123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

To Transfer Ownership Of An Object

Profile Picture
By Author: Alyssa
Total Articles: 128
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In 70-297 Exam(http://www.mcse-70-297.com) , you set inheritance for the permissions you assigned to the Sales group for the East OU in Exercise 1. First, you set the permissions to be inherited by all child objects. Then, you set the permissions to be inherited only by immediate child objects. You check the results of your inheritance settings.

To transfer ownership of an object, complete the following steps:

1.Click Start, point to Administrative Tools, and then click Active Directory Users And Computers. On the View menu, ensure that Advanced Features is selected.
Right-click the object for which you want to transfer ownership and click Properties.
2.In the Properties dialog box for the object, click the Security tab. Click Advanced.
3.In the Advanced Security Settings dialog box for the object, click the Owner tab.
4. In the Owner tab, shown in Figure 9-11, click the new owner in the Change Owner To box or, if the owner is not listed, click the Other Users Or Groups but¬ton to browse for the new owner. Click OK.


Practice: Controlling Access to Active Directory Objects
...
... In this practice, you assign standard and special permissions for an object, set inheritance for the permissions, and remove security principals and their permissions from an object.
Exercise 1: Assigning Standard and Special Permissions
In these free Cisco certification practice questions(http://www.examshots.com) , you assign a standard permission and a special permission to the Sales group for the East OU.
To assign standard and special permissions
1. Log on to Serverl as Administrator.
2. On Serverl, use the procedure provided earlier in this lesson to assign the Full Control standard permission to the Sales group for the Hast OU.
3. Use the procedure provided earlier in this lesson to edit the special permissions already assigned to the Sales group for the East OU. Change the special permis¬
sions to not allow the Modify Owner permission.
4. Access the Security tab in the Properties dialog box for the East OU. The Sales group should be listed in the Group Or User Names box.
5. Access the Security tab in the Properties dialog box for the Chicago OU. Is the Sales group listed in the Group Or User Names box? Why or why not?
No, the Sales group is not listed for the Chicago OU because inheritance has not been set.
6. Access the Security tab in the Properties dialog box for User One in the Chicago OU. Is the Sales group listed in the Group Or User Names box? Why or why not?
No, the Sales group is not listed for User One in the Chicago OU because inheritance has not been set.
In this practice, you assign standard and special permissions for an object, set inheritance for the permissions, and remove security principals and their permissions from an object.

Among those IT Exams(http://www.buyitexam.com) , you set inheritance for the permissions you assigned to the Sales group for the East OU in Exercise Firstly, you set the permissions to be inherited by all child objects. Then, you set the permissions to be inherited only by immediate child objects. You check the results of your inheritance settings.

Total Views: 131Word Count: 499See All articles From Author

Add Comment

Computers Articles

1. 5 Must-have Features For Your Support Portal Solution
Author: Maulik Shah

2. What Are Apis And How To Protect Api Vulnerabilities?
Author: sowmya

3. How Fraud Detection System (fds) Works With Ai Technology
Author: sowmya

4. What Are Cyber-physical Attacks And How Dangerous Are They?
Author: sowmya

5. What Is Ransomware Forensics
Author: sowmya

6. How Does A Penetration Testing Service Work?
Author: sowmya

7. The Most Effective Method To Secure An Ecommerce Website
Author: sowmya

8. How To Make Your Computer Run Like New
Author: Vikas

9. Hubbroker : Championing Agility: Leading The Industry Through Ecosystem Integration
Author: Jenna Shah

10. What One Needs To Figure Out About Laptops
Author: subhan basha

11. Ip For High Performance Computing-socs For Artificial Intelligence-high Speed Chip-to-chip Interface Protocol
Author: Guru

12. 3 Major Challenges That An It Helpdesk Agent Faces And How To Resolve Them
Author: Maulik Shah

13. How To Keep Your Important Files Safe
Author: Isabella Whitmore

14. Ransomware Detection Through Threat Hunting
Author: sowmya

15. Advantages Of Cloud Infrastructure Security
Author: sowmya

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: