CISCO CyberOps lab – Create User Accounts; cybersecurity training

Introduction

In this lab, you will create and modify user accounts in Windows.

Part 1: Creating a New Local User Account

Part 2: Reviewing User Account Properties

Part 3: Modifying Local User Accounts

Required Resources

  • A Windows PC

Instructor Note: Provide students with a user account name and password to be created in this lab.

Instructions

Part 1: Creating a New Local User Account

Step 1: Open the User Account Tool.

  1. Log on to the Windows PC with an Administrator account. The account CyberOpsUser is used in this example.
  2. Click Start > search Control Panel. Select User Accounts in the Small icons view. To change the view, select Small icons in the View by drop down list.

Step 2: Create a user account.

  1. In the User Accounts window, click Manage another account.
  2. In the Manage Accounts window, click Add a new user in PC settings.
  3. In the Settings window, click Add someone else to this PC.
  4. In the How will this person sign in? window, click I don’t have this person’s sign-in information.
  5. In the Let’s create your account window opens, click Add a user without a Microsoft account.
  6. In the Create an account for this PC window, provide the necessary information to create the new user account named User1. Click Next to create the new user account.

Question:

What type of user account did you just create?

 

A local account with no administrative rights

  1. Attempt to log into the newly created user account. It should be successful.
  2. Navigate to C:\Users Right-click the User1 folder and select Properties, and then the Security tab.
Learn and Earn More-   Become a Professional and Certified project management consultant

Question:

Which groups or users have full control of this folder?

 

Groups: SYSTEM, Administrators  Users: User1

  1. Open the folder that belongs to CyberOpsUser. Right-click the folder and click the Properties

Question:

Were you able to access the folder? Explain.

 

You do not have permission to access this folder.

  1. Log out of User1 account. Log back in as CyberOpsUser.
  2. Navigate to C:\Users Right-click the folder and select Properties. Click the Security tab.

Question:

Which groups or users have full control of this folder?

 

Groups: SYSTEM, Administrators  Users: CyberOpsUser

Part 2: Reviewing User Account Properties

  1. Click Start > Search for Control Panel > Select Administrative Tools > Select Computer Management.Select Local Users and Groups. Click the Users
  2. Right-click User1 and select Properties.
  3. Click the Member Of

Question:

Which group is User1 is a member of?

 

Users

  1. Right-click the account CyberOpsUser and select Properties.

Question:

Which group is this user a member of?

 

Users and Administrators

Part 3: Modifying Local User Accounts

Step 1: Change the account type.

  1. Navigate to the Control Panel and select User Accounts. Click Manage another account. Select User1.
  2. In the Change an Account window, click the User1 Click Change the account type.
  3. Select the Administrator radio button. Click Change Account Type.
  4. Now the account User1 has administrative rights.
  5. Navigate to Control Panel > Administrative Tools > Computer Management. Click Local Users and Groups> Users.
  6. Right-click User1 and select Properties. Click Member Of

Question:

Which groups does User1 belong to?

 

Administrators and Users

  1. Select Administrators and click Remove to remove User1 from the Administrative group. Click OK to continue.
Learn and Earn More-   CISCO CyberOps lab – Visualizing the Black Hats; cybersecurity training

Step 2: Delete the account.

  1. To delete the account, right-click User1and select Delete.
  2. Click OK to confirm the deletion.

Question:

What is another way to delete a user account?

 

Control Panel > User Accounts > Manage another account > Select User1 > Delete the account

Reflection Questions

  1. Why is it important to protect all accounts with strong passwords?

 

No password or a weak password can allow access from almost anyone to steal data, or use the computer for unauthorized purposes.

  1. Why would you create a user with Standard privileges?

 

The Standard User cannot compromise the security of the computer or the privacy of other users.



WhatsApp chat