The information in this article applies to:
The text below defines the advanced user rights that the Windows NT User Manager controls. To administer these rights, run User Manager and choose User Rights from the Policies menu. Then choose Show Advanced User Rights. The advanced user rights are as follows: To Act as Part of the Operating System
The user can act as a trusted part of the operating system. Some
subsystems have this privilege granted to them.
Bypass Traverse Checking
The user can traverse a directory tree even if the user has no other
rights to access that directory. Denies access to users in POSIX
applications.
Create a Pagefile
The user can create a pagefile.
Create a Token Object
The user can create access tokens. Only the Local Security Authority
can have this privilege.
Create Permanent Shared Objects
The user can create special permanent objects used in Windows NT, such
as \\Device. For more information, please refer to the book "Inside
Windows NT" (Microsoft Press).
Debug Programs
The user can debug applications.
Generate Security Audits
The user can generate audit-log entries.
Increase Quotas
The user can increase object quotas. Each object has a quota assigned
to it.
Increase Scheduling Priority
The user can boost the scheduling priority of a process.
Load and Unload Device Drivers
The user can load and unload device drivers.
Lock Pages in Memory
The user can lock pages in memory to prevent them from being paged out
into backing store (such as PAGEFILE.SYS).
Log on as a Batch Job
The user can log on to the system as a batch queue facility. This is a
group identifier (S-1-5-3).
Log on as a Service
The user can perform security services (S-1-5-4). The user that
performs replication logs on as a service.
Modify Firmware Environment Variables
The user can modify system environment variables (not user environment
variables).
Profile Single Process
The user can use Windows NT profiling capabilities to observe a
process.
Profile System Performance
The user can use Windows NT profiling capabilities to observe the
system.
Receive Unsolicited Device Input
The user can read unsolicited data from a terminal device.
Replace a Process Level Token
The user can modify a process' access token.
Additional query words: prodnt rights adv event 576 audit category
Keywords : kbnetwork |
Last Reviewed: August 26, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |