- 1 Top 10 Enterprise Database Systems to Consider in 2015
- 2 Docker's DCT Delivers Digital Signing for Security
- 3 Red Hat Enterprise Linux 7.2 Enters Beta with Improved Container Support
- 4 VMware CEO Pat Gelsinger Gives VMworld 5 Imperatives for Success
- 5 VMware vSphere Integrated Containers Previewed at VMworld
70-240 in 15 minutes a week: Configuring the Desktop Environment and Managing Security Page 6
In order for a user to use a Windows 2000 Professional system, they must be authenticated. Authentication occurs when a user provides a valid username and password combination for the system or domain they are logging into. If logging into a Windows 2000 system locally, the user must provide a username and password from the local SAM database on that system. When logging on to a domain, a valid domain username, password and domain name (from the drop-down list) must be provided. Alternatively, you can also log in with something called a User Principal Name (UPN), which looks like an email address in the format email@example.com. If a UPN is provided, the user does not need to choose a domain name from the drop-down box (this will actually be disabled automatically when a UPN is used). When a user is logging on by sitting in front of a system, this is referred to as an interactive logon. In the same manner as NT 4, if you want a system to lock automatically after being idle for a period of time, set up a screensaver - the system will lock automatically after the interval you specify.
One last possibility that you should be aware of in Windows 2000 is the ability to automate the logon process. That is, you can set Windows 2000 up such that is does not require that a user provide a username and password to log in. Instead, the system will login automatically using the credentials you supply. You can control this behavior (which is obviously not recommended on systems that require security, but may be useful on, say, a kiosk system) by using the Users and Passwords applet in Control panel. You must specify the user account that the automated logon should use. Note that authentication is still taking place, but everyone is automatically being authenticated as the same user.
Well, that takes care of yet another week in the series. Yes, this one was a little longer than usual, but we're still ahead since we covered two topics this time instead of one. My next article will cover Network Protocols and Services, as well as a look at something you absolutely must be familiar with in order to have any success on the exam. I'll let that be a secret for now - no need to get you worked up and worried too soon! If you just can't wait, however, you may want to check out my website, where I've just made a new type of practice exam available, which directly corresponds to next week's mystery topic. Once again, please feel free to email me with any questions or feedback you may have about the series; I look forward to hearing from you. Also, I would appreciate any feedback you might have about how you think my website might be made a more valuable resource. What would you like to see? I'm listening...
In the meantime, good luck with your studies this week.