Que.MCSA.MCSE.10070.100270.Exam.Prep.2.Windows.XP.Professional [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Que.MCSA.MCSE.10070.100270.Exam.Prep.2.Windows.XP.Professional [Electronic resources] - نسخه متنی

Melissa Craft, Don Poulton

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





Configuring, Managing, and Troubleshooting Users and Groups


When you grant rights to domain users, the best practice is to use the AGDLP method. This means that you place Accounts in Global groups. Then you place the Global groups into Domain Local groups, to which you grant (or deny) Permissions.

When a permission is explicitly denied to a user or group, even if the user is a member of another group where the same permission is explicitly granted, the Deny permission overrides all others and the user is not allowed access.

Whenever a user requests authorization to use a prohibited object or resource, the user sees an Access Is Denied message.

Table 26 lists Windows XP local groups, and includes their default access, default local members, and default domain members.

Table 26. Default Local Groups in Windows XP Professional

Local Group

Default Access

Default Members Locally

Default Domain Members When Joined to a Domain

Administrators

Unrestricted access to the computer

Administrator

Domain Admins Global Group

Backup Operators

Access to run Windows Backup and sufficient access rights that override other rights when performing backup

N/A

N/A

Guests

Limited only to explicitly granted rights and restricted usage of computer

Guest

Domain Guests Global group IUSR_machine

Power Users

Create\modify local user accounts, share resources

N/A

N/A

Remote Desktop Users

Limited to accessing the computer via a remote desktop connection plus any explicitly granted rights and restricted usage of computer

N/A

N/A

Users

Limited to use of the computer, personal files and folders, and explicitly granted rights

All newly created users NT Authority\Authenticated Users special built-in group NT Authority\ Interactive special built-in group

Domain Users Global group

Table 27 lists Windows XP built-in special groups, and includes their default access, default local members, and default domain members.

Table 27. Built-in Special Groups in Windows XP Professional

Built-in Group

Default Access

Default Members Locally

Default Domain Members When Joined to a Domain

Anonymous Logon

Not provided any default access rights

User accounts that Windows XP cannot authenticate locally

N/A

Authenticated Users

Not given any default access rights

All users with valid local user accounts on this computer

All Active Directory users in the computer's domain or any trusted domain

Creator Owner

Designated full control over resources created or taken over by a member of the Administrators group

Administrators group

N/A

Dialup

No specific rights; this group is not shown on systems without configured modems and dial-up connections

All users who have connected to the computer with a dial-up connection

N/A

Everyone

Full Control is the default permission granted for all files and folders on NTFS volumes; you must remove this permission to implicitly deny access

All users who access the computer

N/A

Interactive

No specific rights

All users who have logged on locally to the computer

N/A

Network

No specific rights

All users who have established a connection to this computer's shared resource from a remote network computer

N/A

Watch out for Audit policy questions that embed the FAT32-formatted disk into the question. FAT file systems do not support auditing. You can audit only an NTFS-formatted volume.

You cannot select Fast User Switching when your computer is a member of a domain or if you have enabled Offline Files.

You can add a .NET Passport only in the Control Panel User Accounts applet.

To configure the Local Group Policy, open the MMC console, click the File menu, click Add/Remove Snap-Ins, click Add, and select the Group Policy Editor snap-in. When asked to select the location of the GPO, select Local Computer.

You can display a user's actual rights to use a file by looking at the Effective Permissions tab of the Advanced Security options.

Cached credentials enable faster logons and single signons.

You can disable cached credentials in Group Policy by setting the Interactive Logon: Number of Previous Logons to Cache (in Case Domain Controller Is Not Available) policy to 0 logons.


/ 146