It is a collection or list of user accounts or computer accounts. Different from a container, a ______ does not store user or computer information; rather, it just lists it.
The advantage of using _____ is that they simplify administration, especially when assigning rights and permissions.
Group
A _________ is used to assign rights and permissions and gain access to network resources. It can also be used as a distribution group.
Security Group
A _____________ is used only for nonsecurity functions, such as distributing email, and it cannot be used to assign rights and permissions.
Distribution Group
A __________ contains global groups and universal groups, even though it can also contain user accounts and other domain local groups.
It is usually in the domain with the resource to which you want to assign permissions or rights.
Domain Local Group
______ can contain user accounts and other groups.
_______ are designed to be “global” for the domain. After you place user accounts into ______, these are typically placed into domain local groups or local groups.
Global Groups
This group scope is designed to contain global groups from multiple domains. These can contain global groups, other universal groups, and user accounts. Global catalogs replicate __________ membership, you should limit the membership to global groups. This way, if you change a member within a global group, the global catalog will not have to replicate the change.
Universal Group
Similar to the administrator and guest accounts, Windows has default groups called _________.
Built-in Groups
Built-in Groups (6)
Domain Admins
Domain Users
Account Operators
Backup Operators
Authenticated Users
Everyone
Members of this group can perform administrative tasks on any computer within the domain. The default, the Administrator account, is a member.
Windows automatically adds each new domain user account to the Domain Users group.
Members of this group can create, delete, and modify user accounts and groups.
Members of this group can backup and restore all domain controllers by using Windows Backup.
This group includes all users with a valid user account on the computer or in Active Directory. Use the _______ group instead of the Everyone group to prevent anonymous access to a resource.
This group includes all users who access a computer, even if a particular user does not have a valid account.
It is one of the most powerful features of Active Directory that controls the working environment for user accounts and computer accounts.
Group Policy
It provides centralized management and configuration of operating systems, applications, and user settings in an Active Directory environment.
Group Policy Objects (GPOs) (5)
System Settings
Security Settings
Software Installation Settings
Scripts Settings
Folder Redirection Settings
Application settings, desktop appearance, and behavior of system services.
Local computer, domain, and network security settings.
Management of software installation, updates, and removal.
Scripts for when a computer starts or shuts down and for when a user logs on and off.
Storage for users’ folders on the network.
It is the standard file system used by modern Windows operating systems.
It is designed to provide security, reliability, and efficient data management.
NTFS (New Technology File System)
NTFS - Security Control
File and Folder Permissions
NTFS - to protect sensitive data
Encryption
NTFS - to save disk space
Compression
NTFS - to limit storage usage
Disk Quotas
NTFS - to prevent data corruption
Journaling
It allows administrators to control who can access files and what they can do with them, which is critical in multi-user environments like schools, offices, and servers.
NTFS
It control access to files and folders on Windows systems, providing granular security (Read, Write, Modify, Full Control) for both local and network users.
NTFS Permissions
Permissions are often inherited from parent folders.
This simplifies management because:
You don’t need to set permissions repeatedly
Changes at the top level affect all subfolders
Inheritance
The final permissions a user actually has, after combining:
Group permissions
Individual permissions
Inherited permissions
Effective Permissions
_______ are hidden system shares automatically created by Windows for management purposes.
Administrative Shares
Zuletzt geändertvor 6 Tagen