IT tutorials
 
Technology
 

Active Directory 2008 : Administering Groups in an Enterprise (part 3) - Understanding Shadow Groups, Default Groups

8/13/2013 9:56:27 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

4. Understanding Shadow Groups

Most management of an enterprise is implemented with groups. Groups are assigned permission to resources. Groups can be used to filter the scope of Group Policy objects. Groups are assigned fine-grained password policies. Groups can be used as collections for configuration management tools such as Microsoft System Center Configuration Manager. The list goes on. OUs, however, are not used as frequently to manage the enterprise, and in some cases, they cannot be used. For instance, OUs cannot be assigned permissions to resources, nor can they be assigned fine-grained password policies . Instead, the primary purpose of an OU is to provide a scope of management for the delegation of administrative permissions for the objects in that OU. In other words, an OU of users enables you to delegate to your help desk the ability to reset passwords for all users in the OU. OUs are administrative containers.

The reason for this separation of purpose between OUs and groups is that OUs do not provide the same flexibility as groups. A user or computer (or other object) can exist only within the context of a single OU, whereas a security principal can belong to many groups. Therefore, groups are used for aligning identities with the capabilities required by those identities.

Sometimes, you might want to manage using an OU when it is not possible. For example, you might want to give all users in an OU access to a folder. Or you might want to assign a unique password policy to users in an OU. You cannot do so directly, but you can achieve your goal by creating what is called a shadow group. A shadow group is a group that contains the same users as an OU. More accurately, a shadow group contains users that meet a certain criterion.

The easiest way to create a shadow group is to create the group, and then, in the OU containing the users, press Ctrl+A to select all users. Right-click any selected user and choose Add To Group. Type the name of the group and click OK.

Tip

Unfortunately, Windows does not yet provide a way to maintain the membership of a shadow group dynamically. When you add or remove a user in an OU, you must also add or remove the user in the shadow group.

5. Default Groups

Several groups are created automatically on a server running Windows Server 2008 R2. These are called default local groups, and they include well-known groups such as Administrators, Backup Operators, and Remote Desktop Users. Additional groups are created in a domain, in both the Builtin and Users containers, including Domain Admins, Enterprise Admins, and Schema Admins. The following list provides a summary of capabilities of the subset of default groups that have significant permissions and user rights related to the management of Active Directory:

  • Enterprise Admins (Users container of the forest root domain) This group is a member of the Administrators group in every domain in the forest, giving it complete access to the configuration of all domain controllers. It also owns the Configuration partition of the directory and has full control of the domain naming context in all forest domains.

  • Schema Admins (Users container of the forest root domain) This group owns and has full control of the Active Directory schema.

  • Administrators (Builtin container of each domain) This group has complete control over all domain controllers and data in the domain naming context. It can change the membership of all other administrative groups in the domain, and the Administrators group in the forest root domain can change the membership of Enterprise Admins, Schema Admins, and Domain Admins. The Administrators group in the forest root domain is arguably the most powerful service administration group in the forest.

  • Domain Admins (Users container of each domain) This group is added to the Administrators group of its domain. Therefore, it inherits all the capabilities of the Administrators group. It is also, by default, added to the local Administrators group of each domain member computer, giving Domain Admins ownership of all domain computers.

  • Server Operators (Builtin container of each domain) This group can perform maintenance tasks on domain controllers. It has the right to log on locally, start and stop services, perform backup and restore operations, format disks, create or delete shares, and shut down domain controllers. By default, this group has no members.

  • Account Operators (Builtin container of each domain) This group can create, modify, and delete accounts for users, groups, and computers located in any organizational unit in the domain (except the Domain Controllers OU), as well as in the Users and Computers containers. Account Operators cannot modify accounts that are members of the Administrators or Domain Admins groups, nor can they modify those groups. Account Operators can also log on locally to domain controllers. By default, this group has no members.

  • Backup Operators (Builtin container of each domain) This group can perform backup and restore operations on domain controllers as well as log on locally and shut down domain controllers. By default, this group has no members.

  • Print Operators (Builtin container of each domain) This group can maintain print queues on domain controllers. It can also log on locally and shut down domain controllers.

The default groups that provide administrative privileges should be managed carefully because they typically have broader privileges than are necessary for most delegated environments and because they often apply protection to their members.

The Account Operators group is a perfect example. If you examine its capabilities in the preceding list, you see that its rights are very broad, indeed. It can even log on locally to a domain controller. In very small enterprises, such rights are probably appropriate for one or two individuals who might be domain administrators anyway. In enterprises of any size, the rights and permissions granted to Account Operators are usually far too broad.

Additionally, the Account Operators group is, like the other administrative groups listed previously, a protected group. Protected groups are defined by the operating system and cannot be unprotected. Members of a protected group become protected. The result of protection is that the permissions (ACLs) of members are modified so that they no longer inherit permissions from their OU but, rather, receive a copy of an ACL that is quite restrictive. For example, if Jeff Ford is added to the Account Operators group, his account becomes protected and the help desk, which can reset all other user passwords in the User Accounts OU, cannot reset Jeff Ford’s password.

Note

For these reasons—overdelegation and protection—strive to avoid adding users to the groups listed previously that do not have members by default: Account Operators, Backup Operators, Server Operators, and Print Operators. Instead, create custom groups to which you assign permissions and user rights that achieve your business and administrative requirements.

For example, if Scott Mitchell needs to perform backup operations on a domain controller, but he should not be able to perform restore operations that could lead to database rollback or corruption and he should not be able to shut down a domain controller, don’t put Scott in the Backup Operators group. Instead, create a group, assign it only the Backup Files And Directories user right, and then add Scott as a member.

6. Special Identities

Windows and Active Directory also support special identities, groups for which membership is controlled by the operating system. You cannot view the groups in any list (in the Active Directory Users And Computers snap-in, for example), you cannot view or modify the membership of these special identities, and you cannot add them to other groups. You can, however, use these groups to assign rights and permissions. The most important special identities, often referred to as groups for convenience, are described in the following list:

  • Anonymous Logon Represents connections to a computer and its resources that are made without supplying a user name and password. In versions of Windows earlier than Windows Server 2003, this group was a member of the Everyone group. In Windows Server 2003 and later versions, this group is no longer a default member of the Everyone group.

  • Authenticated Users Represents identities that have been authenticated. This group does not include Guest, even if the Guest account has a password.

  • Everyone Includes Authenticated Users and Guest. On computers running versions of Windows earlier than Windows Server 2003, this group includes Anonymous Logon.

  • Interactive Represents users accessing a resource while logged on locally to the computer hosting the resource, as opposed to accessing the resource over the network. When a user accesses any given resource on a computer to which the user is logged on locally, the user is automatically added to the Interactive group for that resource. Interactive also includes users logged on through a remote desktop connection.

  • Network Represents users accessing a resource over the network, as opposed to users who are logged on locally at the computer hosting the resource. When a user accesses any given resource over the network, the user is automatically added to the Network group for that resource.

The importance of these special identities is that they enable you to provide access to resources based on the type of authentication or connection rather than on the user account. For example, you could create a folder on a system that allows users to view its contents when logged on locally to the system but does not allow the same users to view the contents from a mapped drive over the network. This is achieved by assigning permissions to the Interactive special identity.

Practice Administering Groups in an Enterprise

Practice Administering Groups in an Enterprise

In this practice, you perform best-practices group management tasks to improve the administration of groups in the contoso.com domain. To perform the exercises in this practice, you need to have the following objects in the contoso.com domain:

  • A first-level OU named Groups.

  • A global security group named Finance in the Groups OU.

  • A first-level OU named User Accounts.

  • A user account named Mike Danseglio in the User Accounts OU. Populate the user account with sample contact information: address, phone, and email. Reset the password of the account so that you know it. Make sure the account is enabled and that the user is not required to change the password at the next logon.

In this and other practices in this training kit, you will log on to the domain controller with user accounts that are not a member of Domain Administrators or the domain’s Administrators group. Therefore, you must give all user accounts the right to log on locally to the domain controllers in your practice environment. Follow the steps in the article, “Grant a Member the Right to Logon Locally,” at http://technet.microsoft.com/en-us/library/ee957044(WS.10).aspx to grant the Allow Logon Locally right to the Administrators and Domain Users groups. If you will use Remote Desktop Services to connect to the domain controller—rather than logging on locally—grant the Allow Logon Through Remote Desktop Services right. This is for the practice environment only. In a production environment, you should not grant users the right to log on to domain controllers.

EXERCISE 1 Create a Well-Documented Group

In this exercise, you create a group to manage access to the Budget folder, and you follow the best-practices guidelines presented in this lesson.

  1. Log on to SERVER01 as Administrator and open the Active Directory Users And Computers snap-in.

  2. Select the Groups OU in the console tree.

  3. Right-click the Groups OU, point to New, and click Group.

  4. In the Group Name box, type ACL_Budget_Edit.

  5. Select Domain Local in the Group Scope section and Security in the Group Type section, and then click OK.

  6. Click the View menu and ensure that Advanced Features is selected.

  7. Right-click the ACL_Budget_Edit group and choose Properties.

  8. On the Object tab, select the Protect Object From Accidental Deletion check box and click OK.

  9. Open the group’s Properties again.

  10. In the Description box, type BUDGET (EDIT).

  11. In the Notes box, type the following paths to represent the folders that have permissions assigned to this group:

    \\server23\data$\finance\budget

    \\server32\data$\finance\revenue projections

  12. Click OK.

EXERCISE 2 Delegate Management of Group Membership

In this exercise, you give Mike Danseglio the ability to manage the membership of the ACL_Budget_Edit group.

  1. Open the Properties dialog box of the ACL_Budget_Edit group.

  2. On the Managed By tab, click Change.

  3. Type the user name for Mike Danseglio, mike.danseglio, and then click OK.

  4. Select the Manager Can Update Membership List check box. Click OK.

EXERCISE 3 Validate the Delegation of Membership Management

In this exercise, you test the delegation you performed in Exercise 2, “Delegate Management of Group Membership,” by modifying the membership of the group as Mike Danseglio.

  1. Open Command Prompt and type the following command: runas/user:mike.danseglio cmd.exe.

  2. When prompted, enter the password for Mike Danseglio.

    A new command prompt window appears, running as Mike Danseglio.

  3. Type the following command on one line, and then press Enter:

    dsmod group "CN=ACL_Budget_Edit,OU=Groups,DC=contoso,DC=com"
       -addmbr "CN=Finance,OU=Groups,DC=contoso,DC=com"
  4. Close both Command Prompt windows.

  5. In the Active Directory Users And Computers snap-in, examine the membership of the ACL_Budget_Edit group and confirm that the Finance group was added successfully.

 
Others
 
- Active Directory 2008 : Administering Groups in an Enterprise (part 2) - Delegating the Management of Group Membership
- Active Directory 2008 : Administering Groups in an Enterprise (part 1) - Protecting Groups from Accidental Deletion
- Active Directory 2008 : Automating the Creation and Management of Groups (part 2)
- Active Directory 2008 : Automating the Creation and Management of Groups (part 1)
- Managing Exchange Server 2010 Features for Mobile Devices (part 8) - Understanding and Using WebReady Document Viewing
- Managing Exchange Server 2010 Features for Mobile Devices (part 7) - Understanding and Configuring Remote File Access
- Managing Exchange Server 2010 Features for Mobile Devices (part 6) - Understanding and Configuring Direct File Access
- Managing Exchange Server 2010 Features for Mobile Devices (part 5) - Understanding and Using Remote Device Wipe
- Managing Exchange Server 2010 Features for Mobile Devices (part 4) - Understanding and Using Exchange ActiveSync Mailbox Policy - Assigning Exchange ActiveSync Mailbox Policies
- Managing Exchange Server 2010 Features for Mobile Devices (part 3) - Understanding and Using Exchange ActiveSync Mailbox Policy - Optimizing Exchange ActiveSync Mailbox Policies
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us