Default Local Groups Flashcards

1
Q

Administrators

A

Any user added to this group has full control over that computer. By default, the administrator will have access to everything, for example all files and folders. If an administrator has been denied access they can take ownership of the object in question and give themselves permissions to the object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Users

A

This group is designed for the general user. It allows them to run software and change settings that relate to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Power Users

A

The power users group was introduced in Windows XP to give the user more access than the user group but less than an administrator. In Windows Vista this group was removed and in Windows 7 it was added again. In Windows 7, the Power Users group does not provide any access other than user access and is included only for legacy reasons. If you want to give this group the same permissions as Windows XP, you can apply a security template as explained below. This security template should only be applied as a last resort. The process is not reversible and may not function as expected with newer software.

To apply the security template to the Power Users Group

  1. Open mmc and add the snap-in Configuration and Security Analysis
  2. Right click Security Configuration and Analysis and select open database
  3. Enter a new database name or open an existing database
  4. When prompted open c:\windows\inf\puwk.inf. If not prompted, right click Security Configuration and Analysis and select open template
  5. Right click Security Configuration and Analysis and select configure computer now
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Guests

A

The guest group gives the user the ability to login and run software. Any changes that are made by that user, for example changing the wallpaper, will be lost when the user logs off. The guest account is usually used for computers that are set up as kiosks. In this case, you want the user to have access to run software and make changes if they need to, but when the next user uses the computer, you want to ensure that the new user gets the default settings and not the modified settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Backup Operators

A

This group allows the user to access any file on the system for the purpose of backing and restoring. It does not give them full control over files and folders, for example, they cannot change the NTFS permissions on the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Remote Desktop Users

A

A user that is added to this group is allowed to access that computer using remote desktop. This is assuming that remote desktop is enabled and allowed through the firewall. Administrators do not need to be added to this group to connect to the computer using Remote Desktop. Assuming remote desktop is enabled and allowed through the firewall, an administrator without being a member of this group will be able to use remote desktop to access the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Offer Remote Assistance Helpers

A

Remote assistance allows a user to request help from another user. Using remote assistance, the other user can see the desktop and even take control if allowed. In order for this to occur, the user wanting help must create an invitation which is opened by the other user. If a user is a member of this group, they can offer their help to a user on that computer without having to wait for an invitation to be created and sent to them. Regardless of whether a user is in this group or not, the user on that computer can also reject any remote assistance connections that come into the computer. Being a member of this group essentially means you can offer unsolicited help (Help not asked for) rather than only being able to offer solicited help. (Help that was asked for)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Configuration Operators

A

Members of this group can make changes to network adapter settings on the computer. For example, they can change the IP configuration on an adapter and renew or release DHCP configuration on that adapter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Performance Monitor Users

A

This allows the user to monitor performance of the computer using software like Performance Monitor. This includes monitoring the computer remotely assuming it has been enabled and allowed through the firewall. Members of this group can also use data collector sets that were created by another user but cannot create a new data collector set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Performance Log Users

A

This group has all the same rights as performance monitors users but can also create data collector sets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IIS_IUSRS

A

This group is used by IIS. The idea being permissions and access required by IIS can be isolated to this group. In other words, the rights and permissions that are needed to run IIS can be gained by using this group. Since this is a local group, if you copy IIS files from one computer to another, they will have the same access on the other computer since this group will exist on the other computer. You would normally not need to add users to this group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Replicator

A

Used by the replicator service on a domain controller. You should not need to add users to this group. In Windows Vista there was a service called DFS replication which may have used this group. In Windows 7, this service does not exist so this group is not used in Windows 7.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Distributed Com Users

A

This is a Microsoft Technology that allows for distributed network components. It may also be referred to as DCom. Users in this group can start, activate, and use DCom Objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cryptographic Operators

A

Members of this group can perform specialized cryptographic operations. Normal operations like encryption files and using VPN do not require the user to be a member of this group. This group is only required in very special circumstances so it is unlikely you will ever need to add users to this group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly