Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

User account management, NTFS rights management, disk and file system

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/02 Report--

User account management, NTFS rights management, disk and file system

I. user account management

1. User account number

Different user identities have different permissions, each user contains a unique login name and corresponding password, and each user account has a unique security identifier (SID)

2. Management operation of user account

(1) create a user

Right-click this computer-- Administration-- Local users and groups-- users-- right-click in the space-- New users-- usernames, passwords-- check permissions-- create.

(2) reset the password for the user

Right-click this computer-- Administration-- Local users and groups-- users-- right-click this user-- Settings

Password-continue-enter password-OK

(3) rename the user

Right-click this computer-- Administration-- Local users and groups-- users-- right-click this user--

(4) enable and disable user accounts

Right-click on this computer-manage-local users and groups-user-right click on the user-Properties-General-account disabled

(5) Delete user account

Right-click this computer-manage-local users and groups-users-right-click the user-delete

Note: creating a user with the same name after deleting the user also does not have the permissions of the previous user because the SID security identifier is different.

II. Built-in user account

For special purposes, it is generally not necessary to change its permissions

1) Administrator (administrator user) default administrator user. This account cannot be deleted. Rename it for security reasons.

2) Guest (Guest user) is disabled by default and is available for temporary use by users who do not have an account. It has only limited permissions. Cannot delete.

III. Manage group accounts

1. Group accounts are used to grant the same permissions to a group of users.

When permissions are granted to a group, all member users automatically get the corresponding permissions

The user joins a group and automatically gets permission for this group.

2. Group account management

A series of actions such as creating a group, adding a member to a group (you can double-click a group to add a member or right-click a user-attribute-belong to), renaming a group, deleting a group, and so on are similar to managing users.

3. The role of common built-in groups:

(1) Administrators: users in this group have system administrator privileges.

(2) Backup Operators: with backup and restore permissions

(3) Guests: if you log out a member in this group, its user profile will be deleted, and the default guest belongs to this group.

(4) Network Configuration Operators: configuration with the function of managing the network

(5) Power Users: the old version of the windows system already exists, and the simplified group is about to be eliminated.

(6) Remote Desktop Users: remote Desktop login

(7) Users: default group for new users

(8) Print Operators: has permission to manage printers

4. Special local built-in groups

Everyone: any user belongs to this group

Authenticated Users: any user who uses a valid user to log on to this computer belongs to this group

Interactive: any user who logs in locally (press the ctrl+alt+ del key) belongs to this group

Network: anyone who logs in to this computer through the network belongs to this group.

Note: local groups cannot contain local groups, but can contain some built-in groups.

IV. ALP rules

Add local users to local groups, and finally only assign permissions to local groups (meaning of the ALP rule)

V. Overview of the file system

1. File system: that is, the method of organizing files on external storage devices

2. Commonly used file systems FAT, NTFS (new technology file system), EXT

3. The characteristics of NTFS new technology file system.

① can set access permissions for different users and groups

② users must have the appropriate access rights to access resources

③ can prevent resources from being illegally tampered with and deleted.

4. Advantages of NTFS file system

1) improve disk read and write performance 2) Reliability: encryption, access control list

3) disk utilization: compression, disk quota 4) AD needs the support of NTFS

VI. Common NTFS permissions

1. NTFS permissions of the folder

① full control: all operations can be performed

② modification: can be modified or deleted

③ read and execute: readable and executable

④ lists folder contents

⑤ read: readable content

⑥ writes: you can create folders or files

⑦ special permissions: adjust the permissions of the Security setting

2. NTFS permission of the file

Note: the contents of the folder are listed less than the permissions of the folder.

3. Special permissions

Read permissions, change permissions, take ownership

7. Configure NTFS permissions for documents

Right-click the specified directory or file-- Properties-- Security-- Edit-- add-- specify users or groups

-- set permissions after confirmation

VIII. NTFS permission rules

1. Accumulation of permissions:

The effective permissions of the user to the document = the permissions of the user + the permissions of the groups to which the user belongs

Accumulation of valid NTFS permissions of users on the basis of non-conflict of permissions

2. Refusal first (rejection is above all else)

3. Inherit permissions

New files and subdirectories automatically inherit the permissions of the parent directory

4. Subfolders can cancel the permissions of the parent folder.

Right-click Properties on the subfolder-Security-Advanced-permissions-change permissions-disable inheritance

5. Compulsory inheritance

Right-click Properties on the subfolder-Security-Advanced-permissions-change permissions-enable inheritance)

6. Acquire ownership

Right-click the file-Properties-Security-continue-owner

Words

Administrator Administrator Guest Guest user

Backup backup files, accompaniment, backup

Operators operators, operators (of machines, equipment)

Network Network Configuration configuration

Power Rights Users users

Remote remote Desktop Desktop

Print print Everyone everyone

Authenticated Certification Interactive interaction

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report