In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-11 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/03 Report--
I. user account management
1. User account
Different user identities have different permissions
Each user contains a name and a password
The user account has a unique security identifier (SID)
2. User management
Create users, reset passwords for users, rename users, enable, disable user accounts
Delete a user account (create a user with the same name after deleting the user and then do not have the permissions of the previous user because the SID security identifier is different)
II. Built-in user account
For special purposes, it is generally not necessary to change its permissions
1) Administrator (administrator user) default administrator user. This account cannot be deleted. Rename it for security reasons.
2) Guest (Guest user) is disabled by default and is available for temporary use by users who do not have an account. It has only limited permissions. Cannot delete.
III. Manage group accounts
1. Group account
A group is a collection of users
Users in the group automatically have the permissions set for the group
2. Group account management
Create a new group, add a member to the group (you can double-click the group to add a member or right-click the user-attribute-belong to), rename the group, delete the group
3. The role of common built-in groups:
1) Administrators: users in this group have system administrator privileges.
2) Backup Operators: with backup and restore permissions
3) Guests: if you log out a member in this group, its user profile will be deleted, and the default guest belongs to this group.
4) Network Configuration Operators: configuration with the function of managing the network, such as changing IP address
5) Power Users: the old version of the windows system already exists, and the simplified group is about to be eliminated.
6) Remote Desktop Users: users in this group can log in from remote computers using remote Desktop Services
7) Users: default group for new users
8) Print Operators: has permission to manage printers
4. Special local built-in groups
Everyone: any user belongs to this group
Authenticated Users: any user who uses a valid user to log on to this computer belongs to this group
Interactive: any user who logs in locally (press the ctrl+alt+ del key) belongs to this group
Network: anyone who logs in to this computer through the network belongs to this group.
Note: local groups cannot contain local groups, but can contain some built-in groups.
IV. ALP rules
Add local users to local groups, and finally only assign permissions to local groups (meaning of the ALP rule)
V. Overview of the file system
1. File system: that is, the method of organizing files on external storage devices
2. Commonly used file systems
FAT,NTFS,EXT
3. Advantages of NTFS file system
1) improve disk read and write performance
2) Reliability: encryption, access control list
3) disk utilization: compression, disk quota
4) AD needs the support of NTFS
VI. Common NTFS permissions
1. NTFS permissions of the folder
Read, write, list folder directories, read and execute, modify, full control,
Special permissions: it has nothing to do with the data of files and folders, but is related to reading and changing the Security tab.
2. NTFS permission of the file
Note: the folder directory is listed less than the permission of the folder
3. Special permissions
Read permissions, change permissions, take ownership
VII. NTFS permission rules
1. Accumulation of permissions:
Accumulation of valid NTFS permissions of users on the basis of non-conflict of permissions
2. Refusal first (rejection is above all else)
3. Inherit permissions
The default subfolder or subfile inherits the permissions of the parent folder. Subfolders can cancel the permissions of the parent folder (right-click Properties on the subfolder-Security-Advanced-permissions-change permissions-disable inheritance)-OK-Click Edit to modify the permissions of the inherited user.
Compulsory inheritance
4. Acquire ownership
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.