Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This section provides a list of objects used in security descriptors and constants used in methods that manipulate security descriptors or privileges.
Related topics