Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Of course you know that an Access Control List (ACL) is used to prevent (or allow) people from accessing resources. But what you may not know is how the OS really manages them. This session is an in-depth look at how ACL work. Understanding ACLs at a bits-by-bits level is an integral part of authoring security policies and is a job requirement for security architects.
https://www.microsoft.com/emea/spotlight/sessionh.aspx?videoid=101