Windows 2000 Server: Default User Accounts and Groups
This article is based on an article in the Microsoft TechNet Library and is presented here to enable those outside of Microsoft who are interested and knowledgeable on this topic to improve it. The original article exists on TechNet as Default User Accounts and Groups (http://technet.microsoft.com/en-us/library/bb726980.aspx).
When you install Windows 2000, the operating system installs default users and groups. These accounts are designed to provide the basic setup necessary to grow your network. Three types of default accounts are provided:
Predefined User and group accounts installed with the operating system.
Built-In User and group accounts installed with the operating system, applications, and services.
Implicit Special groups created implicitly when accessing network resources; also known as special identities.
Note: Although you can modify the default users and groups, you can't delete default users and groups created by the operating system. The reason you can't delete these accounts is that you wouldn't be able to re-create them. The SIDs of the old and new accounts wouldn't match, and the permissions and privileges of these accounts would be lost.
Built-In User Accounts
Built-in user accounts have special uses on Windows 2000. While all Windows 2000 systems have one built-in account called LocalSystem, other built-in user accounts may be available.
The LocalSystem Account
LocalSystem is a pseudo-account for running system processes and handling system-level tasks. The account is available on the local system only. You can't change the settings for the LocalSystem account with the user administration tools. Users can't log on to a computer with this account.
Note: While users can't log on to a computer with the LocalSystem account, certain processes can log on using this account. For example, Windows 2000 services can be configured to log on to a computer using the System account. For more information, see the section of Chapter 3 entitled "Managing System Services."
Other Built-In Accounts
When you install add-ons or other applications on a workstation or server, other default accounts may be installed. You can usually delete these accounts.
When you install Internet Information Services, you may find several new accounts, including IUSR_host and IWAM_host, where host is the computer name. The IUSR_host account is the built-in account for anonymous access to Internet Information Services. The IWAM_host account is used by Internet Information Services to start out of process applications. These accounts are defined in Active Directory when they're configured on a domain. However, they're defined as local users when they're configured on a stand-alone server or workstation. Another built-in account that you may see is TSInternetUser. This account is used by Terminal Services.
Predefined User Accounts
Two predefined user accounts are installed with Windows 2000—Administrator and Guest. With workstations and member servers, predefined accounts are local to the individual system they're installed on.
Predefined accounts have counterparts in Active Directory. These accounts have domain-wide access and are completely separate from the local accounts on individual systems.
The Administrator Account
Administrator is a predefined account that provides complete access to files, directories, services, and other facilities. You can't delete or disable this account. In Active Directory, the Administrator account has domain-wide access and privileges. Otherwise, the Administrator account generally has access only to the local system. Although files and directories can be protected from the Administrator account temporarily, the Administrator account can take control of these resources at any time by changing the access permissions.
Tip To prevent unauthorized access to the system or domain, be sure to give the account an especially secure password. Also, because this is a known Windows 2000 account, you may want to rename the account as an extra security precaution.
In most instances you won't need to change the basic settings for this account. However, you may need to change its advanced settings, such as membership in particular groups. By default, the Administrator account for a domain is a member of these groups: Administrators, Domain Admins, Domain Users, Enterprise Admins, Schema Admins, and Group Policy Creator Owners. You'll find more information on these groups in the next section.
Real World In a domain environment, you'll use the local Administrator account primarily to manage the system when you first install it. This allows you to set up the system without getting locked out. You probably won't use the account once the system has been installed. Instead, you'll probably want to make your administrators members of the Administrators group. This ensures that you can revoke administrator privileges without having to change the passwords for all the Administrator accounts.
For a system that's part of a workgroup where each individual computer is managed separately, you'll typically rely on this account anytime you need to perform your system administration duties. Here, you probably won't want to set up individual accounts for each person who has administrative access to a system. Instead, you'll use a single Administrator account on each computer.
The Guest Account
Guest is designed for users who need one-time or occasional access. While guests have limited system privileges, you should be very careful about using this account. Whenever you use this account, you open the system to potential security problems. The potential is so great that the account is initially disabled when you install Windows 2000.
Tip If you decide to enable the Guest account, be sure to restrict its use and to change the password regularly. As with the Administrator account, you may want to rename the account as an added security precaution.
Built-In Groups
Built-in groups are installed with all Windows 2000 workstations and servers. Use the built-in groups to grant a user the group's privileges and permissions. You do this by making the user a member of the group. For example, you give a user administrative access to the system by making a user a member of the local Administrators group. You give a user administrative access to the domain by making a user a member of the domain local Administrators group in Active Directory.
The availability of a specific built-in group depends on the current system configuration. Use Table 7-2 to determine the availability of the various built-in groups. Each of these groups is discussed later in the chapter.
Table 7-2 Availability of Built-In Groups Based on the Type of Network Resource
Group Name |
Group Type |
Active Directory Domain |
Windows 2000 Professional or Member Server |
---|---|---|---|
Account Operators |
Built-In Local |
Yes |
No |
Administrators |
Built-In Local, Local |
Yes |
Yes |
Backup Operators |
Built-In Local, Local |
Yes |
Yes |
Guests |
Built-In Local, Local |
Yes |
Yes |
Power Users |
Local |
No |
Yes |
Pre-Windows 2000 Compatible Access |
Built-In Local |
Yes |
No |
Print Operators |
Built-In Local |
Yes |
No |
Replicator |
Built-In Local, Local |
Yes |
Yes |
Server Operators |
Built-In Local |
Yes |
No |
Users |
Built-In Local, Local |
Yes |
Yes |
Predefined Groups
Predefined groups are installed with Active Directory domains. Use these groups to assign additional permissions to users, computers, and other groups. You do this by making the user a member of the group. Predefined groups include domain local, global, and universal groups. The availability of a specific built-in group depends on the domain configuration.
Use Table 7-3 to determine the availability of the various predefined groups. Key predefined groups are discussed later in this chapter.
Note: The group scope for Enterprise Admins and Schema Admins can be either universal or global, depending on the operations mode. In mixed mode, these are global groups. In native mode, these are universal groups.
Table 7-3 Availability of Predefined Groups Based on Domain Configuration
Group Name |
Group Type |
When Installed |
---|---|---|
Cert Publishers |
Global |
By default |
DHCP Administrators |
Domain Local |
With DHCP |
DHCP Users |
Domain Local |
With DHCP |
DnsAdmins |
Domain Local |
With DNS |
DnsUpdateProxy |
Global |
With DNS |
Domain Admins |
Global |
By default |
Domain Computers |
Global |
By default |
Domain Controllers |
Global |
By default |
Domain Guests |
Global |
By default |
Domain Users |
Global |
By default |
Enterprise Admins |
Universal/Global |
By default |
Group Policy Creator Owners |
Global |
By default |
RAS and IAS Servers |
Domain Local |
With remote access services |
Schema Admins |
Universal/Global |
By default |
WINS Users |
Domain Local |
WINS |
Implicit Groups and Special Identities
In Windows NT implicit groups were assigned implicitly during logon and were based on how a user accessed a network resource. For example, if a user accessed a resource through interactive logon, the user was automatically a member of the implicit group called Interactive. In Windows 2000, the object-based approach to the directory structure changes the original rules for implicit groups. While you still can't view the membership of special identities, you can grant membership in implicit groups to users, groups, and computers.
To reflect the new role, implicit groups are also referred to as special identities. A special identity is a group whose membership can be set implicitly, such as during logon, or explicitly through security access permissions. As with other default groups, the availability of a specific implicit group depends on the current configuration. Use Table 7-4 to determine the availability of the various implicit groups. Implicit groups are discussed later in this chapter.
Table 7-4 Availability of Implicit Groups Based on the Type of Network Resource
Group Name |
Group Type |
Active Directory Domain |
Windows 2000 Professional or Member Server |
---|---|---|---|
Anonymous Logon |
Implicit |
Yes |
Yes |
Authenticated Users |
Implicit |
Yes |
Yes |
Batch |
Implicit |
Yes |
Yes |
Creator Group |
Implicit |
Yes |
Yes |
Creator Owner |
Implicit |
Yes |
Yes |
Dialup |
Implicit |
Yes |
Yes |
Enterprise Domain Controllers |
Implicit |
Yes |
No |
Everyone |
Implicit |
Yes |
Yes |
Interactive |
Implicit |
Yes |
Yes |
Network |
Implicit |
Yes |
Yes |
Proxy |
Implicit |
Yes |
No |
Restricted |
Implicit |
Yes |
No |
Self |
Implicit |
Yes |
No |
Service |
Implicit |
Yes |
Yes |
System |
Implicit |
Yes |
Yes |
Terminal Server User |
Implicit |
No |
Yes |
Account Capabilities
When you set up a user account, you can grant the user specific capabilities. You generally assign these capabilities by making the user a member of one or more groups, thus giving the user the capabilities of these groups. You then assign additional capabilities by making a user a member of the appropriate groups. You withdraw capabilities by removing group membership.
In Windows 2000, you can assign various types of capabilities to an account. These capabilities include
Privileges A type of user right that grants permissions to perform specific administrative tasks. You can assign privileges to both user and group accounts. An example of a privilege is the ability to shut down the system.
Logon rights A type of user right that grants logon permissions. You can assign logon rights to both user and group accounts. An example of a logon right is the ability to log on locally.
Built-in capabilities A type of user right that is assigned to groups and includes the automatic capabilities of the group. Built-in capabilities are predefined and unchangeable, but they can be delegated to users with permission to manage objects, organizational units, or other containers. An example of a built-in capability is the ability to create, delete, and manage user accounts. This capability is assigned to administrators and account Operators. Thus, if a user is a member of the Administrators group, the user can create, delete, and manage user accounts.
Access permissions A type of user right that defines the operations that can be performed on network resources. You can assign access permissions to users, computers, and groups. An example of an access permission is the ability to create a file in a directory. Access permissions are discussed in Chapter 13.
As an administrator, you'll be dealing with account capabilities every day. To help track built-in capabilities, refer to the sections that follow. Keep in mind that while you can't change the built-in capabilities of a group, you can change the default rights of a group. For example, an administrator could revoke network access to a computer by removing a group's right to access the computer from the network.
Privileges
A privilege is a type of user right that grants permissions to perform a specific administrative task. You assign privileges through group policies, which can be applied to individual computers, organizational units, and domains. Although you can assign privileges to both users and groups, you'll usually want to assign privileges to groups. In this way, users are automatically assigned the appropriate privileges when they become members of a group. Assigning privileges to groups also makes it easier to manage user accounts.
Table 7-5 provides a brief summary of each of the privileges that can be assigned to users and groups. To learn how to assign privileges, see Chapter 8.
Table 7-5 Windows 2000 Privileges for Users and Groups
Privilege |
Description |
---|---|
Act as part of the operating system |
Allows a process to authenticate as any user and gain access to resources as any user. Processes that require this privilege should use the LocalSystem account, which already has this privilege. |
Add workstations to domain |
Allows users to add computers to the domain. |
Back up files and directories |
Allows users to back up the system regardless of the permissions set on files and directories. |
Bypass traverse checking |
Allows users to pass through directories while navigating an object path regardless of permissions set on the directories. The privilege doesn't allow the user to list directory contents. |
Change the system time |
Allows users to set the time for the system clock. |
Create a pagefile |
Allows users to create and change paging file size for virtual memory. |
Create a token object |
Allows processes to create token objects that can be used to gain access to local resources. Processes that require this privilege should use the LocalSystem account, which already has this privilege. |
Create permanent shared objects |
Allows processes to create directory objects in the Windows 2000 object manager. Most components already have this privilege and it's not necessary to specifically assign it. |
Debug programs |
Allows users to perform debugging. |
Enable user and computer accounts to be trusted for delegation |
Allows users and computers to change or apply the trusted-for-delegation setting, provided they have write access to the object. |
Force shutdown of a remote system |
Allows users to shut down a computer from a remote location on the network. |
Generate security audits |
Allows processes to make security log entries for auditing object access. |
Increase quotas |
Allows processes to increase the processor quota assigned to other process, provided they have write access to the process. |
Increase scheduling priority |
Allows processes to increase the scheduling priority assigned to other processes, provided they have write access to the processes. |
Load and unload device drivers |
Allows users to install and uninstall plug-and-play device drivers. This doesn't affect device drivers that aren't plug-and-play, which can only be installed by administrators. |
Lock pages in memory |
In Windows NT, allowed processes to keep data in physical memory, preventing the system from paging data to virtual memory on disk. Not used in Windows 2000. |
Manage auditing and security log |
Allows users to specify auditing options and access the security log. You must turn on auditing in the group policy first. |
Modify firmware environment values |
Allows users and processes to modify system environment variables. |
Profile a single process |
Allows users to monitor the performance of nonsystem processes. |
Profile system performance |
Allows users to monitor the performance of system processes. |
Remove computer from docking station |
Allows users to unlock a computer |
Replace a process-level token |
Allows processes to replace the default token for subprocesses. |
Restore files and directories |
Allows users to restore backed up files and directories, regardless of the permissions set on files and directories. |
Shut down the system |
Allows users to shut down the local computer. |
Synchronize directory service data |
Allows users to synchronize directory service data on domain controllers. |
Take ownership of files |
Allows users to take ownership of any or other objects Active Directory objects. |
Logon Rights
A logon right is a type of user right that grants logon permissions. You can assign logon rights to both user and group accounts. As with privileges, you assign logon rights through group policies and you'll usually want to assign logon rights to groups rather than individual users.
Table 7-6 provides a brief summary of each of the logon rights that can be assigned to users and groups. To learn how to assign logon rights, see Chapter 8
Table 7-6 Windows 2000 Logon Rights for Users and Groups
Logon Right |
Description |
---|---|
Access this computer from the network |
Allows users to connect to the computer over the network. By default, this privilege is granted to Administrators, Everyone, and Power Users. |
Deny access to this computer from the network |
Denies remote access to the computer. |
Deny logon as batch job |
Denies the right to log on through a batch job or script. |
Deny logon as service |
Denies the right to log on as a service. |
Deny logon locally |
Denies the right to log on to the computer's keyboard. |
Log on as a batch job |
Allows users to log on using a batch-queue facility. This capability is not supported in the current release of Windows 2000. By default, this privilege is granted to Administrators. |
Log on as a service |
Allows a security principal to log on as a service, as a way of establishing a security context. The LocalSystem account always retains the right to log on as a service. Any service that runs under a separate account must be granted this right. By default, this right is not granted to anyone. |
Log on locally |
Allows users to log on at the computer's keyboard. By default, this right is granted to Administrators, Account Operators, Backup Operators, Print Operators, and Server Operators. |
Built-In Capabilities for Groups in Active Directory
The built-in capabilities for groups in Active Directory are fairly extensive. The tables that follow summarize the most common capabilities that are assigned by default. Table 7-7 shows the default user rights for groups in Active Directory domains. This includes both privileges and logon rights. Note that any action that's available to the Everyone group is available to all groups, including the Guests group. This means that although the Guests group doesn't have explicit permission to access the computer from the network, Guests can still access the system because the Everyone group has this right.
Table 7-7 Default User Rights for Groups in Active Directory
User Right |
Groups Assigned |
---|---|
Access this computer from the network |
Everyone |
Add workstations to domain |
Administrators |
Back up files and directories |
Administrators, Server Operators, Backup Operators |
Bypass traverse checking |
Everyone |
Change the system time |
Administrators, Server Operators |
Create a pagefile |
Administrators |
Debug programs |
Administrators |
Force shutdown from a remote system |
Administrators, Server Operators |
Increase quotas |
Administrators |
Increase scheduling priority |
Administrators |
Load and unload device drivers |
Administrators |
Log on locally |
Administrators, Server Operators, Account Operators, Backup Operators, Print Operators |
Manage auditing and security log |
Administrators |
Modify firmware environment variables |
Administrators |
Profile a single process |
Administrators |
Profile system performance |
Administrators |
Remove computer from docking station |
Administrators |
Restore files and directories |
Administrators, Server Operators, Backup Operators |
Shut down the system |
Administrators, Server Operators, Account Operators, Backup Operators, Print Operators |
Take ownership of files or other objects |
Administrators |
Table 7-8 shows the default user rights for local groups on member servers and workstations. Again, this includes both privileges and logon rights. Note that on these systems, Power Users have privileges that normal users don't.
Table 7-8 Default User Rights for Local Groups
User Right |
Groups Assigned |
---|---|
Access this computer from the network |
Administrators, Power Users, Everyone |
Back up files and directories |
Administrators, Backup Operators |
Bypass traverse checking |
Everyone |
Change the system time |
Administrators, Power Users |
Create a pagefile |
Administrators |
Debug programs |
Administrators |
Force shutdown from a remote system |
Administrators |
Increase quotas |
Administrators |
Increase scheduling priority |
Administrators |
Load and unload device drivers |
Administrators |
Log on locally |
Administrators, Backup Operators, Power Users, Users, Everyone, Guests |
Manage auditing and security log |
Administrators |
Modify firmware environment variables |
Administrators |
Profile a single process |
Administrators, Power Users |
Profile system performance |
Administrators |
Remove computer from docking station |
Administrators, Power Users, Users |
Restore files and directories |
Administrators, Backup Operators |
Shut down the system |
Administrators, Backup Operators, Power Users, Users |
Take ownership of files or other objects |
Administrators |
Table 7-9 summarizes capabilities that can be delegated to other users and groups. As you study the table, note that restricted accounts include the Administrator user account, the user accounts of administrators, and the group accounts for Administrators, Server Operators, Account Operators, Backup Operators, and Print Operators. Because these accounts are restricted, Account Operators can't create or modify them.
Table 7-9 Other Capabilities for Built-In and Local Groups
Task |
Description |
Group Normally Assigned |
---|---|---|
Assign user rights |
Allows users to assign user rights to other users |
Administrators |
Create, delete, and manage user accounts |
Allows users to administer domain user accounts |
Administrators, Account Operators |
Modify the membership of a group |
Allows users to add and remove users from domain groups |
Administrators, Account Operators |
Create and delete groups |
Allows users to create a new group and delete existing groups |
Administrators, Account operators |
Reset passwords on user accounts |
Allows users to reset passwords on user accounts |
Administrators, Account Operators |
Read all user information |
Allows users to view user account information |
Administrators, Server Operators, Account Operators |
Manage group policy links |
Allows users to apply existing group policies to sites, domains, and organizational units for which they have write access to the related objects |
Administrators |
Manage printers |
Allows users to modify printer settings and manage print queues |
Administrators, Server Operators, Printer Operators |
Create and delete printers |
Allows users to create and delete printers |
Administrators, Server Operators, Printer Operators |