The document outlines the process of creating user folders and accounts in a networked computer environment, emphasizing the importance of unique user account objects for identifying users and managing their access rights. It details features of user accounts such as password security, permissions, and auditing, as well as the steps to configure user access through Active Directory. The creation of user accounts is described as a straightforward task that involves entering user details and setting initial passwords.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
7 views16 pages
Creating
The document outlines the process of creating user folders and accounts in a networked computer environment, emphasizing the importance of unique user account objects for identifying users and managing their access rights. It details features of user accounts such as password security, permissions, and auditing, as well as the steps to configure user access through Active Directory. The creation of user accounts is described as a straightforward task that involves entering user details and setting initial passwords.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16
CREATING
USER FOLDER CREATING USER FOLDER
•Computers are not used by an
individual for personal use. Computers are usually accessed by more than one person. System administrators are able to log on locally if these accounts are in the domain. CREATING USER FOLDER
• A computer is able to identify between one person to another through a security device called the user account object CREATING USER FOLDER
• Each user in the network has a unique
user account which contains the contact details of the users as well as what his/her rights and restrictions in accessing resources/folders, etc. FEATURES OF A USER ACCOUNT • Password Security - Each user account is protected by a password to provide authorization and access to the system. • Permissions - These are access privileges granted to a user account (e.g. group memberships, user specific settings to access resources, etc.) • Identification - Having a user account means easily identifying the person to the computer system and network. • User Rights - Having user rights is a high-level privilege given to users or groups to define their action on a computer system. FEATURES OF A USER ACCOUNT • Roaming - The administrator may define user accounts in a way that a user is able to log on to any system which is a member of a domain using a domain user account, a Remote Access Service (RAS), or gateway. • Environment Layout - Profiles are user-specific and able to store information about the layout, desktop, and user environment in general. They are specifically restricted through the use of mandatory profiles. • Auditing - The server can track access and use by domain user accounts. CONFIGURI NG USER ACCESS CONFIGURING USER ACCESS
• One of the first things to do in a new network is to
create Users, also called User Objects. As long as you know the information about the user you need to create, the process will take no time at all. CONFIGURING USER ACESS • To do from a Domain Controller, and you should have the Administrative Tools in your Start menu next to the Control Panel link. We’ll choose the Active Directory Users and Computers snap- in. CONFIGURING USER ACCESS • Once we’re inside the Active Directory Users and Computers snap-in, we’ll need to expand the domain in which we want to create the user, and right-click on the Users folder. We’ll then select New|User. CINFUGURING USER ACCESS • Once we’re inside the Active Directory Users and Computers snap-in, we’ll need to expand the domain in which we want to create the user, and right-click on the Users folder. We’ll then select New|User. CINFUGURING USER ACCESS • The New Object – User box will pop up and require you to put in the user’s name and create the user logon. You’ll need to use a standard method of creating user logon names, as this will cause much less confusion in the future. If you have a small network, you may want to just stick to using the first initial and last name because it’s shorter. If you anticipate that your network will grow quite large, the standard advice is to use the full first and last name separated by a period, as we’ve done below. CINFUGURING USER ACCESS • Next we’ll give the user an initial password, and make sure to have them change it as soon as they first logon. CINFUGURING USER ACCESS • When we’re finished, we’ll get a nice summary of work. CINFUGURING USER ACCESS • When we go back to the Users folder in the domain, we can see our newly created user. CINFUGURING USER ACCESS
• Once we’ve created a user, there are many things that
we’ll need to do with them in order for them to be useful, like adding permissions and security groups, but at least the operation for spawning them is simple and