere on the
network. The user provides his
or her username and password
during the logon process.
BUILT-IN USER ACCOUNT
There are two commonly used built-in accounts namely
the Administrator and Guest. The „Administrator‟
account is used if the user will manage the overall
computer and domain configuration for such tasks as
creating and modifying user accounts and groups,
managing security policies, creating printers and
assigning permissions and rights to user accounts to
gain access to resources. This account cannot be
deleted. The “Guest” account is used to provide
users who do not have an account in the domain with
the ability to log on and gain access to resources.
It does not require a password and is disabled by
default.
PASSWORD
GUIDELINES
PASSWORD GUIDELINES
Each user who has access to the
domain or computer should have a
strong password. A strong password
is used as an effective defense
against unauthorized access to a
computer resource. Passwords can be
up to 127 characters long. A
minimum length of seven characters
is recommended. A strong password
has the following characteristics
PASSWORD
GUIDELINES
PASSWORD GUIDELINES
• At least seven characters long. Does
not contain a user name, real name or
company name.
• Does not contain a complete dictionary
word.
• Is significantly different from
previous passwords.
• Passwords that increment are not
strong.
UPPERCAS
E
LETTERS
A, B, C
....
NUMERALS
0,1, 2,
3,4,5,6,7,
8, 9
LOWERCASE
LETTERS
a, b, c
...
SYMBOLS FOUND
ON KEYBOARD
ALL KEYBOARD
CHARACTERS
NOT DEFINED
AS LETTERS OR
NUMERALS)
` ~ ! @ # $ %
^ & * ( ) _ +
- = { } | [ ]
 ; “ ; „ < >
? , . /
CONTAINS CHARACTERS FROM EACH OF THE
FOLLOWING FOUR GROUPS SHOWN BELOW

More Related Content

Similar to 3_Network Policies_MDR.pdf

Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security Policies
Aamir Sohail
 
Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Principles for Secure Design and Software Security
Principles for Secure Design and Software Security
Mona Rajput
 
Get your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRGet your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPR
Abhishek Sood
 
More
MoreMore
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
Yusuf Hadiwinata Sutandar
 
Best Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyBest Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data Effectively
Tentacle Cloud
 
Network administration and support
Network administration and supportNetwork administration and support
Network administration and support
Manas Rai
 
encryption ppt
encryption pptencryption ppt
encryption ppt
Shiva Shiva
 
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseModern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
WinWire Technologies Inc
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
VishnuGone
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
klodianelezi1
 
6 ways to manage IT Security
6 ways to manage IT Security6 ways to manage IT Security
6 ways to manage IT Security
Monami Saluja
 
secure and authentication using personal device ppt
secure and authentication using personal device pptsecure and authentication using personal device ppt
secure and authentication using personal device ppt
Shiva Shiva
 
Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop Connection
SecurityMetrics
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
griffinruthie22
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 

Similar to 3_Network Policies_MDR.pdf (20)

Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security Policies
 
Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Principles for Secure Design and Software Security
Principles for Secure Design and Software Security
 
Case study
Case studyCase study
Case study
 
Get your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRGet your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPR
 
More
MoreMore
More
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
Best Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyBest Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data Effectively
 
Network administration and support
Network administration and supportNetwork administration and support
Network administration and support
 
encryption ppt
encryption pptencryption ppt
encryption ppt
 
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseModern Data Security for the Enterprises – SQL Server & Azure SQL Database
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
CyberArk
CyberArkCyberArk
CyberArk
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
 
6 ways to manage IT Security
6 ways to manage IT Security6 ways to manage IT Security
6 ways to manage IT Security
 
secure and authentication using personal device ppt
secure and authentication using personal device pptsecure and authentication using personal device ppt
secure and authentication using personal device ppt
 
Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop Connection
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 

Recently uploaded

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 

3_Network Policies_MDR.pdf

  • 1. NETWORK POLICIES NETWORK POLICIES Prepared by: Ms. Mildred DO. Rodriguez Subject Teacher
  • 2. NETWORK POLICIES Network policies are sets of conditions, constraints, and settings that allow you to designate who is authorized to connect to the network and the circumstances under which they can or cannot connect.
  • 3. WHY IS IT IMPORTANT FOR A NETWORK TO FOLLOW POLICIES? A network that follows well-defined policies capably fills business needs that it is designed to support. Think of network policies as objectives or goals. Without clear objectives, your network can't be set up to deliver optimally, and without goals, its performance can't be measured.
  • 4. BUSINESS INTENT AND AGILITY Network policies reflect business intent. Network controllers ingest business intent and create policies that help achieve the desired business outcomes. Policies are enforced and carried out by network equipment such as switches, routers, wireless access points, and wireless LAN controllers. Networks operated in an ad hoc fashion, without guiding policies, will likely fail to deliver optimally.
  • 5. CONSISTENCY OF EXPERIENCE Well-executed policies in the network provide consistency of service throughout it, regardless of locations, means of connectivity, or devices in use. This means users and things can use the network from anywhere and still have the same access privileges and quality of network experience.
  • 6. NETWORK AUTOMATION NETWORK DEVICES AND THEIR OPERATIONS CAN BE BETTER AUTOMATED WHEN GUIDANCE EXISTS. WITH POLICIES, CONFIGURATIONS CAN BE AUTOMATED AND ORCHESTRATED SO THAT EACH DEVICE DOES WHAT'S REQUIRED TO ACHIEVE THE LARGER OBJECTIVES.
  • 7. Performance Monitoring Once well-understood goals are defined, metrics can be established to measure how the network is delivering. Continuous analysis of performance helps ensure that policies are being followed and business objectives are being met.
  • 8. NETWORK SECURITY WITH POLICIES IN PLACE, ANY VIOLATIONS CAN BE EASIER TO DETECT. SECURITY IS MORE EASILY ENFORCED, THREATS MORE QUICKLY CONTAINED, AND RISK RAPIDLY REDUCED WITH SECURITY-RELATED POLICIES.
  • 9. IT IS IMPORTANT TO UNDERSTAND THE TYPES OF USER ACCOUNTS AND THE INFORMATION NECESSARY TO CREATE THEM.
  • 10. USER ACCOUNTS A user account is a record that consists of user name and password required for the user to log on, the groups in which the user account belongs and the rights and permission the user has for using the computer and network resources. Each end user who regularly uses a computer or the network should have a unique user account.
  • 11. LOCAL USER ACCOUNTS DOMAIN USER ACCOUNTS BUILT-IN USER ACCOUNTS User Account Types
  • 12. LOCAL USER ACCOUNT LOCAL USER ACCOUNTS WHEN THIS ACCOUNT IS CREATED, THE OS CREATES THE ACCOUNT ONLY IN THAT COMPUTERS SECURITY DATABASE. THE OS DOES NOT REPLICATE LOCAL USER ACCOUNT INFORMATION TO DOMAIN CONTROLLERS. AFTER A LOCAL USER ACCOUNT IS CREATED, THE COMPUTER USES ITS LOCAL SECURITY DATABASE TO AUTHENTICATE THE LOCAL USER ACCOUNT THAT ALLOWS THE USER TO LOG ON TO THAT COMPUTER.
  • 13. DOMAIN USER ACCOUNT In this account, the user is allowed to gain access to resources anywhere on the network. The user provides his or her username and password during the logon process.
  • 14. BUILT-IN USER ACCOUNT There are two commonly used built-in accounts namely the Administrator and Guest. The „Administrator‟ account is used if the user will manage the overall computer and domain configuration for such tasks as creating and modifying user accounts and groups, managing security policies, creating printers and assigning permissions and rights to user accounts to gain access to resources. This account cannot be deleted. The “Guest” account is used to provide users who do not have an account in the domain with the ability to log on and gain access to resources. It does not require a password and is disabled by default.
  • 15. PASSWORD GUIDELINES PASSWORD GUIDELINES Each user who has access to the domain or computer should have a strong password. A strong password is used as an effective defense against unauthorized access to a computer resource. Passwords can be up to 127 characters long. A minimum length of seven characters is recommended. A strong password has the following characteristics
  • 16. PASSWORD GUIDELINES PASSWORD GUIDELINES • At least seven characters long. Does not contain a user name, real name or company name. • Does not contain a complete dictionary word. • Is significantly different from previous passwords. • Passwords that increment are not strong.
  • 17. UPPERCAS E LETTERS A, B, C .... NUMERALS 0,1, 2, 3,4,5,6,7, 8, 9 LOWERCASE LETTERS a, b, c ... SYMBOLS FOUND ON KEYBOARD ALL KEYBOARD CHARACTERS NOT DEFINED AS LETTERS OR NUMERALS) ` ~ ! @ # $ % ^ & * ( ) _ + - = { } | [ ] ; “ ; „ < > ? , . / CONTAINS CHARACTERS FROM EACH OF THE FOLLOWING FOUR GROUPS SHOWN BELOW