
Microsoft
®
Windows Server
™
2003 White Paper
Windows NT 4.0 Server Upgrade Guide 85
• LocalSystem. The LocalSystem account is a predefined, local account set to provide extensive
privileges on the local computer. It acts as the computer on the network. The name of the account
is LocalSystem. This account does not have a traditional password.
• LocalService. The LocalService account is a predefined, local account set to use minimum
privileges on the local computer and present anonymous credentials on the network. The name of
the account is NT AUTHORITY\LocalService. This account does not have a traditional password.
• NetworkService. The NetworkService account is a predefined, local account set to provide
minimum privileges on the local computer. It acts as the computer on the network. The name of
the account is NT AUTHORITY\NetworkService. This account does not have a traditional
password.
Figure 37. DNS Client Properties Log On tab
The three built-in accounts are designed for system activities and cannot be used for interactive
access, unlike a user-defined service account, which can be used by anyone who has the
password. The built-in accounts have no passwords to manage. Windows 2000 and Windows
Server 2003 automatically change the password for the built-in accounts. The password is not
based on a dictionary word, making it harder to hack. The resulting password is more secure than
the values administrators typically generate, because the operating system randomly generates
the password and automatically changes it on a frequent basis.
To find these accounts using Active Directory, open Active Directory Users and Computers.
Make sure to enable Advanced Features using the View menu in this snap-in. Then open
ForeignSecurityPrincipals to see a list of objects as Figure 38 shows. Expand the readable
name field to see the human-readable names of these objects instead of the computer name.
Comentarios a estos manuales