Local users can access only resources on the local

This preview shows page 3 - 5 out of 15 pages.

We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Systems Architecture
The document you are viewing contains questions related to this textbook.
Chapter 14 / Exercise 3
Systems Architecture
Burd
Expert Verified
Learning ObjectivesUpon completion of this lesson, students will be able to do the following:Create, configure, and delete users and computersManage inactive and disabled accountsAutomate unlocking of disabled accounts using Windows PowerShellConfigure templatesCopy users and computersPerform bulk Active Directory operationsAutomate the creation of Active Directory accountsCreate users and computersImplement offline domain join
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Systems Architecture
The document you are viewing contains questions related to this textbook.
Chapter 14 / Exercise 3
Systems Architecture
Burd
Expert Verified
Configure user rightsLecture NotesThe purpose of this lesson is to provide students with an understanding of how to createand manage Active Directory users and computers.Creating and Managing User ObjectsFirst, explain that a user account is used by Windows to determine what changes you can make on the computer, to determine which files and folders you have access to, and to track personal preferences, such as your choice of desktop wallpaper, color schemes, drive mappings, and/or screen savers. There are standard accounts used to perform daily tasks on the computer that are limited in what they can do as well as administrative accounts that provide full control over the computer.Authentication is the process of confirming a user’s identity by using a known value, such as a password, a smart card, or a fingerprint. After a user supplies a name and password, the authentication process validates the credentials supplied in the logon against information that is stored within the AD DS database. Do not confuse authentication with authorization, which is the process of confirming that an authenticated user has the correct permissions to access one or more network resources.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture