MCSE Training Kit, Microsoft Windows 2000 Active Directory Services [Electronic resources]

Jill Spealman

نسخه متنی -صفحه : 113/ 45
نمايش فراداده

Lesson 2: Planning New User Accounts

You can streamline the process of creating user accounts by planning or organizing the information for user accounts. This lesson introduces you to planning the following items for user accounts:

Naming conventions for user accounts

Requirements for passwords

Account options, such as logon hours, the computers from which users can log on, and account expiration

After this lesson, you will be able to

Plan a strategy for creating new user accounts

Explain how password requirements affect security levels

Estimated lesson time: 10 minutes

Naming Conventions

The naming convention establishes how users are identified in the domain. A consistent naming convention will help you and your users remember user logon names and locate them in lists.

Table 7.1 summarizes some points you might want to consider in determining a naming convention for your organization.

Table 7.1 Naming Convention Considerations

Consideration Explanation

Local user accounts

Local user account names must be unique on the computer where you create the local user account.

Domain user accounts

The user''s logon name (DN) must be unique to the directory. The user''s full name (also referred to as display name or account name) (RDN) must be unique within the OU where you create the domain user account.

20 characters maximum

User logon names can contain up to 20 uppercase or lowercase characters. Although the field accepts more than 20 characters, Windows 2000 recognizes only the first 20.

Invalid characters

The following characters are invalid: " / \ [ ] : ; | = , + * ? < >

User logon names are not case-sensitive

You can use a combination of special and alphanumeric characters to help uniquely identify user accounts. User logon names are not case-sensitive, but Windows 2000 preserves the case.

Accommodate employees with duplicate names

If two users were named John Doe, you could use the first name and the last initial, and then add letters from the last name to differentiate the duplicate names. In this example, one user account logon name could be Johnd and the other Johndo. Another possibility would be to number each user logon name—for example, Johnd1 and Johnd2.

Identify the type of employee

In some organizations, it is useful to identify temporary employees by their user account. To identify temporary employees, you can use a T and a dash in front of the user''s logon name—for example, T-Johnd. Alternatively, use parentheses in the name—for example, John Doe (Temp).

E-mail compatibility

Some e-mail systems may not accept characters, such as spaces and "()" brackets.

Password Requirements

To protect access to the domain or a computer, every user account should have a password. Consider the following guidelines for passwords:

Always assign a password for the Administrator account to prevent unauthorized access to the account.

Determine whether the Administrator or the users will control passwords. You can assign unique passwords for the user account and prevent users from changing them, or you can allow users to enter their own passwords the first time that they log on. In most cases, users should control their passwords.

Use passwords that are hard to guess. For example, avoid using passwords with an obvious association, such as a family member''s name.

Passwords can be up to 14 characters; a minimum length of eight characters is recommended.

Use characters from each of the following three groups: uppercase and lowercase letters, numerals, and nonalphanumeric characters.

Have at least one symbol character in the second through sixth positions.

Make them significantly different from prior passwords.

They must not contain the user''s name or user name.

They must not be a common word or name.

NOTE Windows 2000 group policies can also affect passwords. For further information on using group policy, see Chapter 12, "Administering Group Policy."

Account Options

You should assess the hours when a user can log on to the network and the computers from which a user can log on, and you should determine if temporary user accounts need to expire. To determine account options, consider the following information.

Logon Hours

Set logon hours for users who only require access at specific times. For example, allow night-shift workers to log on only during their working hours.

Computers from Which Users Can Log On

Determine the computers from which users can log on. By default, users can log on to the domain by using any computer in the domain. For security reasons, require users to log on to the domain only from their computer. This prevents users from gaining access to sensitive information that is stored on other computers.

CAUTIONIf you have disabled NetBIOS over TCP/IP, Windows 2000 is unable to determine which computer you are logging on from and therefore you cannot restrict users to specific computers.

Account Expiration

Determine whether a user account should expire. If so, set an expiration date on the user account to ensure that the account is disabled when the user would no longer have access to the network. As a good security practice, you should set user accounts for temporary employees to expire when their contracts end.

Practice: Planning New User Accounts

In this practice, you plan how to implement user accounts for employees on the new hire list.

Scenario

As the Windows 2000 administrator for your corporate network, you need to set up the user accounts for new employees. Ten employees have recently been hired. You need to determine the following:

A naming convention that will easily accommodate employees with duplicate or similar names and temporary contract personnel

The hours during which users can log on

The computers at which a user can log on

Criteria

Use the following criteria to make your decisions:

All employees require a user account.

Permanent employees should control their passwords.

For security reasons, an administrator should control passwords for temporary employees.

Day-shift hours are from 8 AM through 5 PM and night-shift hours are from 6 PM through 6 AM.

Permanent employees require access to the network 24 hours a day, seven days a week.

Temporary employees log on at only their assigned computers and only during their shifts. The computer names for computers that temporary employees use are Temp1 and Temp2.

New Hire List

Table 7.2 provides fictitious names and hiring information for the new employees.

Table 7.2 New Hire List for Practice

User Name Title Department Status Shift

Don Hall

Representative

Sales

Temporary

Day

Donna Hall

Manager

Product Support

Permanent

Night

James Smith

Vice President

Training

Permanent

Day

James Smith

Representative

Sales

Permanent

Day

Jon Morris

Developer

Product Development

Temporary

Night

Judy Lew

Developer

Product Development

Temporary

Day

Kim Yoshida

President

Training

Permanent

Day

Laurent Vernhes

Engineer

Product Support

Temporary

Night

Sandra Martinez

Engineer

Product Support

Permanent

Day

Planning Questions

Complete Table 7.3 to determine a naming convention for the users in the new hire list by considering the information that is provided in the sections "Scenario," "Criteria," and "New Hire List" in this practice.

Table 7.3 New Hire Naming Convention Plan for Practice

User Name Full Name User Logon Name

Don Hall

Donna Hall

James Smith

Jon Morris

Judy Lew

Kim Yoshida

Laurent Vernhes

Sandra Martinez

Complete Table 7.4 to determine logon hours and computer use for the users in the new hire list by considering the information that is provided in the sections "Scenario," "Criteria," and "New Hire List" in this practice.

Table 7.4 New Hire Scheduling Plan for Practice

User Name When Can the User Log On? Where Can the User Log On?

Don Hall

Donna Hall

James Smith

James Smith

Jon Morris

Judy Lew

Kim Yoshida

Laurent Vernhes

Sandra Martinez

Select the appropriate password setting for each user in Table 7.5 to determine who controls the user''s password.

Table 7.5 New Hire Password Settings Plan for Practice

User Name User Must Change Password the Next Time He or She Logs On User Cannot Change Password

Don Hall

Donna Hall

James Smith

James Smith

Jon Morris

Judy Lew

Kim Yoshida

Laurent Vernhes

Sandra Martinez

Lesson Summary

In this lesson you learned that in planning user accounts, you should determine naming conventions for user accounts, requirements for passwords, and account options such as logon hours, the computers from which users can log on, and account expiration. You learned that domain user accounts can be up to 20 characters in length and must be unique within the OU where you create the domain user account. The user''s logon name (DN) must be unique to the directory. The user''s full name (also referred to as display name or account name) (RDN) must be unique within the OU where you create the domain user account. Local user account names can also be up to 20 characters in length and must be unique on the computer where you create the local user account. Making these decisions before you start creating user accounts will reduce the amount of time it takes to create the needed user accounts and will simplify managing these accounts.

In the practice portion of this lesson, you were presented with a fictitious scenario and planned a naming convention that easily accommodated employees with duplicate or similar names and temporary contract personnel. You also had to plan the hours during which users could log on and the computers at which a user could log on, based on the scenario and criteria you were supplied.