PSS ID Number: 101366
Article Last Modified on 11/20/2003
SE_TCB_NAME SeTcbPrivilegeThe user can act as a trusted part of the operating system. Some subsystems have this privilege granted to them.
SE_CHANGE_NOTIFY_NAME SeChangeNotifyPrivilegeThe user can traverse a directory tree even if the user has no other rights to access that directory. Denies access to users in POSIX applications.
SE_CREATE_PAGEFILE_NAME SeCreatePagefilePrivilegeThe user can create a pagefile.
SE_CREATE_TOKEN_NAME SeCreateTokenPrivilegeThe user can create access tokens. Only the Local Security Authority can have this privilege.
SE_CREATE_PERMANENT_NAME SeCreatePermanentPrivilegeThe user can create special permanent objects used in Windows NT, such as \\Device. For more information, please refer to the book "Inside Windows NT" (Microsoft Press).
SE_DEBUG_NAME SeDebugPrivilegeThe user can debug applications.
SE_AUDIT_NAME SeAuditPrivilegeThe user can generate audit-log entries.
SE_INCREASE_QUOTA_NAME SeIncreaseQuotaPrivilegeThe user can increase object quotas. Each object has a quota assigned to it.
SE_INC_BASE_PRIORITY_NAME SeIncreaseBasePriorityPrivilegeThe user can boost the scheduling priority of a process.
SE_LOAD_DRIVER_NAME SeLoadDriverPrivilegeThe user can load and unload device drivers.
SE_LOCK_MEMORY_NAME SeLockMemoryPrivilegeThe user can lock pages in memory to prevent them from being paged out into backing store (such as PAGEFILE.SYS).
SECURITY_BATCH_RID SeBatchSidThe user can log on to the system as a batch queue facility. This is a group identifier (S-1-5-3).
SECURITY_SERVICE_RID SeServiceSidThe user can perform security services (S-1-5-4). The user that performs replication logs on as a service.
SE_SYSTEM_ENVIRONMENT_NAME SeSystemEnvironmentPrivilegeThe user can modify system environment variables (not user environment variables).
SE_PROF_SINGLE_PROCESS_NAME SeProfileSingleProcessPrivilegeThe user can use Windows NT profiling capabilities to observe a process.
SE_SYSTEM_PROFILE_NAME SeSystemProfilePrivilegeThe user can use Windows NT profiling capabilities to observe the system.
SE_UNSOLICITED_INPUT_NAME SeUnsolicitedInputPrivilegeThe user can read unsolicited data from a terminal device.
SE_ASSIGNPRIMARYTOKEN_NAME SeAssignPrimaryTokenPrivilegeThe user can modify a process' access token.
Additional query words: prodnt rights adv event 576 audit category
Keywords: kbnetwork KB101366
Technology: kbWinNT310Search kbWinNTAdvSerSearch kbWinNTAdvServ310 kbWinNTS310 kbWinNTS310search kbWinNTsearch kbWinNTSsearch kbWinNTW310 kbWinNTW310Search kbWinNTWsearch