The Microsoft® Windows® 2000 operating system protects files, applications, and other resources from unauthorized use. Although you might already know how to use tools to assign privileges or set permissions, understanding what privileges and permissions really are, why they are necessary, and how they function can help you manage shared resources effectively. Understanding these processes can also help you avoid unnecessary risks and troubleshoot any problems you might encounter.
In This Chapter
Access Check and Audit Generation
Related Information in the Resource Kit
For information about how to diagnose, troubleshoot and recover Active Directory, see "Active Directory Diagnostics, Troubleshooting, and Recovery" in this book.
For information about authentication, see "Authentication" in this book.
For information about user rights, see the appendix "User Rights" in this book.
For information about well-known security identifiers, see the appendix "Well-Known Security Identifiers" in this book.