Lesson 9 of 60 beginner

Accounts, Profiles & Permissions

Who the user is changes everything

Open interactive version (quiz + challenge)

Real-world analogy

Accounts are badges. A lobby badge lets you into the lobby. An executive badge opens the executive floor. An admin badge opens every door but also logs every step. In enterprise IT, giving the wrong badge is a security incident.

What is it?

This module is how identity, membership, and permission combine in Windows and corporate environments. It’s the entry point to Active Directory (lesson 14+) and the single most tested topic in support/sysadmin interviews.

Real-world relevance

A new marketing hire can’t open the team’s shared drive. A junior adds them individually to the folder. A sysadmin adds them to the ‘Marketing-RW’ security group, which already has the correct share+NTFS permissions. Same ticket, different career trajectory.

Key points

Code example

// Safe permission troubleshooting — the 4 layers

1. Identity layer
   - Is the user the correct account? (not a personal or test account)
   - whoami  /  whoami /groups

2. Membership layer
   - Which groups is the user in?
   - Is the group the one actually granted access?

3. Share layer
   - \\server\share  -> Share permissions tab

4. File system layer
   - NTFS -> right-click -> Properties -> Security -> Effective Access

Effective access = intersection of share AND NTFS for the identity.
Most restrictive wins.

Line-by-line walkthrough

  1. 1. Four layers of permission troubleshooting
  2. 2. Identity layer header
  3. 3. Check the actual account being used
  4. 4. Blank separator
  5. 5. Membership layer header
  6. 6. Inspect group membership
  7. 7. Blank separator
  8. 8. Share layer header
  9. 9. Share permissions path
  10. 10. Blank separator
  11. 11. File system layer header
  12. 12. NTFS effective access path
  13. 13. Blank separator
  14. 14. Rule: intersection of share and NTFS wins

Spot the bug

Issue: User says 'I can’t access the HR folder.'
Junior adds the user directly to the folder’s ACL with Full Control.
Two weeks later, an audit flags the folder for over-permissioning.
Need a hint?
What was the structurally safer design choice?
Show answer
Never grant direct user-level Full Control on shared folders. Add the user to the existing HR security group that already has appropriate rights (or create one if missing). Follow least privilege (Read, Modify — not Full Control unless required). Document the access request.

Explain like I'm 5

You have a badge. Your badge opens some doors, not all. Groups are like departments — you get in because your department can, not because you’re special. Giving everyone the master key looks friendly until something gets stolen.

Fun fact

In Active Directory’s ‘AGDLP’ model: Accounts go into Global groups, Global groups go into Domain Local groups, Domain Local groups get Permissions. This sounds bureaucratic — and it is — but it scales cleanly and survives audits.

Hands-on challenge

On your own machine, run: whoami, whoami /groups, net localgroup Administrators. Note which groups you belong to. Compare to a standard user account if you have one. Write a 3-line summary of what the differences mean.

More resources

Open interactive version (quiz + challenge) ← Back to course: IT Jobs Bootcamp