Lesson 2: Planning New User Accounts - MCSE Training Kit, Microsoft Windows 2000 Active Directory Services [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

MCSE Training Kit, Microsoft Windows 2000 Active Directory Services [Electronic resources] - نسخه متنی

Jill Spealman

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید








Lesson 2: Planning New User Accounts



You can streamline the process of creating user accounts by planning or organizing the information for user accounts. This lesson introduces you to planning the following items for user accounts:




Naming conventions for user accounts


Requirements for passwords


Account options, such as logon hours, the computers from which users can log on, and account expiration





After this lesson, you will be able to


Plan a strategy for creating new user accounts


Explain how password requirements affect security levels




Estimated lesson time: 10 minutes



Naming Conventions



The naming convention establishes how users are identified in the domain. A consistent naming convention will help you and your users remember user logon names and locate them in lists.


Table 7.1 summarizes some points you might want to consider in determining a naming convention for your organization.


Table 7.1 Naming Convention Considerations






























Consideration Explanation

Local user accounts

Local user account names must be unique on the
computer where you create the local user account.

Domain user accounts

The user''s logon name (DN) must be unique to the
directory. The user''s full name (also referred to as display
name or account name) (RDN) must be unique within the
OU where you create the domain user account.

20 characters maximum

User logon names can contain up to 20 uppercase or
lowercase characters. Although the field accepts more
than 20 characters, Windows 2000 recognizes only
the first 20.

Invalid characters

The following characters are invalid: " / \ [ ] : ; | = , + * ? < >

User logon names are not case-sensitive

You can use a combination of special and alphanumeric
characters to help uniquely identify user accounts. User
logon names are not case-sensitive, but Windows 2000
preserves the case.

Accommodate employees with duplicate names

If two users were named John Doe, you could use the first
name and the last initial, and then add letters from the last name to differentiate the duplicate names. In this example,
one user account logon name could be Johnd and the
other Johndo. Another possibility would be to number
each user logon name—for example, Johnd1 and Johnd2.

Identify the type of employee

In some organizations, it is useful to identify temporary
employees by their user account. To identify temporary
employees, you can use a T and a dash in front of the
user''s logon name—for example, T-Johnd. Alternatively,
use parentheses in the name—for example, John
Doe (Temp).

E-mail compatibility

Some e-mail systems may not accept characters, such as
spaces and "()" brackets.


Password Requirements



To protect access to the domain or a computer, every user account should have a password. Consider the following guidelines for passwords:




Always assign a password for the Administrator account to prevent unauthorized access to the account.


Determine whether the Administrator or the users will control passwords. You can assign unique passwords for the user account and prevent users from changing them, or you can allow users to enter their own passwords the first time that they log on. In most cases, users should control their passwords.


Use passwords that are hard to guess. For example, avoid using passwords with an obvious association, such as a family member''s name.


Passwords can be up to 14 characters; a minimum length of eight characters is recommended.


Use characters from each of the following three groups: uppercase and lowercase letters, numerals, and nonalphanumeric characters.


Have at least one symbol character in the second through sixth positions.


Make them significantly different from prior passwords.


They must not contain the user''s name or user name.


They must not be a common word or name.




NOTE
Windows 2000 group policies can also affect passwords. For further information on using group policy, see Chapter 12, "Administering Group Policy."


Account Options



You should assess the hours when a user can log on to the network and the computers from which a user can log on, and you should determine if temporary user accounts need to expire. To determine account options, consider the following information.


Logon Hours



Set logon hours for users who only require access at specific times. For
example, allow night-shift workers to log on only during their working hours.


Computers from Which Users Can Log On



Determine the computers from which users can log on. By default, users can log on to the domain by using any computer in the domain. For security reasons, require users to log on to the domain only from their computer. This prevents users from gaining access to sensitive information that is stored on other computers.


CAUTIONIf you have disabled NetBIOS over TCP/IP, Windows 2000 is unable
to determine which computer you are logging on from and therefore you cannot restrict users to specific computers.


Account Expiration



Determine whether a user account should expire. If so, set an expiration date on the user account to ensure that the account is disabled when the user would no longer have access to the network. As a good security practice, you should set user accounts for temporary employees to expire when their contracts end.




Practice: Planning New User Accounts



In this practice, you plan how to implement user accounts for employees on the new hire list.


Scenario



As the Windows 2000 administrator for your corporate network, you need to set up the user accounts for new employees. Ten employees have recently been hired. You need to determine the following:




A naming convention that will easily accommodate employees with duplicate or similar names and temporary contract personnel


The hours during which users can log on


The computers at which a user can log on



Criteria



Use the following criteria to make your decisions:




All employees require a user account.


Permanent employees should control their passwords.


For security reasons, an administrator should control passwords for temporary employees.


Day-shift hours are from 8 AM through 5 PM and night-shift hours are from 6 PM through 6 AM.


Permanent employees require access to the network 24 hours a day, seven days a week.


Temporary employees log on at only their assigned computers and only during their shifts. The computer names for computers that temporary employees use are Temp1 and Temp2.



New Hire List



Table 7.2 provides fictitious names and hiring information for the new employees.


Table 7.2 New Hire List for Practice































































User Name Title Department Status Shift

Don Hall

Representative

Sales

Temporary

Day

Donna Hall

Manager

Product Support

Permanent

Night

James Smith

Vice President

Training

Permanent

Day

James Smith

Representative

Sales

Permanent

Day

Jon Morris

Developer

Product Development

Temporary

Night

Judy Lew

Developer

Product Development

Temporary

Day

Kim Yoshida

President

Training

Permanent

Day

Laurent Vernhes

Engineer

Product Support

Temporary

Night

Sandra Martinez

Engineer

Product Support

Permanent

Day


Planning Questions



Complete Table 7.3 to determine a naming convention for the users in the new hire list by considering the information that is provided in the sections "Scenario," "Criteria," and "New Hire List" in this practice.


Table 7.3 New Hire Naming Convention Plan for Practice







































User Name Full Name User Logon Name

Don Hall

Donna Hall

James Smith

Jon Morris

Judy Lew

Kim Yoshida

Laurent Vernhes

Sandra Martinez


Complete Table 7.4 to determine logon hours and computer use for the users in the new hire list by considering the information that is provided in the sections "Scenario," "Criteria," and "New Hire List" in this practice.


Table 7.4 New Hire Scheduling Plan for Practice











































User Name When Can the User Log On? Where Can the User Log On?

Don Hall

Donna Hall

James Smith

James Smith

Jon Morris

Judy Lew

Kim Yoshida

Laurent Vernhes

Sandra Martinez


Select the appropriate password setting for each user in Table 7.5 to determine who controls the user''s password.


Table 7.5 New Hire Password Settings Plan for Practice











































User Name User Must Change Password the Next Time He or She Logs On User Cannot Change Password

Don Hall

Donna Hall

James Smith

James Smith

Jon Morris

Judy Lew

Kim Yoshida

Laurent Vernhes

Sandra Martinez


Lesson Summary



In this lesson you learned that in planning user accounts, you should determine naming conventions for user accounts, requirements for passwords, and account options such as logon hours, the computers from which users can log on, and
account expiration. You learned that domain user accounts can be up to 20 characters in length and must be unique within the OU where you create the domain user account. The user''s logon name (DN) must be unique to the directory. The user''s full name (also referred to as display name or account name) (RDN) must be unique within the OU where you create the domain user account. Local user account names can also be up to 20 characters in length and must be unique on the computer where you create the local user account. Making these decisions before you start creating user accounts will reduce the amount of time it takes to create the needed user accounts and will simplify managing these accounts.


In the practice portion of this lesson, you were presented with a fictitious scenario and planned a naming convention that easily accommodated employees with
duplicate or similar names and temporary contract personnel. You also had to plan the hours during which users could log on and the computers at which a user could log on, based on the scenario and criteria you were supplied.


/ 113