Information Sheet Format
Information Sheet Format
Information Sheet Format
SUPPORT SERVICE
Level - I
LEARNING GUIDE 01
Protect Application or
Unit of Competence:
System Software
Protecting Application or
Module Title:
System Software
LG Code: ICT ITS1 M09 LO1 – LG33
TTLM Code: ICT ITS1 TTLM 1019v1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 2 of 2
1
This learning guide is developed to provide you the necessary information regarding
the following content coverage and topics –
User Account Control
User Account Configuration
Notifications Displayed at Logon
Utilities Used to Check Strength of Passwords
AccessingInformation Services
This guide will also assist you to attain the learning outcome stated in the cover
page. Specifically, upon completion of this Learning Guide, you will be able to –
Modify default user settings to ensure that they conform to security policy
Previously created user settings are modified to ensure they conform to
updated security policy
Ensure legal notices displayed at logon are appropriate
Appropriate utilities are used to check strength of passwords and consider
tightening rules for password complexity
Emails are monitored to uncover breaches in compliance with legislation
information services are accessed to identify security gaps and take
appropriate action using hardware and software or patches
Learning Instructions:
1. Read the specific objectives of this Learning Guide.
2. Follow the instructions described below 3 to 6.
3. Read the information written in the information “Sheet 1, Sheet 2, Sheet 3 and
Sheet 4” in page 3, 14, 20, 25 and 33 respectively.
4. Accomplish the “Self-Check 1, Self-Check 2, Self-Check 3, Self-Check 4 and
Self-Check 5” in page 12, 18,23, 30and 37 respectively.
5. If you earned a satisfactory evaluation from the “Self-Check” proceed to
“Operation Sheet 1, Operation Sheet 2 and Operation Sheet 3 ” in page 39
6. Do the “LAP test” in page 45
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
1.1.2. Authentication
Authentication is the process of verifying the identity of people who are
attempting to access the network or system. Typically, a user identifies himself to
the system, then is required to provide a second piece of information to prove
their identity. This information is only known by the user or can only be produced
by the user.
The most common method used to authenticate users is the Username and
Password method. Using this method a user identifies itself with a username.
They are then prompted for a password. The combination of name and password
are then compared by the system to its data on configured users and if the
combination matches the system’s data the user is granted access.
Other authentication methods include:
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Username with static passwords - the password stays the same until
changed by the user at some time
Usernames with dynamic passwords - the password is constantly
changed by a password generator synchronized with the user and system.
Other challenge response systems- this may involve PINs, questions to
the user requiring various answers or actions
Certificate Based - this requires the user to have an electronic certificate
or token. This may also need to be digitally signed by a trusted authority.
Physical devices - these include the use of smartcards and biometrics.
Generally, the entire authentication process occurs on the local
workstation, thus eliminating the need for a special server.
Whatever method is used is determined by the organisational policy and security
requirements.
1.1.3. Authorisation
Once a user has been authenticated (that is their identity validated) they are
granted access to the network or system. For the user to then access data or an
application or execute some task or command they need be authorised to do so.
The authorisation process determines what the user can do on the network. In
other words it enforces the organisation policy as applicable to the user.
The Network and System administrators are responsible for the technical
configuration of network operating systems, directory services and applications.
Part of the configuration includes security settings that authorise user access.
The administrators use an organisational policy to determine these settings.
1.2. User Account
A user account is a collection of information that tells Windows which files and
folders you can access, what changes you can make to the computer, and your
personal preferences, such as your desktop background or screen saver. User
accounts let you share a computer with several people, while having your own files
and settings. Each person accesses his or her user account with a username and
password.
There are three types of accounts. Each type gives users a different level of control
over the computer:
Standard Accounts are for everyday computing.
Administrator Accounts provide the most control over a computer, and
should only be used when necessary.
Guest Accounts are intended primarily for people who need temporary use
of a computer.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Table 1-2:The description of the UAC settings and the potential impact of each
setting to the security of your computer.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
will be dimmed, and you must either When you are notified, you should
approve or deny the request in the carefully read the contents of each
UAC dialog box before you can do dialog box before allowing changes to
anything else on your computer. The be made to your computer.
dimming of your desktop is referred
to as the secure desktop because
other programs can't run while it's
dimmed.
It's usually safe to allow changes to be
You will be notified before programs
Notify me only when programs
You will not be notified if you try to Because the UAC dialog box isn't on
make changes to Windows settings the secure desktop with this setting,
that require the permissions of an other programs might be able to
administrator. interfere with the dialog's visual
You will be notified if a program appearance. This is a small security
outside of Windows tries to make risk if you already have a malicious
changes to a Windows setting. program running on your computer.
You will not be notified before any This is the least secure setting. When
changes are made to your computer. you set UAC to never notify, you open
If you are logged on as an up your computer to potential security
administrator, programs can make risks.
changes to your computer without If you set UAC to never notify, you
P a g e 9 | 57 WSPTC Department of ICT IT Support Service Level 1 Date: Oct 2022
Version: 1
Institution Name ወ/ሮ ስህን ፖሊቴክኒክ ኮሌጅ Document No.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
are removed. The standard user access token can start standard user
applications but cannot start applications that perform administrative tasks.
When the user needs to run applications that perform administrative tasks
(administrator applications), the user is prompted to change or elevate the
security context from a standard user to an administrator. This default user
experience is called Admin Approval Mode. In this mode, applications require
specific permission to run as an administrator application.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Directions: Answer all the questions listed below. Use the Answer sheet provided
in the next page:
1. __________________ is a collection of information that tells Windows which files
and folders you can access, what changes you can make to the computer, and
your personal preferences, such as desktop background or screen saver.(1 pts)
2. __________________ lets you use most of the capabilities of the computer. You
can use most programs that are installed on the computer and change settings
that affect your user account.(1 pts)
3. __________________ is a user account that lets you make changes that will
affect other users change security settings, install software and hardware, and
access all files on the computer.(1 pts)
4. ____________ allows people to have temporary access to your computer.(1 pts)
5. __________________ is a collection of settings that make the computer look and
work the way you want it to.(1 pts)
6. __________________ is the process of verifying the identity of people who are
attempting to access the network or system.(1 pts)
7. __________________determines what the user can do on the network. In other
words it enforces the organization policy as applicable to the user.(1 pts)
8. The most common method used to authenticate users is __________________
9. Why use a Standard User Account instead of an Administrator Account?(2 pts)
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
10. List and describe authentication methods used to authenticate users. (4 pts)
________________________________________________________________
________________________________________________________________
________________________________________________________________
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
________________________________________________________________
________________________________________________________________
11. _____________________ is a feature in Windows that can help you stay in
control of your computer by informing you when a program makes a change that
requires administrator-level permission. (1 pts)
12. Listthe four different types of dialog boxes that UAC will notify you when your
permission or password is needed to complete a task.(4 pts)
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
13. List the UAC settings and the potential impact of each setting to the security of
your computer. (4 pts)
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
14. When a user logs on to a computer, the system creates an access token for the
user. This access token contains information about the level of access that the
user is granted, including specific _____________________ and
_____________________. (2 pts)
15. When the user needs to run applications that perform administrative tasks
(administrator applications), the user is prompted to change or elevate the
security context from a standard user to an administrator. This default user
experience is called _____________________.(1 pts)
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Answer Sheet
Score = ___________
Rating: ___________
1. _______________________
2. _______________________
3. _______________________
4. _______________________
5. _______________________
6. _______________________
7. _______________________
8. _______________________
9. ________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
10. ________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
11. _______________________
12. ________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
13. ________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
14. _____________________ and _____________________
15. _______________________
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Directions: Answer all the questions listed below. Use the Answer sheet provided
in the next page:
1. _____________________should make statements as to the degree of user
control that is required.(1 pts)
2. _____________________need to review procedures to ensure that they remain
current and address any changes to the organisation and the network.(1 pts)
3. List and describe some basic parameters covered by most operating systems to
consider when setting up user account options:(6 pts)
4. The most common way of administering _____________________ is to create
groups and put user accounts into appropriate groups.(1 pts)
5. _____________________ generally refer to file and directory access.(1 pts)
6. List type of permissions the user account or group can be set with:(4 pts)
7. _____________________ generally refer to the restriction on user accounts or
group in performing some task or activity.(1 pts)
8. List what administrators should do to manage user accounts appropriately. (4
pts)
9. Managing user accounts can be a complex and tedious task but we can make
things easier by ensuring appropriate __________________ are in place.(1 pts)
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Answer Sheet
Score = ___________
Rating: ___________
10.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
If a user attempts to log on outside his allowed hours, Windows 7 displays the
error message “Your account has time restrictions that prevent you from logging
on at this time. Please try again later.” The only way to resolve this problem is to
adjust the user’s logon hours by clicking the Logon Hours button on the Account
tab of the user’s Properties dialog box.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Directions: Answer all the questions listed below. Use the Answer sheet provided
in the next page:
1. Authentication problems occur because administrators have configured logon
restrictions to enforce the organization’s ______________________.(1 pts)
2. If a user provides ______________________ several times in a row (for e.g., if a
user repeatedly mistypes a password), Windows can block all authentication
attempts for a specific amount of time.(1 pts)
3. If a user attempts to log on outside his allowed hours, Windows 7 displays the
error
message_________________________________________________________
________________________________. (2 pts)
4. Write the two things that changing user passwords accomplishes:(2 pts)
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Answer Sheet
Score = ___________
Rating: ___________
2. ______________________
3. ________________________________________________________________
________________________________________________________________
4. ________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
5. ____________________________________
6. ______________________
7.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
3.
4.
4.1. Definitions of a Password
A password is a string of characters that people can use to log on to a computer and
access files, programs, and other resources. Passwords help ensure that people do
not access the computer unless they have been authorized to do so. In Windows, a
password can include letters, numbers, symbols, and spaces. Windows passwords
are also case-sensitive. To help keep your computer secure, you should always
create a strong password.
To help keep the information on your computer secure, you should not give out your
password or write it in a placewhere others can see it.
4.1.1. STRONG PASSWORDS AND PASSPHRASES
A password is a string of characters used to access information or a computer.
Passphrases are typically longer than passwords, for added security, and contain
multiple words that create a phrase. Passwords and passphrases help prevent
unauthorized people from accessing files, programs, and other resources. When
you create a password or passphrase, you should make it strong, which means
it's difficult to guess or crack. It's a good idea to use strong passwords on all user
accounts on your computer. If you're using a workplace network, your network
administrator might require you to use a strong password.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Symbols found on the keyboard (all
`~!@#$%^&*()_-+={}[]\|:;"
keyboard characters not defined as
' <> , . ? /
letters or numerals) and spaces
A password or passphrase might meet all the criteria above and still be weak. For
example, Hello2U! meets all the criteria for a strong password listed above, but is
still weak because it contains a complete word. H3ll0 2 U! is a stronger
alternative because it replaces some of the letters in the complete word with
numbers and also includes spaces.
Help yourself remember your strong password or passphrase by following these
tips:
Create an acronym from an easy-to-remember piece of information. For
example, pick a phrase that is meaningful to you, such as My son's
birthday is 12 December, 2004. Using that phrase as your guide, you
might use Msbi12/Dec,4 for your password.
Substitute numbers, symbols, and misspellings for letters or words in an
easy-to-remember phrase. For example, My son's birthday is 12
December, 2004 could become Mi$un's Brthd8iz 12124, which would
make a good passphrase.
Relate your password or passphrase to a favorite hobby or sport. For
example, I love to play badminton could become ILuv2PlayB@dm1nt()n.
If you feel you must write down your password or passphrase to remember it,
make sure you don't label it as such, and keep it in a safe place.
Windows passwords can be much longer than the eight characters
recommended above. In fact, you can make a password up to 127 characters
long. However, if you are on a network that also has computers running
Windows 95 or Windows 98, consider using a password that is no longer than 14
characters. If your password is longer than 14 characters, you might not be able
to log on to your network from computers running those operating systems.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
passwords will not allow the computer to be boot at all unless the
password is known.
Operating System /Network/ Third-Party Password: - Does the
password appear after the computer is done booting and before the
operating system runs? If yes, this is a network, Operating System, or
third-party password.
Window Password: -Windows users, does the password appear in
Windows before the desktop? If yes, this is a Windows or Windows
network password. If you are able to press the Escape key and get to
Windows, you have a standard Windows password; however, if this does
not bypass the password prompt, it is likely you have a Windows network
password.
4.2.4. Enforce Password History in Group Policy Editor
Computer administrators can use the Group Policy Editor to deploy all types of
general policy settings. When the "Enforce password history" policy setting is
enabled, Windows keeps a record of a specified number of prior user account
passwords. When users change their account password, they are prohibited from
re-using any of the passwords still in the Windows memory. This policy helps to
enhance computer security. By default, the "Enforce password history" policy is
set to "0," which means no prior passwords are remembered. To enable the
"Enforce password history" policy, the setting has to be a value greater than 0.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
This security setting determines the period of time (in days) that a
password can be used before the system requires the user to change it.
You can set passwords to expire after a number of days between 1 and
999, or you can specify that passwords never expire by setting the number
of days to 0. If the maximum password age is between 1 and 999 days,
the Minimum password age must be less than the maximum password
age. If the maximum password age is set to 0, the minimum password age
can be any value between 0 and 998 days.
Note
It is a security best practice to have passwords expires every 30 to 90
days, depending on your environment. This way, an attacker has a
limited amount of time in which to crack a user's password and have
access to your network resources
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Directions: Answer all the questions listed below. Use the Answer sheet provided
in the next page:
1. _____________________ is a string of characters that people can use to log on
to a computer and access files, programs, and other resources.(1 pts)
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Answer Sheet
Score = ___________
Rating: ___________
1. _____________________
2. ______________, ______________, ______________, and ______________
3. _____________________
4. _____________________
5. __________________________________________
6.
A strong password: A strong passphrase:
7. ________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
8. _____________________
9. ________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
10. _____________________
11. _____________________
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
12. _____________________
13.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
FIGURE5-1A logonauditfailurecausedbyinvalidcredentials
Audits from failed authentication attempts from across the network resemble the following
code. In particular, the Account Name, Account Domain, Workstation Name, and Source
Network Address are useful for identifying the origin computer.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Directions: Answer all the questions listed below. Use the Answer sheet provided
in the next page:
1. Before a user can log on to a computer running Windows 7, connect to a shared
folder, or browse a protected Web site, the resource must validate the user’s
identity using a process known as _____________________. (1 pts)
2. Windows supports a variety of authentication techniques, including (3 pts)
________________________________________________________________
________________________________________________________________
________________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
P Note:
a g e 45Satisfactory
| 57 WSPTC Department
rating of ICT
- 7 points IT Support Service Level 1 - below
Unsatisfactory Date: Oct 2022
7 points
Version: 1
You can ask your teacher for the copy of the correct answers.
Institution Name ወ/ሮ ስህን ፖሊቴክኒክ ኮሌጅ Document No.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Answer Sheet
Score = ___________
Rating: ___________
2. ________________________________________________________________
________________________________________________________________
________________________________________________________________
3. _____________________
4. _____________________
5. _____________________
6. _____________________
7.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
5. Select the account type you want, and then click ChangeAccount Type.
Note:Windows requires at least one administrator account on a computer. If you have
only one account on your computer, you can't change it to a standard account.
1.5. Configuring UAC in Control Panel
To configure UAC in Control Panel, perform the following steps:
1. In Control Panel, click System and Security.
2. Under Action Center, click Change User Account Control Settings, as
shown in Figure 1.5-1.
FIGURE 1.5-1You can access UAC settings through the Action Center
This step opens the User Account Settings window, one version ofwhich is
shown in Figure 5. Note that the set of options that appears is different for
administrators and standard users, and that each user type has a different
default setting.
FIGURE 1.5-2 UAC allows you to choose among four notification levels.
3. Choose one of the following notification levels:
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Always Notify This level is the default for standard users, and it
configures UAC to act as it does in Windows Vista. At this level, users
are notified whenever any changes that require administrator
privileges are attempted on the system.
Notify Me Only When Programs Try To Make Changes To My
Computer This level is the default for administrators and is not
availablefor standard users. At this level, administrators are not
notified when they make changes that require administrator
privileges. However, users are notified through consent prompt when
a program requests elevation.
Always Notify Me (And Do Not Dim My Desktop) This level is not
available for administrators. It is similar to the default setting for
standard users, except that at this particular level, the Secure
Desktop is never displayed. Disabling the Secure Desktop tends to
reduce protection against malware, but it improves the user
experience. This setting might be suitable for standard users who
very frequently need to request elevation.
Notify Me Only When Programs Try To Make Changes To My
Computer (Do Not Dim The Desktop) This level is available for both
standard users and administrators. At this level, the behavior is the
same as with the default administrator level (“Notify me only when
programs try to make changes to my computer”), but with this option
the Secure Desktop is not displayed.
Never Notify This level disables notifications in UAC. Users are not
notified of any changes made to Windows settings or when software
is installed. This option is appropriate only when you need to use
programs that are incompatible with UAC.
4. Click OK.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
1.
2.
2.1. Add a User Account to a Group
By adding a user account to a group, you can avoid having to grant the same
access and permission to many different users one by one. Members of a group
can make the same types of changes to settings and have the same access to
folders, printers, and other network services.
1. Click on Start, and then click on Control Panel
2. Click on Administrative Tools and then Double-click on
ComputerManagement. If you are prompted for an administrator password
or confirmation, type the password or provide confirmation.
3. In the left pane of Computer Management, click Local Users and Groups.
4. Click on Groups folder.
5. Right-click the group you want to add the user accountto, and then click
Add to Group.
6. Click Add, and then type the name of the user account.
7. Click Check Names, click OK.
8. Click Apply, and then click OK.
Note
To help make your computer more secure, add a user to the Administrators
group only if it is absolutely necessary. Users in the Administrators group have
complete control of the computer. They can see everyone's files, change
anyone's password, and install any software they want.
2.2. Remove a User Account from a Group
1. Click on Start, and then click on Control Panel
2. Click on Administrative Tools and then Double-click on
ComputerManagement. If you are prompted for an administrator password
or confirmation, type the password or provide confirmation.
3. In the left pane of Computer Management, click Local Users and Groups.
4. Click on Groups folder.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
5. Right-click the group you want to remove the user accountfrom, and then
click Properties.
6. Selectthe name of the user accountand thenClick Remove.
7. Click Apply, and then click OK.
2.3. Disable a User Account
If you have a user account that you want to make unavailable, you can disable it. A
disabled account can be enabled again later. Disabling an account is different from
deleting an account. If you delete an account, it can't be restored.
Note
To enable a disabled account, follow the same steps as you would for disabling
an account, but clear the Account is disabled check box.
2.4. Delete a User Account
If you have a user account on your computer that is not being used, you can
permanently remove it by deleting it. When you delete a user account, you can
choose whether you want to keep the files created under that account; however, e-
mail messages and computer settings for the account will be deleted.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
5. Decide if you want to keep or deletethe files created under the account by
clicking Keep Files or Delete Files.
6. Click Delete Account.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
1.
2.
3.
3.1. Enable Audit Logon Events
To log failed authentication attempts, you must enable auditing by following these
steps:
1. Click Start and then click Control Panel. Click System and Security. Click
AdministrativeTools, and then double-click Local Security Policy.
2. In the Local Security Policy console, expand Local Policies, and then select
Audit Policy.
3. In the right pane, double-click Audit Logon Events.
4. In the Audit Logon Events Properties dialog box, select the Failure check box
to add an event to the Security event log each time a user provides invalid
credentials. If you also want to log successful authentication attempts (which
include authentication attempts from services and other nonuser entities),
select the Success check box.
5. Click OK.
6. Restart your computer to apply the changes.
With auditing enabled, you can view audit events in Event Viewer by following these
steps:
1. Click Start, right-click Computer, and then click Manage.
2. Expand System Tools, Event Viewer, Windows Logs, and then select
Security.
3. Event Viewer displays all security events. To view only successful logons,
click the Filter Current Log link in the Actions pane and show only Event ID
4624. To view only unsuccessful logon attempts, click the Filter Current Log
link and show only EventID 4625.
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
Instructions: Given necessary templates, tools and materials you are required to
perform the following tasks within 4 hour.
Task 1. User AccountControl
1.1. Create the following User Accounts
1.1.1. An Administrator Account
A. Make the Username “Admin1”
B. Make the password “Admin@123”
C. Make the Account picture any picture you want
1.1.2. An Administrator Account
A. Make the Username “Admin2”
B. Make the password “Admin@321”
C. Make the Account picture different picture you want
1.1.3. A Standard Account
D. Make the Username “Stand1”
E. Make the password “Stand@123”
F. Make the Account picture different picture you want
1.1.4. Another Standard Account
A. Make the Username “Stand2”
B. Make the password “Stand@210”
C. Make the Account picture different picture you want
1.1.5. Turn on the Guest Account
1.2. Rename a User Account with
“Stand2” username to “Stand2Admin”
“Admin1” username to “Admin2Stand”
1.3. Change a User's Account Type
“Stand2Admin” to “Administrator Account”
“Admin2Stand” to “Standard Account”
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
W/R
s Issue No. Page No.
Title: COLLEGE
Information Sheet Page 12 of 55
1
https://www.sitepoint.com/5-steps-to-uncovering-your-it-security-gaps/
https://en.wikibooks.org/wiki/
Fundamentals_of_Information_Systems_Security/
Access_Control_Systems#Access_Control_Assurance
https://en.wikipedia.org/wiki/Computer_access_control
https://en.wikibooks.org/wiki/
Category:Book:Fundamentals_of_Information_Systems_Security
https://www.computerweekly.com/opinion/Identify-security-gaps