Practical Tasks - UD05
These tasks provide practical experience with user accounts, groups, and permissions in both Windows and Linux.Windows User Management
Task 1: Creating Local Users
Learn multiple methods for creating and managing local user accounts in Windows.Exercise 1: Settings App Method
Exercise 1: Settings App Method
Skip Microsoft Account
- Click “I don’t have this person’s sign-in information”
- Click “Add a user without a Microsoft account”
Exercise 2: Computer Management Method
Exercise 2: Computer Management Method
- Right-click Start → Computer Management
- Navigate to Local Users and Groups → Users
- Right-click Users → New User
- Create user “testuser2”
- Explore user properties
- Document group memberships
Exercise 3: PowerShell User Creation
Exercise 3: PowerShell User Creation
- Creates 5 local users (user01-user05)
- Sets passwords
- Adds them to “Users” group
- Generates a report of created users
New-LocalUser and Add-LocalGroupMember cmdletsTask 2: Group Management
Exercise 1: Create Department Groups
Exercise 1: Create Department Groups
- Create groups for:
- IT_Department
- HR_Department
- Finance_Department
- Assign appropriate users to each group
- Document group memberships
- Take screenshots
Exercise 2: Built-in Groups Analysis
Exercise 2: Built-in Groups Analysis
| Group Name | Purpose | Default Members | Recommended Use |
|---|---|---|---|
| Administrators | |||
| Users | |||
| Power Users | |||
| Remote Desktop Users | |||
| Backup Operators |
Task 3: NTFS Permissions
Exercise 1: Folder Permissions
Exercise 1: Folder Permissions
Create Folder Structure
- C:\CompanyData
- C:\CompanyData\Public
- C:\CompanyData\IT
- C:\CompanyData\HR
Set Permissions
- Public: Everyone can read
- IT: Only IT_Department can read/write
- HR: Only HR_Department can read/write
Exercise 2: Permission Inheritance
Exercise 2: Permission Inheritance
- Create C:\TestInheritance
- Set custom permissions on parent folder
- Create subfolders and files
- Observe inherited permissions
- Disable inheritance on one subfolder
- Document differences
Exercise 3: PowerShell Permissions
Exercise 3: PowerShell Permissions
- Creates folder C:\Scripts
- Sets Administrators: Full Control
- Sets Users: Read & Execute
- Removes inheritance
- Verifies permissions
Linux User Management
Task 4: Linux User Administration
Exercise 1: Create Users
Exercise 1: Create Users
- Create user “musician1” with
adduser - Create user “musician2” with
useradd(observe differences) - Set passwords for both
- Compare home directories
- Check /etc/passwd entries
Exercise 2: User Modification
Exercise 2: User Modification
- Change shell to /bin/zsh
- Change home directory
- Set account expiry date
- Add to sudo group
- Lock and unlock account
Exercise 3: Batch User Creation
Exercise 3: Batch User Creation
- Reads usernames from file (users.txt)
- Creates each user
- Sets default password
- Adds to “students” group
- Logs creation to file
Task 5: Linux Group Management
Exercise 1: Create Group Structure
Exercise 1: Create Group Structure
- Create all groups
- Assign users appropriately
- Verify with
groupscommand - Check /etc/group
Exercise 2: Group Collaboration
Exercise 2: Group Collaboration
Task 6: Linux File Permissions
Exercise 1: Permission Basics
Exercise 1: Permission Basics
- Create test files and directories
- Set various permissions using symbolic mode:
chmod u+x,g+w,o-r file1chmod ug+rw,o-rwx file2
- Set permissions using numeric mode:
chmod 755 script.shchmod 644 document.txtchmod 700 private_dir
- Change ownership
- Verify with
ls -l
Exercise 2: Permission Scenarios
Exercise 2: Permission Scenarios
- Owner: www-data
- Group: developers
- Developers can read/write
- Web server can read/execute
- Others: no access
- Only root can write
- backup_operators group can read
- Log files created are group-writable
- All project members can read/write/execute
- Files created inherit project group
- Non-members cannot access
Exercise 3: Special Permissions
Exercise 3: Special Permissions
-
SUID Exercise:
- Create a script that reads /etc/shadow
- Set SUID bit (careful!)
- Test as regular user
- Remove SUID
-
SGID Exercise:
- Create shared directory
- Set SGID
- Create files from different users
- Verify group ownership
-
Sticky Bit Exercise:
- Create /tmp/shared
- Set sticky bit
- Multiple users create files
- Attempt to delete others’ files
Exercise 4: umask Configuration
Exercise 4: umask Configuration
- Check current umask
- Calculate resulting permissions
- Change umask to 022
- Create files and directories
- Change umask to 002
- Create files and directories
- Compare results
- Make umask permanent in ~/.bashrc
Cross-Platform Challenges
Task 7: Documentation Project
Exercise 1: Permission Comparison
Exercise 1: Permission Comparison
| Feature | Windows NTFS | Linux (ext4) |
|---|---|---|
| Permission types | ||
| Granularity | ||
| Inheritance | ||
| Special permissions | ||
| Default permissions | ||
| Command-line tools | ||
| GUI tools |
Task 8: Una Noche en la Opera
This is a comprehensive practical exercise combining users, groups, and permissions.Scenario Description
Scenario Description
- Musicians (30 users)
- Technical Staff (10 users)
- Administration (5 users)
- Management (3 users)
- Each department has private directory
- Shared “Scores” directory (musicians read/write, others read-only)
- “Administration” directory (admin: read/write, management: read)
- “Management” directory (management only)
- Public announcements (everyone reads, admin writes)
Task 9: Security Audit
Exercise 1: Permission Audit Script
Exercise 1: Permission Audit Script
- Lists all users
- Shows group memberships
- Identifies users with admin privileges
- Finds world-writable files
- Lists SUID/SGID files
- Checks for users without passwords
- Generates security report
Advanced Challenges
Challenge 1: Dynamic Permission Manager
Create a script that:- Reads permission configuration from JSON/YAML
- Applies permissions to file structure
- Validates configuration before applying
- Rolls back on errors
- Logs all changes
Challenge 2: User Lifecycle Automation
Create scripts to automate: Onboarding:- Create user account
- Add to appropriate groups
- Create home directory structure
- Set default permissions
- Send welcome email
- Disable account
- Backup user data
- Remove from groups
- Archive home directory
- Generate exit report
Challenge 3: Compliance Reporter
Create a tool that:- Scans file system for permission violations
- Checks against security policy
- Generates compliance report
- Suggests remediation actions
- Tracks changes over time
Submission Guidelines
- All scripts in a ZIP file (UD05_Tasks_YourName.zip)
- Screenshots for GUI exercises
- Command history for CLI exercises
- Completed tables and documentation
- README.md with:
- How to run each script
- Test results
- Challenges encountered
- Solutions implemented
Grading Criteria
| Criteria | Points |
|---|---|
| User management correctness | 25% |
| Group organization | 20% |
| Permission configuration | 25% |
| Scripts functionality | 20% |
| Documentation | 10% |