Chapter 4
Chapter 4
Module Overview
1
Managing user accounts
• Users accounts:
• Allow or deny access to sign into computers
• Grant access to processes and services
• Manage access to network resources
2
Configuring user account attributes
3
Managing inactive and disabled user accounts
Managing groups in AD DS
• Group types
• Group scopes
• Implementing group management
• Managing group membership by using Group
Policy
• Default groups
• Special identities
• Demonstration: Managing groups in Windows
Server
4
Group types
• Distribution groups
• Used only with email applications
• Not security enabled (no SID)
• Cannot be given permissions
• Security groups
• Security principal with a SID
• Can be given permissions
• Can also be email-enabled
Group scopes
5
Implementing group management
I: Identities, users, or
computers,
which are members
of
6
Implementing group management
I: Identities, users, or
computers, which are
members of
G: Global groups, which Sales
(global group)
collect members based on
members’ roles, which are
members of
Auditors
(global group)
I: Identities, users, or
computers, which are Sales
members of (global group) Auditors
(global group)
G: Global groups, which
collect members based on ACL_Sales_Read
members’ roles, which are (domain-local group)
members of
DL: Domain-local groups,
which provide management
such as resource access which
are
7
Implementing group management
I: Identities, users, or
computers, which are
members of Sales
Auditors
G: Global groups, which (global group)
(global group)
collect members based on
members’ roles, which are ACL_Sales_Read
members of (domain-local group)
8
Managing group membership by using Group Policy
9
Default groups
Group Location
Enterprise Admins Users container of the forest root domain
Schema Admins Users container of the forest root domain
Administrators Built-in container of each domain
Domain Admins Users container of each domain
Server Operators Built-in container of each domain
Account Operators Built-in container of each domain
Backup Operators Built-in container of each domain
Print Operators Built-in container of each domain
Cert Publishers Users container of each domain
Special identities
• Special identities:
• Are groups for which the operating system controls
membership
• Can be used by the Windows Server operating system
to provide access to resources based on the type of
authentication or connection, not on the user account
10
Demonstration: Managing groups in Windows Server
• Planning OUs
• OU hierarchy considerations
• Considerations for using OUs
• AD DS permissions
• Delegating AD DS permissions
• Demonstration: Delegating administrative
permissions on an OU
11
Planning OUs
Hybrid strategy
OU hierarchy considerations
12
Considerations for using OUs
AD DS permissions
13
Delegating AD DS permissions
14