Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The Microsoft® Windows® 2000 operating system protects files, applications, and other resources from unauthorized use. Although you might already know how to use tools to assign privileges or set permissions, understanding what privileges and permissions really are, why they are necessary, and how they function can help you manage shared resources effectively. Understanding these processes can also help you avoid unnecessary risks and troubleshoot any problems you might encounter.
Access Check and Audit Generation
For information about how to diagnose, troubleshoot and recover Active Directory, see "Active Directory Diagnostics, Troubleshooting, and Recovery" in this book.
For information about authentication, see "Authentication" in this book.
For information about user rights, see the appendix "User Rights" in this book.
For information about well-known security identifiers, see the appendix "Well-Known Security Identifiers" in this book.