Guest User

Untitled

a guest
Feb 11th, 2016
1,684
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.30 KB | None | 0 0
  1. Policy Security Setting
  2. Access Credential Manager as a trusted caller
  3. Access this computer from the network Everyone,Administrators,Users,Backup Operators
  4. Act as part of the operating system
  5. Add workstations to domain
  6. Adjust memory quotas for a process LOCAL SERVICE,NETWORK SERVICE,Administrators
  7. Allow log on locally Administrators,Users,Backup Operators
  8. Allow log on through Remote Desktop Services Administrators,Remote Desktop Users
  9. Back up files and directories Administrators,Backup Operators
  10. Bypass traverse checking Everyone,LOCAL SERVICE,NETWORK SERVICE,Administrators,Users,Backup Operators,Window Manager\Window Manager Group
  11. Change the system time LOCAL SERVICE,Administrators
  12. Change the time zone LOCAL SERVICE,Administrators
  13. Create a pagefile Administrators
  14. Create a token object
  15. Create global objects LOCAL SERVICE,NETWORK SERVICE,Administrators,SERVICE
  16. Create permanent shared objects
  17. Create symbolic links Administrators
  18. Debug programs Administrators
  19. Deny access to this computer from the network
  20. Deny log on as a batch job
  21. Deny log on as a service
  22. Deny log on locally
  23. Deny log on through Remote Desktop Services
  24. Enable computer and user accounts to be trusted for delegation
  25. Force shutdown from a remote system Administrators
  26. Generate security audits LOCAL SERVICE,NETWORK SERVICE
  27. Impersonate a client after authentication LOCAL SERVICE,NETWORK SERVICE,Administrators,SERVICE
  28. Increase a process working set Users,Window Manager\Window Manager Group
  29. Increase scheduling priority Administrators
  30. Load and unload device drivers Administrators
  31. Lock pages in memory
  32. Log on as a batch job Administrators,Backup Operators,Performance Log Users
  33. Log on as a service NT SERVICE\ALL SERVICES
  34. Manage auditing and security log Administrators
  35. Modify an object label
  36. Modify firmware environment values Administrators
  37. Perform volume maintenance tasks Administrators
  38. Profile single process Administrators
  39. Profile system performance Administrators,NT SERVICE\WdiServiceHost
  40. Remove computer from docking station Administrators
  41. Replace a process level token LOCAL SERVICE,NETWORK SERVICE
  42. Restore files and directories Administrators,Backup Operators
  43. Shut down the system Administrators,Backup Operators
  44. Synchronize directory service data
  45. Take ownership of files or other objects Administrators
Advertisement
Add Comment
Please, Sign In to add comment