In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
User account management, NTFS rights management, disk and file system
I. user account management
1. User account number
Different user identities have different permissions, each user contains a unique login name and corresponding password, and each user account has a unique security identifier (SID)
2. Management operation of user account
(1) create a user
Right-click this computer-- Administration-- Local users and groups-- users-- right-click in the space-- New users-- usernames, passwords-- check permissions-- create.
(2) reset the password for the user
Right-click this computer-- Administration-- Local users and groups-- users-- right-click this user-- Settings
Password-continue-enter password-OK
(3) rename the user
Right-click this computer-- Administration-- Local users and groups-- users-- right-click this user--
(4) enable and disable user accounts
Right-click on this computer-manage-local users and groups-user-right click on the user-Properties-General-account disabled
(5) Delete user account
Right-click this computer-manage-local users and groups-users-right-click the user-delete
Note: creating a user with the same name after deleting the user also does not have the permissions of the previous user because the SID security identifier is different.
II. Built-in user account
For special purposes, it is generally not necessary to change its permissions
1) Administrator (administrator user) default administrator user. This account cannot be deleted. Rename it for security reasons.
2) Guest (Guest user) is disabled by default and is available for temporary use by users who do not have an account. It has only limited permissions. Cannot delete.
III. Manage group accounts
1. Group accounts are used to grant the same permissions to a group of users.
When permissions are granted to a group, all member users automatically get the corresponding permissions
The user joins a group and automatically gets permission for this group.
2. Group account management
A series of actions such as creating a group, adding a member to a group (you can double-click a group to add a member or right-click a user-attribute-belong to), renaming a group, deleting a group, and so on are similar to managing users.
3. The role of common built-in groups:
(1) Administrators: users in this group have system administrator privileges.
(2) Backup Operators: with backup and restore permissions
(3) Guests: if you log out a member in this group, its user profile will be deleted, and the default guest belongs to this group.
(4) Network Configuration Operators: configuration with the function of managing the network
(5) Power Users: the old version of the windows system already exists, and the simplified group is about to be eliminated.
(6) Remote Desktop Users: remote Desktop login
(7) Users: default group for new users
(8) Print Operators: has permission to manage printers
4. Special local built-in groups
Everyone: any user belongs to this group
Authenticated Users: any user who uses a valid user to log on to this computer belongs to this group
Interactive: any user who logs in locally (press the ctrl+alt+ del key) belongs to this group
Network: anyone who logs in to this computer through the network belongs to this group.
Note: local groups cannot contain local groups, but can contain some built-in groups.
IV. ALP rules
Add local users to local groups, and finally only assign permissions to local groups (meaning of the ALP rule)
V. Overview of the file system
1. File system: that is, the method of organizing files on external storage devices
2. Commonly used file systems FAT, NTFS (new technology file system), EXT
3. The characteristics of NTFS new technology file system.
① can set access permissions for different users and groups
② users must have the appropriate access rights to access resources
③ can prevent resources from being illegally tampered with and deleted.
4. Advantages of NTFS file system
1) improve disk read and write performance 2) Reliability: encryption, access control list
3) disk utilization: compression, disk quota 4) AD needs the support of NTFS
VI. Common NTFS permissions
1. NTFS permissions of the folder
① full control: all operations can be performed
② modification: can be modified or deleted
③ read and execute: readable and executable
④ lists folder contents
⑤ read: readable content
⑥ writes: you can create folders or files
⑦ special permissions: adjust the permissions of the Security setting
2. NTFS permission of the file
Note: the contents of the folder are listed less than the permissions of the folder.
3. Special permissions
Read permissions, change permissions, take ownership
7. Configure NTFS permissions for documents
Right-click the specified directory or file-- Properties-- Security-- Edit-- add-- specify users or groups
-- set permissions after confirmation
VIII. NTFS permission rules
1. Accumulation of permissions:
The effective permissions of the user to the document = the permissions of the user + the permissions of the groups to which the user belongs
Accumulation of valid NTFS permissions of users on the basis of non-conflict of permissions
2. Refusal first (rejection is above all else)
3. Inherit permissions
New files and subdirectories automatically inherit the permissions of the parent directory
4. Subfolders can cancel the permissions of the parent folder.
Right-click Properties on the subfolder-Security-Advanced-permissions-change permissions-disable inheritance
5. Compulsory inheritance
Right-click Properties on the subfolder-Security-Advanced-permissions-change permissions-enable inheritance)
6. Acquire ownership
Right-click the file-Properties-Security-continue-owner
Words
Administrator Administrator Guest Guest user
Backup backup files, accompaniment, backup
Operators operators, operators (of machines, equipment)
Network Network Configuration configuration
Power Rights Users users
Remote remote Desktop Desktop
Print print Everyone everyone
Authenticated Certification Interactive interaction
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.