WinSecWiki > Security Settings > Local Policies > User Rights > User Rights In-Depth

User Rights In-Depth

Child articles:

  • Access this computer from the network
  • Act as part of the operating system
  • Add workstations to domain
  • Adjust memory quotas for a process
  • Allow log on locally
  • Allow logon through Terminal Services
  • Back up files and directories
  • Bypass traverse checking
  • Change the system time
  • Create a pagefile
  • Create a token object
  • Create global objects
  • Create permanent shared objects
  • Debug programs
  • Deny access to this computer from the network
  • Deny logon as a batch job
  • Deny logon as a service
  • Deny logon locally
  • Deny logon through Terminal Services
  • Enable computer and user accounts to be trusted for delegation
  • Force shutdown from a remote system
  • Generate security audits
  • Impersonate a client after authentication
  • Increase scheduling priority
  • Load and unload device drivers
  • Lock pages in memory
  • Log on as a batch job
  • Log on as a service
  • Manage auditing and security log
  • Modify firmware environment values
  • Perform volume maintenance tasks
  • Profile single process
  • Profile system performance
  • Remove computer from docking station
  • Replace a process level token
  • Restore files and directories
  • Shut down the system
  • Synchronize directory service data
  • Take ownership of files and other objects

Back to top

 

Upcoming Webinars
    Additional Resources
      User Rights In-Depth
      •Access from Network
      •Act as OS
      •Add Workstations
      •Adjust Memory Quotas
      •Allow log on locally
      •Allow Terminal Services logon
      •Backup Files & Directories
      •Bypass traverse checking
      •Change the system time
      •Create a pagefile
      •Create a token object
      •Create global objects
      •Permanent shared objects
      •Debug programs
      •Deny network access
      •Deny logon as a batch job
      •Deny logon as a service
      •Deny logon locally
      •Deny Terminal Services logon
      •Enable trusted for delegation
      •Force shutdown remotely
      •Generate security audits
      •Impersonate a client
      •Increase scheduling priority
      •Load and unload device drivers
      •Lock pages in memory
      •Log on as a batch job
      •Log on as a service
      •Manage auditing and security log
      •Modify firmware values
      •Volume maintenance
      •Profile single process
      •Profile system performance
      •Remove from docking station
      •Replace process level token
      •Restore files and directories
      •Shut down the system
      •Sync directory service data
      •Take ownership of files & objects

       
       
      User name:
      Password:
        / Forgot?
        Register
      May 2025
      Patch Monday
      "Patch Tuesday - Seven "Important" Zero Days " - sponsored by Supercharger
      Home
      Tweet
      Follow @randyfsmith
      About | Newsletter | Contact Ultimate IT Security is a division of Monterey Technology Group, Inc. ©2006-2025 Monterey Technology Group, Inc. All rights reserved.
      Disclaimer: We do our best to provide quality information and expert commentary but use all information at your own risk. For complaints, please contact abuse@ultimatewindowssecurity.com.
      Terms of Use | Privacy |
      Cookies help us deliver the best experience on our website. By using our website, you agree to the use of cookies.