123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Batch Files And Group Membership

Profile Picture
By Author: Alyssa
Total Articles: 128
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The Ifmember utility is commonly used in batch files and logon scripts to deter¬mine group membership before running a command. You can see how the Ifmember utility works by performing the following steps:
1. Insert the Supplemental CD-ROM and run the \70-294\Labs\Chapter08\Lab8.bat batch file if you have not already. This batch file creates several groups and makes Amy a member of those groups. When the batch file runs, it will leave the commands it runs on-screen for you to review. Press the spacebar when you are finished free Microsoft practice exam questions(http://www.examshots.com) and reviewing what happened.

2. Run the IfMember_Setup.exe program from the \70-294\Labs\Chapter08 folder on the Supplemental CD-ROM. The Microsoft Web Installation Wizard appears.
3. Click Next to proceed.
4. Read the license agreement. If you do not agree, you cannot continue. If you agree, click the I Agree option button. Then, click Next to proceed. The Destination Directory opens.
5. Adjust the installation location if necessary, and click Install Now.
6. Click Finish.
7. In the new command ...
... prompt window, type ifmember /v /I > c:\membership.txt and press Enter.
8. Type notepad c:\niembership.txt and press Enter. You'll see a list of your current group memberships displayed in Notepad.

Chapter Summary
A group is a collection of users, computers, contacts, IT certification(http://www.buyitexam.com) and other groups. Distribution groups are used only for e-mail. Security groups are used to grant access to resources.

Group scopes allow you to use groups in different ways to assign permissions. The three group scopes are global, domain local, and universal. Global security groups are most often used to organize users who share similar network access requirements. Domain local security groups are most often used to assign permis¬sions to resources. Universal security groups are most often used to assign permis¬sions to related resources in multiple domains.

Use the following strategy for planning groups: place user accounts into global groups, create a domain local groups for a group of 70-297 Exam(http://www.mcse-70-297.com) resources to be shared in common, place the global groups into the domain local group, and then assign permissions to the domain local group.
You use the Active Directory Users And Computers console to create groups, delete groups, add members to groups, and change the group scope.
You cannot change the group scope for domains with a domain functional level set to Windows 2000 mixed.

The following scope changes are allowed in domains with the domain functional level set to Windows 2000 native or Windows Server 2003: global to universal, as long as the group is not a member of another group having global scope; domain local to universal, as long as the group being converted does not have another group with a domain local scope as its member; universal to global, as long as the group being converted does not have another universal group as its member; and universal to domain local.

Group scopes allow you to use groups in different ways to assign permissions. The three group scopes are global, domain local, and universal. Global security groups are most often used to organize users who share similar network access requirements. Domain local security groups are most often used to assign permis¬sions to resources. Universal security groups are most often used to assign permis¬sions to related resources in multiple domains.

Total Views: 243Word Count: 523See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: