ID: q101366
The text below defines the advanced user rights that the Windows NT User Manager controls. To administer these rights, run User Manager and choose User Rights from the Policies menu. Then choose Show Advanced User Rights.
The advanced user rights are as follows:
SE_TCB_NAME SeTcbPrivilege
The user can act as a trusted part of the operating system. Some subsystems have this privilege granted to them.
SE_CHANGE_NOTIFY_NAME SeChangeNotifyPrivilege
The user can traverse a directory tree even if the user has no other rights to access that directory. Denies access to users in POSIX applications.
SE_CREATE_PAGEFILE_NAME SeCreatePagefilePrivilege
The user can create a pagefile.
SE_CREATE_TOKEN_NAME SeCreateTokenPrivilege
The user can create access tokens. Only the Local Security Authority can have this privilege.
SE_CREATE_PERMANENT_NAME SeCreatePermanentPrivilege
The user can create special permanent objects used in Windows NT, such as \\Device. For more information, please refer to the book "Inside Windows NT" (Microsoft Press).
SE_DEBUG_NAME SeDebugPrivilege
The user can debug applications.
SE_AUDIT_NAME SeAuditPrivilege
The user can generate audit-log entries.
SE_INCREASE_QUOTA_NAME SeIncreaseQuotaPrivilege
The user can increase object quotas. Each object has a quota assigned to it.
SE_INC_BASE_PRIORITY_NAME SeIncreaseBasePriorityPrivilege
The user can boost the scheduling priority of a process.
SE_LOAD_DRIVER_NAME SeLoadDriverPrivilege
The user can load and unload device drivers.
SE_LOCK_MEMORY_NAME SeLockMemoryPrivilege
The user can lock pages in memory to prevent them from being paged out into backing store (such as PAGEFILE.SYS).
SECURITY_BATCH_RID SeBatchSid
The user can log on to the system as a batch queue facility. This is a group identifier (S-1-5-3).
SECURITY_SERVICE_RID SeServiceSid
The user can perform security services (S-1-5-4). The user that performs replication logs on as a service.
SE_SYSTEM_ENVIRONMENT_NAME SeSystemEnvironmentPrivilege
The user can modify system environment variables (not user environment variables).
SE_PROF_SINGLE_PROCESS_NAME SeProfileSingleProcessPrivilege
The user can use Windows NT profiling capabilities to observe a process.
SE_SYSTEM_PROFILE_NAME SeSystemProfilePrivilege
The user can use Windows NT profiling capabilities to observe the system.
SE_UNSOLICITED_INPUT_NAME SeUnsolicitedInputPrivilege
The user can read unsolicited data from a terminal device.
SE_ASSIGNPRIMARYTOKEN_NAME SeAssignPrimaryTokenPrivilege
The user can modify a process' access token.
Additional query words: prodnt rights adv event 576 audit category
Keywords : kbnetwork
Version : 3.1
Platform : WINDOWS
Last Reviewed: August 13, 1998