123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Set Up User Accounts

Profile Picture
By Author: Jasmine
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Windows Server 2003 automatically creates accounts called built-in Network+ benefits accounts. Two commonly used built-in accounts are Administrator and Guest.

Note The IUSR_computername and IWAM_computername built-in accounts are automatically created when Microsoft Internet Information Services (IIS) are installed on the domain controller. IUSR_computername is an account for anonymous access to IIS. IWAM_computername is an account for anonymous access to IIS out-of-process applications. The TslnternetUser account is automatically created when Terminal Services are installed on the domain controller. TslnternetUser is an account used by Terminal Services.
Administrator
Use the built-in Administrator account to manage the overall computer and domain configuration for such tasks as creating and modifying user accounts and groups, managing security policies, creating printers, and assigning permissions and rights to user accounts to gain access to resources. This account is assigned the password you specified during Active Directory installation and ...
... has permissions to perform all tasks in the domain. The Administrator account cannot be deleted.
Because the Administrator account has full permissions, you must protect it from penetration by intruders. First, you should always rename the Administrator account with a new name that does not connect the account to n10-004 network administrative tasks. Renaming makes it difficult for unauthorized users to break into the Administrator account because they do not know which user account it is. Second, you should always use a long and complex password that cannot be easily cracked for the Administrator account. Third, do not allow too many people to know the administrator password. Finally, if you are the administrator, you should create a separate user account that you use to perform nonadministrative tasks. Log on by using the Administrator account only when you perform administrative tasks. Or, log on with your user account and use the Run As program when you need to perform a few administrative tasks. For information on setting up user accounts for performing nonadministrative tasks and the Run As program, see Chapter 8, "Administering Group Accounts."
The purpose of the built-in Guest account is to provide users who do not have an account in the domain with the ability to log on and gain access to resources. For example, an employee who needs access to resources for a short time can use the Guest account. By default, the Guest account does not require a password (the pass?word can be blank) and is disabled. You should enable the Guest account only in low-security networks and always assign it a password. If you enable the Guest account, always rename it to provide a greater degree of security. Use a name that does not identify it as the Guest account. You can rename and disable the Guest CompTIA account, but you cannot delete it.

Total Views: 317Word Count: 452See All articles From Author

Add Comment

Computers Articles

1. How App Developers Near Me Turn Ideas Into Market Ready Apps?
Author: davidjohansen

2. Monetization Strategies Recommended By App Developers Near Me
Author: davidjohansen

3. Scrape Grocery Data From Whole Foods Market Usa
Author: FoodDataScrape

4. Transform Your Shopping Experience With Grocery Delivery Apps In Usa
Author: Swiza Joy

5. Best Place To Buy Godex G500u Barcode Printer In Hyderabad
Author: prime poskart

6. How Student Retention Software Transforms Higher Education Outcomes
Author: Brenda Joyce

7. Scrape Uk Supermarket Prices Data From Tesco & Asda
Author: FoodDataScrape

8. Best Pos Cash Drawers In India
Author: prime pos

9. Full List Of Fixing Epson®️ Printer Won't Connect To Wifi Issue Usa
Author: Adam Smith

10. Web Scraping Grocery Price Comparison Data From Uk
Author: FoodDataScrape

11. How To Erase Junk Data From Your Pc?
Author: Daniel Reed

12. Scrape Weekly Restaurant Menus From Doordash Australia
Author: FoodDataScrape

13. How Rp326 Thermal Printers Boost Efficiency
Author: prime poskart

14. Understanding Agile Methodology: A Simple Guide
Author: Tech Point

15. The Complete Guide To Legacy System Migration: Why It's Time To Modernize
Author: Tech Gazebos

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: