DESKTOP

Windows 8 : User Accounts (part 4) - Advanced User Management with Control Panel

11/27/2014 3:54:52 AM

Advanced User Management with Control Panel

PC Settings is cute and everything, but if you want to dive into the nitty-gritty of user account management, you’ll need to visit the old-school Control Panel interface instead. And yes, you still want to know about this interface even if you’re not particularly interested in advanced features. And that’s because there are certain things related to account management that you can only do from Control Panel.

For example, the very first account you create with Windows 8 is always an administrator-class account, and that’s true whether that account is a Microsoft account, as recommended, or a traditional local account. But when you create other accounts, as explained earlier, those accounts are not administrator-type accounts. And the Metro-style PC Settings interface doesn’t offer any way to change them.

But Control Panel does. In fact, Control Panel provides so much additional functionality with regards to user accounts that it seems a shame to ignore it.

Of course, you need to find it first. The easiest way is via Start Search: Display the Start screen, type user, select the Settings filter in the right pane, and then choose User Accounts in the results list. This displays the old-school User Accounts control panel, as shown in Figure 7.

Figure 7: User Accounts control panel

c12f007_fmt

Here are some of the user account–related tasks you can only complete using Control Panel:

If you have only configured one user account, you cannot, however, change it from an administrator-type account to a standard user account. You must always have one administrator configured on the PC.

  • Change an account type: As noted previously, the first account you configure on your PC—whether it’s a Microsoft account or a local user account—is an administrator-type account. But what about subsequent accounts? As it turns out, all subsequent account additions—be they Microsoft or local accounts—are created as standard users, not administrators. This may be desirable, but if you’d like to change an account from one type to the other, you can do so.

To change an account’s type, click the link Manage another account in the User Accounts control panel. This will change the display to resemble Figure 8, where you can choose an account to change.

Figure 8: The Manage Accounts interface lets you configure user accounts.

c12f008_fmt

When working with a local account, you can also use this screen to change the account name, create or change the password, set up parental controls, or delete the account.

Select the account you wish to modify to display a screen like that in Figure 9. Here, you can see a secondary Microsoft account that was automatically configured as a standard account type when it was added to the system.

Figure 9: If it doesn’t say Administrator above “Password protected,” it’s not an administrator.

c12f009_fmt

When working with a Microsoft account, you can also use this screen to set up parental controls or delete the account (from the PC).

Click the Change the account type link, choose Administrator, and then click the Change Account Type button. Now, you can see as in Figure 10, that this other Microsoft account is an administrator too.

Figure 10: The secondary Microsoft account has been transformed from peasant to lord.

c12f010_fmt
  • Manage User Account Control: In Windows Vista, Microsoft introduced what was then a very controversial feature called User Account Control, or UAC, which took advantage of Microsoft’s efforts to componentize Windows by dividing each of the system’s functional entities, or components, into one of two groups: those that require administrative privileges and those that don’t. Those that don’t would just work and you could just go about your day and not really think about the security implications of anything underpinning the system.

But then there are those other components that do require an administrator-class account to actually work. Those components are a bit trickier. These components will trigger a UAC dialog, or prompt, that must be bypassed before you can continue whatever task you are trying to complete.

UAC is theoretically annoying, but it’s been refined over the past two Windows versions to be, well, less noisy. That is, it doesn’t rear its head very often anymore, and if you’re logged in with administrator privileges—and chances are, you are—it will rarely do more than interject a small “Are you sure?” type dialog to interrupt your workflow.

This interruption will vary according to what you’re trying to do—a UAC prompt appears when you try to install an application, for example—and according to what type of user account you’re using. But the important thing to note is that the presentation of UAC prompts hasn’t really changed since Windows 7. So unless you’ve been using Windows XP for the past few years, you already get the drill. It works much as it did in Windows 7 and is much less annoying than it was in Windows Vista.

Configuring User Account Control works as it did in Windows 7, via the User Account Control Settings control panel. So there’s no need to waste time on it: UAC works as before, isn’t annoying, and shouldn’t be messed with.

NOTE Okay, there is one interesting side note about UAC in Windows 8: One place you’ll never see this prompt is in any of Windows 8’s Metro experiences. That’s because UAC is a desktop technology, and the Metro environment has its own more pervasive protections built in and designed to protect the OS from exactly the kinds of issues that UAC, too, is aimed at.

  • Enable and configure Family Safety: Microsoft first provided pervasive Windows-based parental controls functionality in Windows Vista, providing parents with a way to create and enforce settings related to computer usage, including a web filter (for allowing and disallowing individual websites and downloading), time limits, games, and applications (including which can and cannot be used).

Parental controls are not available when you sign in as a domain user.

In Windows 8, Microsoft is carrying forward the parental control functionality from its predecessor, and it works almost exactly the same way, with a few useful improvements. Parental controls, called Family Safety in Windows 8, can be applied only to non-administrator accounts—including Microsoft accounts, which is indeed new to Windows 8—and is administered one account at a time.

There are two ways to add parental controls to an account. You may recall that when you add a new account to the system, it’s silently created as a standard user account, and not as an administrator. So as an added nicety, Windows 8 provides a check box option, shown in Figure 11, which lets you enable Family Safety right when the account is created.

Figure 11: You can enable parental controls when you add a new account to the PC.

c12f011_fmt

Or, you can add parental controls to an account after it has been created. To do so, select Manage another account from the main User Accounts control panel, select the account you want to manage, and then select Set up Family Safety. The Family Safety interface resembles Figure 12.

Figure 12: Family Safety helps you protect your children online and on the PC.

c12f012_fmt

If you’re familiar with the parental controls functionality that was included in Windows 7, all of the functionality from that release carries over into Windows 8. But there are a few useful additions in this release, too. For example, where the Windows 7 parental controls allowed you to specify the hours of each day that the child could use the PC—this feature is now called “curfew”—Windows 8 adds the ability to limit how many hours they can use the PC each day as well. Additionally, Family Safety integrates with Windows Store so you can see and control which Metro-style apps and games your child downloads, based on country-specific ratings; in the United States, we use ESRB (Entertainment Software Ratings Board) ratings.

  • Enable the Guest account: While you can go to great lengths to protect standard user accounts with parental controls, sometimes all you’re looking for is a single, temporary user account with standard user privileges that anyone can use. As with previous Windows versions, Windows 8 includes such an account, called the Guest account, and it’s a safe and easy way to let others use your PC without worrying that they’re going to view, modify, or delete any crucial data, uninstall or change an application, or perform other dangerous tasks.

To enable the Guest account, select Manage another account from the main User Accounts control panel. Then, in the Manage Accounts screen, choose Guest. (Its icon will note that the Guest account is off.)

The control panel will ask you whether you’re sure you wish to enable this account, noting that password-protected files, folders, and settings are not accessible to guest users. Click Turn on to enable the Guest account.

Now, when you leave the computer, you can lock your account (easiest way: Winkey + L). And then your children or actual guests can browse the web, run apps, and perform other common duties using the Guest account while you’re away: A new Guest option will appear on the lock screen.

Remember that the Guest account is temporary to each sign-in. So when the user signs out of the Guest account, any settings changes or documents they’ve created will be deleted. Each time you sign in to the Guest account is like the first time that account is used, and nothing is retained.

  • Reset EAS Policies: When you sign in to a Windows 8 PC or device with a Microsoft account, you’re using a technology called Exchange ActiveSync (EAS) under the covers to provide push-based access to your Hotmail-based e-mail, calendar, contacts, and other data. EAS is a Microsoft-created corporate standard that is used by Hotmail and Microsoft’s Exchange- and Office 365-based services, and also by competing services from Apple, Google, and other companies. (In this way, it’s a de facto standard for all modern mobile devices.) And one of its big advantages is that it supports the notion of EAS policies, which can set restrictions on the device—smartphone, tablet, or PC—that you use to access the underlying services. For example, your workplace may want to ensure that you sign in with an account that has an acceptable password (from a length and complexity standpoint) and then auto-locks after a certain period of inactivity.

When you sign in with a Microsoft account, whatever restrictions Hotmail enforces are automatically applied to your PC. But this is only required if you are using Microsoft’s bundled Mail app. If you access Hotmail’s e-mail, calendar, and contacts from a Windows application, or from the web, you can decouple Hotmail’s EAS policy requirements from your PC. And, oddly enough, you do this from the User Accounts control panel: Just click Reset EAS Policies on the left, and you’ll see a window like the one shown in Figure 13.

Figure 13: You can reset EAS policies on your PC.

c12f013_fmt

The User Accounts Control Panel and Domain Accounts

If you sign in with a domain account—or on a PC for which a domain account has been configured—you’re going to see some different options in the User Accounts control panel.

While many of these options are only of interest to domain administrators, it’s worth pointing out one of the common tasks we mentioned earlier is managed using this interface: changing an account type. To change an account type, click Manage User Accounts. Instead of opening a new view in the User Accounts control panel window, you will see the old-school windows in Figure 14.

Figure 14: User Accounts management on a domain-based system.

c12f014_fmt

Now, select the account you want to change—and if you see two entries for one account, as you will for Microsoft accounts, choose the top one—and click Properties. Then just choose Standard user or Administrator from that window.

The easing of restrictions will apply until and unless you run the Mail, Calendar, People, or Messaging app(s) again. At that time, the EAS policies required by Hotmail will be simply be silently reapplied. If you sign in with a corporate account, however, it won’t be so silent: You’ll be prompted to accept the policies change.

Other  
  •  Installing and Configuring Windows Server 2008 R2 : Administration basics (part 2) - Windows Server 2008 R2 administration tools
  •  Installing and Configuring Windows Server 2008 R2 : Administration basics (part 1) - Microsoft Management Console 101, Overview of Server Manager
  •  Installing and Configuring Windows Server 2008 R2 : Automating the installation process - Installing and configuring WDS
  •  Installing and Configuring Windows Server 2008 R2 : Product activation and Key Management Services
  •  Installing and Configuring Windows Server 2008 R2 : Performing postinstallation tasks (part 5) - Configuring disk drives - Creating a RAID 5 volume
  •  Installing and Configuring Windows Server 2008 R2 : Performing postinstallation tasks (part 4) - Configuring disk drives - Creating a mirrored volume
  •  Installing and Configuring Windows Server 2008 R2 : Performing postinstallation tasks (part 3) - Configuring disk drives - Basic disks versus dynamic disks, Dynamic disk volumes
  •  Installing and Configuring Windows Server 2008 R2 : Performing postinstallation tasks (part 2) - Windows Server 2008 R2 roles
  •  Installing and Configuring Windows Server 2008 R2 : Performing postinstallation tasks (part 1) - Configuring initial settings, Understanding roles and features
  •  Review : Apple iMac with Retina 5K display
  •  
    Top 10
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
    OPEL MERIVA : Making a grand entrance
    FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
    BMW 650i COUPE : Sexy retooling of BMW's 6-series
    BMW 120d; M135i - Finely tuned
    PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
    PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
    Java Tutorials : Nested For Loop (part 2) - Program to create a Two-Dimensional Array
    Java Tutorials : Nested For Loop (part 1)
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS