Chapter 7: WORKING WITH GROUPS

Slides:



Advertisements
Similar presentations
Managing User, Computer and Group Accounts
Advertisements

Windows Server 2003 使用者群組管理 林寶森
MOAC : Installing and Configuring Windows Server 2012
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
11 WORKING WITH GROUPS Chapter 7. Chapter 7: WORKING WITH GROUPS2 CHAPTER OVERVIEW  Understand the functions of groups and how to use them.  Understand.
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
10.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Administering Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW  Create and manage file system shares and work.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
By Rashid Khan Lesson 8-Crowd Control: Controlling Access to Resources Using Groups.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Group Accounts; Securing Resources with Permissions
11 WORKING WITH COMPUTER ACCOUNTS Chapter 8. Chapter 8: WORKING WITH COMPUTER ACCOUNTS2 CHAPTER OVERVIEW  Describe the process of adding a computer to.
Understanding Active Directory
11 WORKING WITH COMPUTER ACCOUNTS Chapter 8. Chapter 8: WORKING WITH COMPUTER ACCOUNTS2 CHAPTER OVERVIEW Describe the process of adding a computer to.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Chapter 7 WORKING WITH GROUPS.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW Create and manage file system shares and work with.
Guide to MCSE , Enhanced 1 Activity 4-1: Creating and Adding Members to Global Groups Objective: Use Active Directory Users and Computers to create.
11 REVIEWING MICROSOFT ACTIVE DIRECTORY CONCEPTS Chapter 1.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
CN1276 Server (V3) Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Managing Active Directory Domain Services Objects
Designing Group Security Designing security groups Designing user rights.
IOS110 Introduction to Operating Systems using Windows Session 8 1.
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
Module 3: Configuring Active Directory Objects and Trusts.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Module 7 Active Directory and Account Management.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Chapter 9: SHARING FILE SYSTEM RESOURCES1 CHAPTER OVERVIEW  Create and manage file system shares and work with share permissions.  Use NTFS file system.
Chapter 10: Rights, User, and Group Administration.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
Module 3 Creating Groups and Organizational Units.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Administering Groups Chapter Eight. Exam Objectives In this Chapter:  Plan a security group hierarchy based upon delegation requirements  Plan a security.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
MIS Chapter 41 Chapter 4 – Implementing and Managing Group and Computer Accounts MIS 431 – Created Spring 2006.
1 Chapter Overview Using Group Objects Understanding Default Groups Creating Group Objects Managing Administrative Access.
Module 3: Managing Groups. Overview Creating Groups Managing Group Membership Strategies for Using Groups Using Default Groups.
6/19/2016 أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 4.
ACTIVE DIRECTORY ADMINISTRATION
ACTIVE DIRECTORY ADMINISTRATION
Active Directory Administration
Windows Server 2008 Administration
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
Windows Server 2003 使用者群組管理
Implementing and Managing Group and Computer Accounts
Chapter 9: Managing Groups, Folders, Files, and Object Security
Unit 6 NT1330 Client-Server Networking II Date: 7/19/2016
Presentation transcript:

Chapter 7: WORKING WITH GROUPS Course 290: Chapter 7: WORKING WITH GROUPS

Assigning Permissions in Server 2003 For users to be able to access resources on an Active Directory network, they must have the appropriate permissions. Shared folders and drives, printers, and virtually all other resources on a network have an access control list (ACL). An ACL is a list of objects that are permitted to access the resource, along with the degree of access that each object is permitted. The objects in an ACL are referred to as security principals

Using Groups for permissions A group is simply a list of users that functions as a security principal. In Active Directory, group objects can contain user objects, computers, contacts, and, under certain conditions, even other groups. When you use a group object as a security principal by adding it to an ACL, all of the group’s members receive the permissions that you assigned to the group

UNDERSTANDING GROUPS

User Rights Groups also make it possible to assign user rights to multiple users at once. In Windows Server 2003, rights are distinctly different from permissions. A user right grants a user or group the ability to perform a particular system task, such as access the computer from the network, change the system time, or take ownership of files and other objects.

Groups vs. Group Policies The structure of the Active Directory hierarchy is a critical part of the domain user account creation process because rights and permissions granted to a container object are inherited by the objects they contain, including user objects Group inheritance works the same: the members receive the settings assigned to the group. The main difference between a group and a container is that the group is not restricted by the structure of the Active Directory tree. You can create groups with members anywhere in the domain, and even in other domains, and grant them all privileges in one quick step.

GROUP POLICIES Group policies and groups are not related. Group policies cannot be directly applied to a group. A Group policy can only be applied to an Active Directory site, domain, or OU

DOMAIN FUNCTIONAL LEVELS The Domain Functional Level determines the level of functionality used by Active Directory The different versions of Windows have slightly different capabilities built into their Active Directory implementations. Each successive version has some new features that are not usable when some of the domain controllers in a domain are running older versions of Windows Changing the domain functional level informs the operating system that all of the domain controllers are compatible and that it is safe to activate the version-specific features The Functional level can be raised but not lowered

DOMAIN FUNCTIONAL LEVELS Windows 2000 mixed default functional level of a domain controller Supports universal distribution groups but not universal security groups Global groups cannot have other groups as members (group nesting). Windows 2000 native Supports Server 2000 and 2003 Supports universal security and distribution groups. Allows groups to be members of other groups. Allows conversions between security groups and distribution groups. Windows Server 2003 interim Used only when upgrading domain controllers in Windows NT 4 domains to Windows Server 2003 domain controllers. Windows Server 2003 Same as Server 2000 native, but only supports Server 2003

Managing the Functional Domain Level Use the Active Directory Domains And Trusts console You cannot lower the functional level after you raise it, except by reinstalling Active Directory on all of your domain controllers Once the functional level is raised on that one domain controller, the change is replicated to all of the other domain controllers in the domain.

Local vs. Domain groups Windows Server 2003 supports local groups and domain groups. A local group is a collection of local user accounts on a particular computer. Local groups perform the same basic function as all groups: they enable you to assign permissions to multiple users in one step. Local groups are created using the Local Users And Groups snap-in, which is integrated into the Computer Management console When you create a local group, the system stores it in the local Security Accounts Manager (SAM) database

Restrictions on LOCAL GROUPS You can use local groups only on the computer where you create them. Only local users from the same computer can be members of local groups. When the computer is a member of a domain, local group members can include users and global groups from the domain or any trusted domain. Local groups cannot have other local groups as members. Local group permissions provide access only to resources on the computer where you created the local group. You cannot create local groups on a Windows Server 2003 computer that is functioning as a domain controller.

ACTIVE DIRECTORY GROUPS Active Directory groups are characterized by their type and their scope Types Security Distribution Scopes Local Global Universal

ACTIVE DIRECTORY GROUP TYPES Security Groups: used to assign access permissions for network resources Membership depends on the type of security group and the domain functional level. Can also be used as a distribution group. The most common type of group created and used in Active Directory. Distribution Groups: Used to group users together for use by applications in non-security-related functions You use distribution groups when the only function of the group is not security-related, such as sending e-mail messages to a group of users at the same time. Can be used only by directory-aware applications Can be converted to a security group

ACTIVE DIRECTORY GROUP SCOPES Group scopes define how permissions are assigned to the group members The 3 Scope Levels are: Domain local Global Universal

DOMAIN LOCAL GROUPS Domain local groups are most often used to assign access permissions to network resources, like printers or shared folders, in a single domain Available in all domain functional levels Can only be used to assign permissions to resources in the domain where they are created Permitted membership depends on domain functional level In Windows 2000 mixed or Windows 2003 interim functional level, members can include user and computer accounts and global groups from any domain in the forest. In Windows 2000 native or Windows Server 2003 functional level, members can include user and computer accounts, global and universal groups from any domain in the forest, and other domain local groups from the same domain

GLOBAL GROUPS Used to collect users or computers in the same domain that share the same job, role, or function Global Groups are given access to network resources by making the group a member of a Domain Local group Most commonly used to manage permissions for directory objects, such as user and computer accounts, that require frequent maintenance. More efficient than using Universal groups because they are not replicated outside of their domain. This minimizes the amount of replication traffic to the global catalog, Available in all functional levels Can include only members from within their domain Actual membership depends on domain functional level Can be granted access permissions to resources in any domain in the forest, and in domains in other trusted forests

UNIVERSAL GROUPS Used primarily to grant access to related resources in multiple domains. Generally used to consolidate groups that span multiple domains To use universal groups effectively, the best practice is to create a global group in each domain, with user or computer accounts as members, and then make the global groups members of a universal group Available only in the Windows 2000 native and Windows Server 2003 domain functional levels Can be granted access permissions for resources in any domain in the forest, and in domains in other trusted forests Can be converted to domain local groups or to global groups, as long as they do not have other universal groups as members

NESTING GROUPS Nesting Groups is the ability to make groups members of other groups a single level of nesting is sufficient for most networks M e m b r s A l o w d i n W 2 x S v 3 I t F u c a L N Domain Local User and computer accounts and global groups from any domain User and computer accounts, unive sal groups, and global groups from any domain; other domain local groups from the same domain Global from the same domain User and computer accounts and other global groups from the same domain Universal Not available User and computer accounts, other universal groups, and global groups from any domain G p

CONVERTING GROUPS In a domain using the Windows 2000 native or Windows Server 2003 functional level, you can convert groups to different scopes at any time T o D m a i n L c l G b U v e r s F Not applicable Not permitted Permitted only when the d main local group does not have other domain local groups as members global group is not a member of a other global group No restrictions Permitted only when the universal group does not have other universal groups as members

PLANNING GLOBAL AND DOMAIN LOCAL GROUPS Step 1—Create domain local groups for resources to be shared. Step 2—Assign resource permissions to the domain local group. Step 3—Create global groups for users with common job responsibilities. Step 4—Add global groups that need access to resources to the appropriate domain local group.

WINDOWS SERVER 2003 DEFAULT GROUPS Built-in local groups Predefined Active Directory groups Built-in Active Directory groups Special identities

BUILT-IN LOCAL GROUPS Built-in local groups give users the rights to perform system tasks on a single computer backing up and restoring files, changing the system time, and administering system resources Some of these groups have default privileges granted to them through the assignment of user rights to the group Administrators, Backup Operators, Users, Power User, Remote Desktop Users Only on Windows Server 2003 standalone servers and member servers. Domain controllers do not have local groups (or local users) because their SAM is converted for Active Directory use. Located in the Groups folder in the Local Users And Groups snap-in.

BUILT-IN LOCAL GROUPS

PREDEFINED ACTIVE DIRECTORY GROUPS Predefined groups: security groups, most with a global scope, that are intended to group together common types of domain user accounts. By default, Windows Server 2003 automatically adds members to some predefined global groups. You can add user objects to these predefined groups to provide additional users with the privileges and permissions assigned to the group Created in the domain’s Users container Domain Admins, Domain Controllers, Domain Computers, Domain users By default, they do not have any inherent rights or permissions You can assign rights or permissions to them by adding the predefined global groups to domain local groups or by explicitly assigning rights or permissions to the predefined global groups. By default some of the predefined Active Directory groups have privileges granted to them through the assignment of user rights. Domain Admins and Enterprise Admins ONLY

PREDEFINED ACTIVE DIRECTORY GROUPS

BUILT-IN ACTIVE DIRECTORY GROUPS Every Active Directory domain has a Built-in container in which the system creates a series of security groups, all of which have a domain local scope. The Built-In groups provide users with user rights and permissions to perform tasks on domain controllers and in the Active Directory tree. Built-in domain local groups provide predefined rights and permissions to user accounts when you add user objects or global groups as members. Account Operators, Administrators, Users, Guests

BUILT-IN ACTIVE DIRECTORY GROUPS

SPECIAL IDENTITIES Special identities exist on all computers running Windows Server 2003. These are not really groups because you cannot create them, delete them, or directly modify their memberships. They are like placeholders for one or more users Special identities do not appear in the Local Users And Groups snap-in or the Active Directory Users and Computers console You can use them like groups, by adding them to the ACLs of system and network resources Examples: Everyone, Authenticated Users, Creator Owner

SPECIAL IDENTITIES

CREATING LOCAL GROUPS

WORKING WITH ACTIVE DIRECTORY GROUPS Active Directory Users and Computers console: Create security groups Manage group membership Nest groups Change group types and scopes Delete a group

CREATING SECURITY GROUPS The Active Directory Users and Groups console lets you create group objects anywhere you want Groups should always be created in an OU so that you can assign user rights to them

NESTING GROUPS Both groups must be created separately, and then one is made a member of the other. Possible nestings depend on the domain functional level and scope type. Observe rules on group nesting.

CHANGING GROUP TYPES AND SCOPES

DELETING A GROUP Deletes only the group object, not the members of the group. Deletes the SID for the group. The SID cannot be re-created. Removes ACL entries for the group – all permissions for that group are deleted and are NOT restore even if you make a new group with the same name

AUTOMATING GROUP MANAGEMENT The following command-line utilities can be used in scripts and batch files to automate group management: Dsadd.exe: Used to create new group objects Dsmod.exe: Used to configure existing group objects Dsget.exe: Used to locate groups in Active Directory

CREATING GROUP OBJECTS WITH DSADD.EXE Allows groups to be created from a command line Useful when scripting group creation for large numbers of groups Can be used only to create new groups, not modify existing groups Syntax: dsadd group GroupDN [parameters] Ex: Create a new group called Sales in the Users container and make the Administrator user a member dsadd group "CN=Sales,CN=Users,DC=contoso,DC=com" –member "CN=Administrator,CN=Users,DC=contoso,DC=com"

MANAGING GROUP OBJECTS WITH DSMOD.EXE Can be used to configure group objects, including: Setting the group scope Adding and removing individual group members Replacing the entire group membership Syntax: dsmod group GroupDN [parameters] Example: Add the Administrator user to the Guests group dsmod group "CN=Guests,CN=Builtin,DC=contoso,DC=com" –addmbr "CN=Administrator,CN=Users,DC=contoso,DC=com"

FINDING OBJECTS WITH DSGET.EXE Command-line utility Used to locate and show information on an object Cannot be used to create, modify, or delete an object Syntax: dsget objectclass ObjectDN [parameters] Example: Display a list of the groups of which a user is a member dsget user "CN=Administrator,CN=Users,DC=contoso,DC=com" -memberof