SlideShare a Scribd company logo
USER ACCOUNT MANAGEMENT
Configure users, group accounts, and access policies
Lecture 2
User Account
• User account is a collection of
information that tells Windows
• Which files and folders administrator
can access
• What changes administrator can
make to the computer
• The personal preferences (desktop
background or screen saver etc ).
• User accounts let administrator share
a computer with several people, while
having the own files and settings.
• Each person accesses his or her user
account with a username and
password.
2
Types of Accounts
• There are two types of accounts
• Domain User Accounts
• Local User Accounts
3
Domain User
Accounts
• These are created in the Active
Directory (AD)
• and they proved centralized
management of users
• besides easy administration.
4
Local User
Accounts
• These can be created on the Local
machines where the client works.
• Example Windows 7 professional.
• These accounts do not provide
centralized management.
• Suitable only for smaller organizations
where there is no server.
5
Creating a local
user Accounts
6
Creating a local
user Accounts
7
Creating a local
user Accounts
8
Creating a local
user Accounts
9
Creating a local
user Accounts
10
On member server Log on to local account
(Administrators and Power Users)
>Right click on my computer >Manage
Creating a local
user Accounts
11
On member server Log on to local account
(Administrators and Power Users)
>Right click on my computer >Manage
>Right click >add new user
Creating a local
user Accounts
12
On member server Log on to local account
(Administrators and Power Users)
>Right click on my computer >Manage
Creating a local
user Accounts
13
1. Administrator can also type compmgmt.msc in
the RUN box or from a command line to launch the
Computer Management MMC.
2. If administrator wants to directly open the
Local Users and Groups MMC Type lusrmgr.msc
from the RUN box or from a command line.
Steps to change
password of local
user accounts
14
15
Troubleshooting local
users
To fix a corrupt windows user profile
• Microsoft says that a user profile can become corrupted if
your antivirus software is scanning your PC while you try to
log on, but it can also be caused by other factors.
•
16
To fix a corrupt windows user profile
• Troubleshooting
• A quick fix can be to restart your PC but if this doesn’t work,
you’ll need to restart again and boot into safe mode do this
by pressing F8 before you see the windows loading screen
and choosing safe mode from the menu that appears.
• Safe mode logs you into the built-in windows administrator
account, but you find that some options do not work…
or
• create a new user profile and backup your saved data.
• 3Ways
https://www.youtube.com/watch?v=TwIOazT1BxU&ab_cha
nnel=NiyasC
17
You are unable to open an app in
windows
• Microsoft says that whenever you purchase or load a game
or such an application that was designed for other
windows… but you do not have that window…. The file will
not run…
Troubleshooting
• You are required to right click on that application and then
“run as administrator”…… in this way you will be able to
run such applications which were not designed for your
windows..
18
I tried to log on to my user account but I keep
getting message that the username or
password is incorrect
19
•1. Caps Lock might be ‘on’:
•Passwords in Windows are case-sensitive, which means that every time you
type your password, you have to capitalize each letter in exactly the same way
that you did when you first created it. If you have accidentally pressed Caps
Lock, then you’re inadvertently typing your password in all capital letters.
Make sure Caps Lock is off, and then type your password again.
• 2.You might be typing the wrong password: If you can’t remember your password,
you need to reset your password, either with a password reset disk or an
administrator account.
3. An administrator on the computer might have reset your password: If your
computer is on a network, a network administrator has the ability to reset your
password. If you think this might be the problem, check with your network
administrator. If your computer is in a workgroup, anyone who has an
administrator account on the computer can change your password.
20
I tried to log on to my user account but I keep
getting message that the username or
password is incorrect
• 4. You might be trying to log on to the wrong user account: If you have more than
one user account on the computer, make sure you’re logging on to the account that
matches the password you’re using. Use switch user to select the right account.
21
I tried to log on to my user account, but I
keep getting message that the username or
password is incorrect
Cont..
• 5. You might forget your password: Forgetting password is most common
issue. To overcome this issue use Reset Password option available at log
on screen once you tried to insert a wrong password.
22
I tried to log on to my user account, but I
keep getting message that the username or
password is incorrect
CONFIGURING , MANAGING AND
TROUBLESHOOTING OF GROUP
ACCOUNTS
Configure users, group accounts, and access policies
What is a
Group?
The group is a collection of
accounts that share the
same security rights and
permissions.
GROUP
ACCOUNTS
• A Group Account is a
collection of
user accounts. On a
management server that is
running Windows, you
can create a group
account to manage the
privileges of
multiple accounts togethe
r. By making a
user account a member of
a group, you give that user
all the rights and
permissions granted to the
group.
CONT…
• Windows has a long list of
predefined user groups which
includes “Administrators” and
“Users.”
• A user account is a member of at
least one user group while some user
accounts are members of two groups
or more, depending on how they are
set.
• User groups are managed
automatically by Windows and you
won’t need to fiddle with them, even
though you can if you are an
administrator.
CONT….
• For example, all user accounts that are set
as administrators will be part of the
“Administrators” group. Standard user
accounts are part of the “Users” group.
However, both types of user accounts will
become members of the “HomeUsers”
group, when you start using the
Homegroup networking feature in
Windows.
Local Users and Groups Consol
* Displays all built in groups as well as
groups created by administrator.
Administrators
Members of the Administrator group
have total control over the computer
and everything on it. The user named
Administrator is the default account
within this group.
Administrators Can:
* Create, modify, and access local user
accounts
• Install new hardware and software
• Upgrade the operating system
• Back up the system and files
• Claim ownership of files that have
become damaged
* Do anything a Power User can
Power Users
and Users
The Power User class can perform any
task except for those reserved for
Administrators. But a power user can
not
• Access other users' data without
permission.
• Delete or modify user accounts
they did not create.
• Users can perform common tasks,
but have little power to affect the
computer outside of their own
account.
Users can perform common tasks, but
have little power to affect the
computer outside of their own
account.
Guests and
Backup
Operators
• Guests
• The Guests group grants limited
access to occasional or one-time
users. Once a Guest logsout, all files
created by the guest is deleted.
• Backup Operators
• Members of the Backup Operators
group can back up and restore files
on the computer but they cannot
change security settings.
.
How to Create
and Delete a
User Group in
Windows 7
• This could be useful if you
would like to create a new
group,add users to be a
member of this group,
then assign user rights to the
group. This way you could have
your own special custom group
of users with user rights
assignments that you set for
them.
Create a New
User Group
Create a New User Group
On member server Log on to local account
(Administrators and Power Users)
>Right click on my computer >Manage
NEW GROUP
• In the left pane, click on Groups to open it. In
the right pane of Groups, right click on a empty
space, and click on New Group.
• Type in a "group name" (ex: New Group), a
"description" (ex: Example of new group
created) for the group, add users (ex: my user
account "Brink") that you would like to be a
member of this new group, then click on
theCreate and Close buttons.
NEW
GROUP
• The new group has been
created
NEW GROUP
• You can now assign user rights to the group,
and add or remove users from being a member of
this group at anytime
HOW TO
DELETE A
GROUP
• When you delete a group, all users that
were a member of that group will
automatically lose all user rights
assigned to that group. Be very careful
to not delete the wrong group. I would
recommend to not delete any of the
default groups, and only delete groups
that you created and no longer need.
• I would highly recommend that
you create a restore point before
adding or deleting groups. This way if
you make a mistake and delete the
wrong group, you will be able to do a
system restore at boot and select the
restore point to undo the mistake.
• In the left pane, click on Groups to
open it. In the right pane of Groups,
right click on a group (ex: New Group)
that you wanted to delete, and click
on Delete.
Warning
Delete a Group
CONT….
• Click on Yes to approve deleting the group.
• The group (ex: New Group) has been deleted.
• When finished, close Local Users and Groups.
Open "Local Users and Groups
Manager"
• OPTION ONE
• Open "Local Users and Groups Manager" Directly
• 1. Press the Windows + R keys to open the Run
dialog, type lusrmgr.msc, and press Enter.
NOTE: This file is located
at C:WindowsSystem32lusrmgr.msc.
2. You can now set and manage the Local Users and
Groups settings on your computer to how you want
them.
OPTION TWO
• Open "Local Users and Groups Manager" in Computer
Management
• 1. Open the Control Panel (icons view), and click/tap on
the Administrative Tools icon.
2. Close the Control Panel window.
3. In Administrative Tools, click/tap on the Computer
Management icon.
4. If prompted, click/tap on Yes.
5. Close the Administrative Tools window.
6. In the left pane of Computer Management, double click/tap
on Local Users and Groups. (
42
Troubleshooting
Group Accounts
Two users out of three logon in their
accounts 3rd cannot
Troubleshooting
1. Check whether caps lock is on.
2. Check whether you are entering right password.
3. It may be possible that an admin account or the group
manager has changed the user password.. Ask the
manager or admin to check your password or reset your
password…
But this is briefly discussed in group policies which is another
vast discussion
A local user cannot view desktop
icons
Troubleshooting
1st of all right click on the desktop screen.
Now click on view.
Click on view desktop icons..
If it doesn’t work then the group manager may have
customized group account policies for you.
Again group policy is another vast discussion and another
topic.
45
Encrypting File
System(EFS)
© ExplorNet’s Centers for Quality Teaching and Learning 46
Encryption in Windows
Encrypting File System (EFS)
A Windows file system feature that allows
users to encrypt information on all types of
physical media.
Available on all versions of Windows.
Fully supported in the Professional,
Enterprise, and Ultimate versions.
Partially supported on Starter, Home.
© ExplorNet’s Centers for Quality Teaching and Learning 47
Encryption in Windows
Files are not encrypted by default.
When users choose to encrypt the file/folder
appears green in Windows Explorer.
© ExplorNet’s Centers for Quality Teaching and Learning 48
How to Use EFS
A user chooses to secure a
file/folder with EFS through
the Properties dialog box.
© ExplorNet’s Centers for Quality Teaching and Learning 49
How to Use EFS
From the Advanced
attributes a user can
choose to encrypt.
If “file only” encryption is
done a second prompt
asking to encrypt the
folder may appear.
© ExplorNet’s Centers for Quality Teaching and Learning 50
1. When you mark a file for encryption EFS
creates an encryption key.
A key is a large, random number specific to
that file/folder.
The encryption key is stored with the file.
2. EFS then uses the key and an algorithm to
scramble the contents of the file.
To authorized users the file appears normal.
Unauthorized attempts to open the file result
in an “Access Denied” message.
© ExplorNet’s Centers for Quality Teaching and Learning 51
How EFS Works: Encryption
3. To link the key to your user account each
file/folder key is encrypted with a personal file
encryption certificate called an EFS Certificate.
4. Your EFS Certificate is stored in the Windows
Certificate database.
https://www.youtube.com/watch?v=xfVpFn1hQYs
© ExplorNet’s Centers for Quality Teaching and Learning 52
How EFS Works: Decryption
When you attempt to open an encrypted file this is approximately what
happens.
1. The file signals the need to be decoded.
To decode the file the encryption key is needed.
The encryption is stored with the file, but….
Recall that the encryption key itself was encrypted
2. The OS calls for an EFS Certificate to decode the encryption key.
© ExplorNet’s Centers for Quality Teaching and Learning 53
How EFS Works: Decryption
3. Windows finds your EFS Certificate because you are logged in
to your user account.
Because your EFS Certificate was used to encrypt the file’s
encryption key it can also be used to correctly decode the
encryption key.
4. The OS decodes the file’s encryption key using your EFS
Certificate.
5. The OS uses the file’s encryption key to decode the file.
© ExplorNet’s Centers for Quality Teaching and Learning 54
EFS Tips
Loss or damage to an encryption key or EFS Certificate means loss of
the file/folder.
Always have backups.
The Administrator account is the designated recovery agent if you
ever lose access to a file.
Encrypting at the folder level is preferred.
New files added to the folder are automatically encrypted.
Less chance of accidental file security breach.
Encrypting adds processing time to file accesses and increases file
size significantly.
© ExplorNet’s Centers for Quality Teaching and Learning 55
Compression
The process of reducing the size of data without affecting the content.
Compression is used by any company with a sizeable amount of data.
Storage is expensive.
If the data is important there will be a backup copy.
Now you need twice as much storage.
© ExplorNet’s Centers for Quality Teaching and Learning 56
Compression
Files often consist of repetitive binary patterns.
Mathematicians use this fact to develop compression
algorithms that replace the repetitive data with pointers.
Pointers take up much less space without compromising
the data.
© ExplorNet’s Centers for Quality Teaching and Learning 57
How to Use Compression
Choose
© ExplorNet’s Centers for Quality Teaching and Learning 58
Compression Tips
Compressed files appear blue in Explorer.
Compressed files cannot be encrypted.
If you want to encrypt, decompress first, then
encrypt.
Different files have different compression ratios.
Large, contiguous files usually experience the most
gain from compression.
Video is a good example, lots of repeated
frames.
59
Troubleshooting
Encrypting File
System
When I try to encrypt my files,
it doesn't work.
• Make sure that the following conditions are true:
• A recovery agent policy has been defined.
• The file volume is NTFS.
• The file is not compressed.
• You have write access to the file.
• Sometimes users think that the file is not encrypted because they can
open it and read the file. Remind them to verify that the file is
encrypted by checking the file's attribute.
• Sometimes a user tries to encrypt a folder that has the compression
attribute set or is on a compressed drive. First, you have to remove the
compression attribute, and then you can encrypt.
60
I can't open files I have encrypted.
• Make sure you have the correct EFS certificate and private key for the
file. If it is an old file, the public key and private key set might no
longer be available. Expired certificates and private keys are archived.
However, users can delete archived certificates and private keys, or
they might be damaged. If so, recover the file as described earlier in
this chapter.
• If the computer previously operated in stand-alone mode and is now a
member of a domain, this can make a difference. The file might have
been encrypted by using a local self-signed certificate issued by the
computer, whereas the CA designated at the domain level is now the
issuing authority.
61
62
Access Policies
What is access control?
• Access control is a fundamental component of data security that dictates
who’s allowed to access and use company information and resources.
Through authentication and authorization, access control policies make
sure users are who they say they are and that they have appropriate
access to company data. Access control can also be applied to limit
physical access to campuses, buildings, rooms, and datacenters.
MS AD
MS AD
MS AD
MS AD
MS AD

More Related Content

Similar to MS AD

Users and groups in xp
Users and groups in xpUsers and groups in xp
Users and groups in xp
Rauf Wani
 
Windows Server 2012 Managing Active Directory Domain
Windows Server 2012 Managing  Active Directory DomainWindows Server 2012 Managing  Active Directory Domain
Windows Server 2012 Managing Active Directory Domain
Napoleon NV
 
HARDENING OF WINDOWS 10 OS.pptx
HARDENING OF WINDOWS 10 OS.pptxHARDENING OF WINDOWS 10 OS.pptx
HARDENING OF WINDOWS 10 OS.pptx
ssuser80ad2d
 
Lesson 11 Managing User Accounts
Lesson 11  Managing User AccountsLesson 11  Managing User Accounts
Lesson 11 Managing User Accounts
guevarra_2000
 
Netex learningMaker | Administrator Manual v3.0 [En]
Netex learningMaker | Administrator Manual v3.0 [En]Netex learningMaker | Administrator Manual v3.0 [En]
Netex learningMaker | Administrator Manual v3.0 [En]
Netex Learning
 
Ca1 report
Ca1 reportCa1 report
Ca1 report
aeehhhly
 
SAP Business One Basics Administration Refresher Training by AGS
SAP Business One Basics Administration Refresher Training by AGSSAP Business One Basics Administration Refresher Training by AGS
SAP Business One Basics Administration Refresher Training by AGS
AGSanePLDTCompany
 
Configuring Sites, Users and Groups
Configuring Sites, Users and GroupsConfiguring Sites, Users and Groups
Configuring Sites, Users and Groups
SyAM Software
 
7 - User Administration in Red Hat
7 - User Administration in Red Hat7 - User Administration in Red Hat
7 - User Administration in Red Hat
Shafaan Khaliq Bhatti
 
Kendis - How to Manage, Users, Groups, Permissions and Workspaces
Kendis - How to Manage, Users, Groups, Permissions and WorkspacesKendis - How to Manage, Users, Groups, Permissions and Workspaces
Kendis - How to Manage, Users, Groups, Permissions and Workspaces
Kendis.io
 
microsoft+windows+security
microsoft+windows+securitymicrosoft+windows+security
microsoft+windows+security
Erdo Deshiant Garnaby
 
Empowerment Technologies - Windows Security
Empowerment Technologies - Windows SecurityEmpowerment Technologies - Windows Security
Empowerment Technologies - Windows Security
JustinePerocho1
 
ETECH
ETECHETECH
Bulletin Boards - Quick Start Guide To User Management
Bulletin Boards - Quick Start Guide To User ManagementBulletin Boards - Quick Start Guide To User Management
Bulletin Boards - Quick Start Guide To User Management
VisionsLive
 
Getting started with Innovbook
Getting started with InnovbookGetting started with Innovbook
Getting started with Innovbook
Innovbook
 
Necto 16 training 17 - administration
Necto 16 training 17 -  administrationNecto 16 training 17 -  administration
Necto 16 training 17 - administration
Panorama Software
 
HelpDesk Training Manual
HelpDesk Training ManualHelpDesk Training Manual
HelpDesk Training Manual
MakeNET
 
Windows classes
Windows classesWindows classes
Windows classes
deepika Yadagiri
 
10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management
BeyondTrust
 
How to remove go.mail.ru
How to remove go.mail.ruHow to remove go.mail.ru
How to remove go.mail.ru
haroNaroum
 

Similar to MS AD (20)

Users and groups in xp
Users and groups in xpUsers and groups in xp
Users and groups in xp
 
Windows Server 2012 Managing Active Directory Domain
Windows Server 2012 Managing  Active Directory DomainWindows Server 2012 Managing  Active Directory Domain
Windows Server 2012 Managing Active Directory Domain
 
HARDENING OF WINDOWS 10 OS.pptx
HARDENING OF WINDOWS 10 OS.pptxHARDENING OF WINDOWS 10 OS.pptx
HARDENING OF WINDOWS 10 OS.pptx
 
Lesson 11 Managing User Accounts
Lesson 11  Managing User AccountsLesson 11  Managing User Accounts
Lesson 11 Managing User Accounts
 
Netex learningMaker | Administrator Manual v3.0 [En]
Netex learningMaker | Administrator Manual v3.0 [En]Netex learningMaker | Administrator Manual v3.0 [En]
Netex learningMaker | Administrator Manual v3.0 [En]
 
Ca1 report
Ca1 reportCa1 report
Ca1 report
 
SAP Business One Basics Administration Refresher Training by AGS
SAP Business One Basics Administration Refresher Training by AGSSAP Business One Basics Administration Refresher Training by AGS
SAP Business One Basics Administration Refresher Training by AGS
 
Configuring Sites, Users and Groups
Configuring Sites, Users and GroupsConfiguring Sites, Users and Groups
Configuring Sites, Users and Groups
 
7 - User Administration in Red Hat
7 - User Administration in Red Hat7 - User Administration in Red Hat
7 - User Administration in Red Hat
 
Kendis - How to Manage, Users, Groups, Permissions and Workspaces
Kendis - How to Manage, Users, Groups, Permissions and WorkspacesKendis - How to Manage, Users, Groups, Permissions and Workspaces
Kendis - How to Manage, Users, Groups, Permissions and Workspaces
 
microsoft+windows+security
microsoft+windows+securitymicrosoft+windows+security
microsoft+windows+security
 
Empowerment Technologies - Windows Security
Empowerment Technologies - Windows SecurityEmpowerment Technologies - Windows Security
Empowerment Technologies - Windows Security
 
ETECH
ETECHETECH
ETECH
 
Bulletin Boards - Quick Start Guide To User Management
Bulletin Boards - Quick Start Guide To User ManagementBulletin Boards - Quick Start Guide To User Management
Bulletin Boards - Quick Start Guide To User Management
 
Getting started with Innovbook
Getting started with InnovbookGetting started with Innovbook
Getting started with Innovbook
 
Necto 16 training 17 - administration
Necto 16 training 17 -  administrationNecto 16 training 17 -  administration
Necto 16 training 17 - administration
 
HelpDesk Training Manual
HelpDesk Training ManualHelpDesk Training Manual
HelpDesk Training Manual
 
Windows classes
Windows classesWindows classes
Windows classes
 
10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management
 
How to remove go.mail.ru
How to remove go.mail.ruHow to remove go.mail.ru
How to remove go.mail.ru
 

Recently uploaded

Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
spdendr
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
Amin Marwan
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 

Recently uploaded (20)

Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 

MS AD

  • 1. USER ACCOUNT MANAGEMENT Configure users, group accounts, and access policies Lecture 2
  • 2. User Account • User account is a collection of information that tells Windows • Which files and folders administrator can access • What changes administrator can make to the computer • The personal preferences (desktop background or screen saver etc ). • User accounts let administrator share a computer with several people, while having the own files and settings. • Each person accesses his or her user account with a username and password. 2
  • 3. Types of Accounts • There are two types of accounts • Domain User Accounts • Local User Accounts 3
  • 4. Domain User Accounts • These are created in the Active Directory (AD) • and they proved centralized management of users • besides easy administration. 4
  • 5. Local User Accounts • These can be created on the Local machines where the client works. • Example Windows 7 professional. • These accounts do not provide centralized management. • Suitable only for smaller organizations where there is no server. 5
  • 10. Creating a local user Accounts 10 On member server Log on to local account (Administrators and Power Users) >Right click on my computer >Manage
  • 11. Creating a local user Accounts 11 On member server Log on to local account (Administrators and Power Users) >Right click on my computer >Manage >Right click >add new user
  • 12. Creating a local user Accounts 12 On member server Log on to local account (Administrators and Power Users) >Right click on my computer >Manage
  • 13. Creating a local user Accounts 13 1. Administrator can also type compmgmt.msc in the RUN box or from a command line to launch the Computer Management MMC. 2. If administrator wants to directly open the Local Users and Groups MMC Type lusrmgr.msc from the RUN box or from a command line.
  • 14. Steps to change password of local user accounts 14
  • 16. To fix a corrupt windows user profile • Microsoft says that a user profile can become corrupted if your antivirus software is scanning your PC while you try to log on, but it can also be caused by other factors. • 16
  • 17. To fix a corrupt windows user profile • Troubleshooting • A quick fix can be to restart your PC but if this doesn’t work, you’ll need to restart again and boot into safe mode do this by pressing F8 before you see the windows loading screen and choosing safe mode from the menu that appears. • Safe mode logs you into the built-in windows administrator account, but you find that some options do not work… or • create a new user profile and backup your saved data. • 3Ways https://www.youtube.com/watch?v=TwIOazT1BxU&ab_cha nnel=NiyasC 17
  • 18. You are unable to open an app in windows • Microsoft says that whenever you purchase or load a game or such an application that was designed for other windows… but you do not have that window…. The file will not run… Troubleshooting • You are required to right click on that application and then “run as administrator”…… in this way you will be able to run such applications which were not designed for your windows.. 18
  • 19. I tried to log on to my user account but I keep getting message that the username or password is incorrect 19 •1. Caps Lock might be ‘on’: •Passwords in Windows are case-sensitive, which means that every time you type your password, you have to capitalize each letter in exactly the same way that you did when you first created it. If you have accidentally pressed Caps Lock, then you’re inadvertently typing your password in all capital letters. Make sure Caps Lock is off, and then type your password again.
  • 20. • 2.You might be typing the wrong password: If you can’t remember your password, you need to reset your password, either with a password reset disk or an administrator account. 3. An administrator on the computer might have reset your password: If your computer is on a network, a network administrator has the ability to reset your password. If you think this might be the problem, check with your network administrator. If your computer is in a workgroup, anyone who has an administrator account on the computer can change your password. 20 I tried to log on to my user account but I keep getting message that the username or password is incorrect
  • 21. • 4. You might be trying to log on to the wrong user account: If you have more than one user account on the computer, make sure you’re logging on to the account that matches the password you’re using. Use switch user to select the right account. 21 I tried to log on to my user account, but I keep getting message that the username or password is incorrect
  • 22. Cont.. • 5. You might forget your password: Forgetting password is most common issue. To overcome this issue use Reset Password option available at log on screen once you tried to insert a wrong password. 22 I tried to log on to my user account, but I keep getting message that the username or password is incorrect
  • 23. CONFIGURING , MANAGING AND TROUBLESHOOTING OF GROUP ACCOUNTS Configure users, group accounts, and access policies
  • 24. What is a Group? The group is a collection of accounts that share the same security rights and permissions.
  • 25. GROUP ACCOUNTS • A Group Account is a collection of user accounts. On a management server that is running Windows, you can create a group account to manage the privileges of multiple accounts togethe r. By making a user account a member of a group, you give that user all the rights and permissions granted to the group.
  • 26. CONT… • Windows has a long list of predefined user groups which includes “Administrators” and “Users.” • A user account is a member of at least one user group while some user accounts are members of two groups or more, depending on how they are set. • User groups are managed automatically by Windows and you won’t need to fiddle with them, even though you can if you are an administrator.
  • 27. CONT…. • For example, all user accounts that are set as administrators will be part of the “Administrators” group. Standard user accounts are part of the “Users” group. However, both types of user accounts will become members of the “HomeUsers” group, when you start using the Homegroup networking feature in Windows. Local Users and Groups Consol * Displays all built in groups as well as groups created by administrator.
  • 28. Administrators Members of the Administrator group have total control over the computer and everything on it. The user named Administrator is the default account within this group. Administrators Can: * Create, modify, and access local user accounts • Install new hardware and software • Upgrade the operating system • Back up the system and files • Claim ownership of files that have become damaged * Do anything a Power User can
  • 29. Power Users and Users The Power User class can perform any task except for those reserved for Administrators. But a power user can not • Access other users' data without permission. • Delete or modify user accounts they did not create. • Users can perform common tasks, but have little power to affect the computer outside of their own account. Users can perform common tasks, but have little power to affect the computer outside of their own account.
  • 30. Guests and Backup Operators • Guests • The Guests group grants limited access to occasional or one-time users. Once a Guest logsout, all files created by the guest is deleted. • Backup Operators • Members of the Backup Operators group can back up and restore files on the computer but they cannot change security settings. .
  • 31. How to Create and Delete a User Group in Windows 7 • This could be useful if you would like to create a new group,add users to be a member of this group, then assign user rights to the group. This way you could have your own special custom group of users with user rights assignments that you set for them.
  • 33. Create a New User Group On member server Log on to local account (Administrators and Power Users) >Right click on my computer >Manage
  • 34. NEW GROUP • In the left pane, click on Groups to open it. In the right pane of Groups, right click on a empty space, and click on New Group. • Type in a "group name" (ex: New Group), a "description" (ex: Example of new group created) for the group, add users (ex: my user account "Brink") that you would like to be a member of this new group, then click on theCreate and Close buttons.
  • 35. NEW GROUP • The new group has been created
  • 36. NEW GROUP • You can now assign user rights to the group, and add or remove users from being a member of this group at anytime
  • 37. HOW TO DELETE A GROUP • When you delete a group, all users that were a member of that group will automatically lose all user rights assigned to that group. Be very careful to not delete the wrong group. I would recommend to not delete any of the default groups, and only delete groups that you created and no longer need. • I would highly recommend that you create a restore point before adding or deleting groups. This way if you make a mistake and delete the wrong group, you will be able to do a system restore at boot and select the restore point to undo the mistake. • In the left pane, click on Groups to open it. In the right pane of Groups, right click on a group (ex: New Group) that you wanted to delete, and click on Delete. Warning
  • 39. CONT…. • Click on Yes to approve deleting the group. • The group (ex: New Group) has been deleted. • When finished, close Local Users and Groups.
  • 40. Open "Local Users and Groups Manager" • OPTION ONE • Open "Local Users and Groups Manager" Directly • 1. Press the Windows + R keys to open the Run dialog, type lusrmgr.msc, and press Enter. NOTE: This file is located at C:WindowsSystem32lusrmgr.msc. 2. You can now set and manage the Local Users and Groups settings on your computer to how you want them.
  • 41. OPTION TWO • Open "Local Users and Groups Manager" in Computer Management • 1. Open the Control Panel (icons view), and click/tap on the Administrative Tools icon. 2. Close the Control Panel window. 3. In Administrative Tools, click/tap on the Computer Management icon. 4. If prompted, click/tap on Yes. 5. Close the Administrative Tools window. 6. In the left pane of Computer Management, double click/tap on Local Users and Groups. (
  • 43. Two users out of three logon in their accounts 3rd cannot Troubleshooting 1. Check whether caps lock is on. 2. Check whether you are entering right password. 3. It may be possible that an admin account or the group manager has changed the user password.. Ask the manager or admin to check your password or reset your password… But this is briefly discussed in group policies which is another vast discussion
  • 44. A local user cannot view desktop icons Troubleshooting 1st of all right click on the desktop screen. Now click on view. Click on view desktop icons.. If it doesn’t work then the group manager may have customized group account policies for you. Again group policy is another vast discussion and another topic.
  • 46. © ExplorNet’s Centers for Quality Teaching and Learning 46 Encryption in Windows Encrypting File System (EFS) A Windows file system feature that allows users to encrypt information on all types of physical media. Available on all versions of Windows. Fully supported in the Professional, Enterprise, and Ultimate versions. Partially supported on Starter, Home.
  • 47. © ExplorNet’s Centers for Quality Teaching and Learning 47 Encryption in Windows Files are not encrypted by default. When users choose to encrypt the file/folder appears green in Windows Explorer.
  • 48. © ExplorNet’s Centers for Quality Teaching and Learning 48 How to Use EFS A user chooses to secure a file/folder with EFS through the Properties dialog box.
  • 49. © ExplorNet’s Centers for Quality Teaching and Learning 49 How to Use EFS From the Advanced attributes a user can choose to encrypt. If “file only” encryption is done a second prompt asking to encrypt the folder may appear.
  • 50. © ExplorNet’s Centers for Quality Teaching and Learning 50 1. When you mark a file for encryption EFS creates an encryption key. A key is a large, random number specific to that file/folder. The encryption key is stored with the file. 2. EFS then uses the key and an algorithm to scramble the contents of the file. To authorized users the file appears normal. Unauthorized attempts to open the file result in an “Access Denied” message.
  • 51. © ExplorNet’s Centers for Quality Teaching and Learning 51 How EFS Works: Encryption 3. To link the key to your user account each file/folder key is encrypted with a personal file encryption certificate called an EFS Certificate. 4. Your EFS Certificate is stored in the Windows Certificate database. https://www.youtube.com/watch?v=xfVpFn1hQYs
  • 52. © ExplorNet’s Centers for Quality Teaching and Learning 52 How EFS Works: Decryption When you attempt to open an encrypted file this is approximately what happens. 1. The file signals the need to be decoded. To decode the file the encryption key is needed. The encryption is stored with the file, but…. Recall that the encryption key itself was encrypted 2. The OS calls for an EFS Certificate to decode the encryption key.
  • 53. © ExplorNet’s Centers for Quality Teaching and Learning 53 How EFS Works: Decryption 3. Windows finds your EFS Certificate because you are logged in to your user account. Because your EFS Certificate was used to encrypt the file’s encryption key it can also be used to correctly decode the encryption key. 4. The OS decodes the file’s encryption key using your EFS Certificate. 5. The OS uses the file’s encryption key to decode the file.
  • 54. © ExplorNet’s Centers for Quality Teaching and Learning 54 EFS Tips Loss or damage to an encryption key or EFS Certificate means loss of the file/folder. Always have backups. The Administrator account is the designated recovery agent if you ever lose access to a file. Encrypting at the folder level is preferred. New files added to the folder are automatically encrypted. Less chance of accidental file security breach. Encrypting adds processing time to file accesses and increases file size significantly.
  • 55. © ExplorNet’s Centers for Quality Teaching and Learning 55 Compression The process of reducing the size of data without affecting the content. Compression is used by any company with a sizeable amount of data. Storage is expensive. If the data is important there will be a backup copy. Now you need twice as much storage.
  • 56. © ExplorNet’s Centers for Quality Teaching and Learning 56 Compression Files often consist of repetitive binary patterns. Mathematicians use this fact to develop compression algorithms that replace the repetitive data with pointers. Pointers take up much less space without compromising the data.
  • 57. © ExplorNet’s Centers for Quality Teaching and Learning 57 How to Use Compression Choose
  • 58. © ExplorNet’s Centers for Quality Teaching and Learning 58 Compression Tips Compressed files appear blue in Explorer. Compressed files cannot be encrypted. If you want to encrypt, decompress first, then encrypt. Different files have different compression ratios. Large, contiguous files usually experience the most gain from compression. Video is a good example, lots of repeated frames.
  • 60. When I try to encrypt my files, it doesn't work. • Make sure that the following conditions are true: • A recovery agent policy has been defined. • The file volume is NTFS. • The file is not compressed. • You have write access to the file. • Sometimes users think that the file is not encrypted because they can open it and read the file. Remind them to verify that the file is encrypted by checking the file's attribute. • Sometimes a user tries to encrypt a folder that has the compression attribute set or is on a compressed drive. First, you have to remove the compression attribute, and then you can encrypt. 60
  • 61. I can't open files I have encrypted. • Make sure you have the correct EFS certificate and private key for the file. If it is an old file, the public key and private key set might no longer be available. Expired certificates and private keys are archived. However, users can delete archived certificates and private keys, or they might be damaged. If so, recover the file as described earlier in this chapter. • If the computer previously operated in stand-alone mode and is now a member of a domain, this can make a difference. The file might have been encrypted by using a local self-signed certificate issued by the computer, whereas the CA designated at the domain level is now the issuing authority. 61
  • 63. What is access control? • Access control is a fundamental component of data security that dictates who’s allowed to access and use company information and resources. Through authentication and authorization, access control policies make sure users are who they say they are and that they have appropriate access to company data. Access control can also be applied to limit physical access to campuses, buildings, rooms, and datacenters.