10.2 Account Options

Windows user accounts allow multiple users to access one computer or any computer in a network situation. Security is an important aspect for any network or individual computer, so it is important to set up user accounts properly. The first account that is set up during installation is an administrator account. This account should be used to set up computer features and programs and to make administrative changes.

All other accounts that will be used for everyday computing should be set up as standard accounts. The third account option is for a guest account, which is created for users who will only require temporary access to a computer.

Windows requires at least one administrator account on a computer. If you have only one account on your computer, you can't change it to a standard account.

Adding and Removing Users

In order to add or remove user accounts for a workgroup or single computer, follow these steps:

Users / Security Groups

A user group is a collection of users who have all been assigned the same security permissions. Security permissions control access to system resources, programs installation and removal, and system tasks, User groups are also called security groups. The two most common groups are administrator and standard users, however there are other options:



Only Vista Business or Ultimate - Windows 7 Professional and Ultimate can perform these steps.
Assigning user groups beyond the basic standard or administrator accounts is not an option for Vista Home Basic or Premium nor is this available on Windows Home Basic or Home Premium.



One of Windows XP's security flaws was the fact that it made all users that were created administrator level accounts by default. This was exploited by hackers because a user with administrator rights has permissions to install programs. Some users with administrator rights unknowingly allowed and continue to allow malware to be installed.

UAC Elevation Prompt

Vista has changed the user setup process to protect computers and networks from malware that exploited the default administrator rights that were applied to each new user. Vista assigns administrator rights to the first user that is set up. Every user after this is given standard rights by default, which do not contain permissions to install programs or change settings that effect all users.

Standard users will need to be manually changed to either an administrator level account or assigned one of the security group settings discussed above. Even administrators will have to deal with User Account Controls when a program is trying to be installed on a computer, or when settings that effect all users are being changed such as Windows firewall or Windows Updates.


User Account Control Panel

The UAC checks a users security token, which is assigned to each user during logon. The security token contains the users privileges and security group membership, and determines what the user can and cannot do. Events that cannot be accomplished with a standard account can be carried out if an administrator level account password is entered. Even if an administrator level user attempts to change certain settings, the UAC will display an Elevation Prompt message that will inform the user that the action is being requested, provide details, and the user can either click on the Continue or Cancel buttons.

This occurs because an administrator's token is actually a split token. One half includes standard user permissions and is used during logon and while using the computer. When higher level permissions are required, the administrator half of the token is accessed by clicking Continue on the UAC Administrator Approval Mode Elevation Prompt window. This provides another layer of security.

Permissions that standard and administrative users have by default include:

Standard 

Administrator

Changing time zones Installing and uninstalling programs
Changing power management settings Installing a device driver
Creating and configuring Virtual Private Network (VPN) connections Installing Windows updates
Establishing a Local Area Network connection Installing an ActiveX control
Adding printers Changing firewall settings
Establishing and configuring a wireless connection Changing the date and time
Establishing and configuring a Bluetooth device Changing Parental Control settings
Restoring backed-up files Adding, removing, and changing a user's account type
Synchronization with a mobile device Changing Automatic Updates settings
Modifying display settings and desktop background Changing UAC setttings with the Security Policy Editor
Playing and burning of CD or DVD media Changing Remote Desktop access settings
Configuring battery power options for laptops Schedule Automated Tasks
Configuring Accessibility options Restore backed-up system files
Changing own password Working with system files
Set up and use the Remote Desktop feature Working with audit logs

The UAC Elevation Prompt can be disabled by following the steps in the simulations below.

 


Turning off UAC
in Windows Vista


Turning off UAC
in Windows 7

Events that prompt the UAC to display the Elevation Prompt can be changed from their default settings by using the local Security Policy Editor tool (secpol.msc) found by using the path: Local Security Settings-->Local Policies-->Security Options. Administrators Access Mode can even be changed to have to input their password for the Elevation Prompt.

Events that prompt an Elevation Prompt are color coded to be application specific. If the application publisher is blocked by a policy or Windows, a red window bar appears. A splash background bar signifies a Vista published application, while a Microsoft verified publisher prompts a grey bar window. An unsigned program prompts an orange bar window.