Share via

Access Control

The Microsoft® Windows® 2000 operating system protects files, applications, and other resources from unauthorized use. Although you might already know how to use tools to assign privileges or set permissions, understanding what privileges and permissions really are, why they are necessary, and how they function can help you manage shared resources effectively. Understanding these processes can also help you avoid unnecessary risks and troubleshoot any problems you might encounter.

In This Chapter

Access Control Model


Security Identifiers

Access Tokens

Security Descriptors

Access Control Lists


Access Check and Audit Generation