Privileges




SeAssignPrimaryTokenPrivilege

Replace a process-level token
Required to assign the primary token of a process. With this privilege, the user can initiate a process to replace the default token associated with a started subprocess.

SeAssignPrimaryTokenPrivilege

Replace a process-level token
Required to assign the primary token of a process. With this privilege, the user can initiate a process to replace the default token associated with a started subprocess.

SeAuditPrivilege

Generate security audits
With this privilege, the user can add entries to the security log.

SeBackupPrivilege

Back up files and directories
- Required to perform backup operations. With this privilege, the user can bypass file and directory, registry, and other persistent object permissions for the purposes of backing up the system. This privilege causes the system to grant all read access control to any file, regardless of the access control list (ACL) specified for the file. Any access request other than read is still evaluated with the ACL. The following access rights are granted if this privilege is held: READ_CONTROL, ACCESS_SYSTEM_SECURITY, FILE_GENERIC_READ, FILE_TRAVERSE

SeChangeNotifyPrivilege

Bypass traverse checking
Required to receive notifications of changes to files or directories. This privilege also causes the system to skip all traversal access checks. With this privilege, the user can traverse directory trees even though the user may not have permissions on the traversed directory. This privilege does not allow the user to list the contents of a directory, only to traverse directories.

SeCreateGlobalPrivilege

Create global objects
Required to create named file mapping objects in the global namespace during Terminal Services sessions.

SeCreatePagefilePrivilege

Create a pagefile
With this privilege, the user can create and change the size of a pagefile.

SeCreatePagefilePrivilege

Create permanent shared objects
Required to create a permanent object. This privilege is useful to kernel-mode components that extend the object namespace. Components that are running in kernel mode already have this privilege inherently; it is not necessary to assign them the privilege.

SeCreateSymbolicLinkPrivilege

Create symbolic links
Required to create a symbolic link.

SeCreateTokenPrivilege

Create a token object
Allows a process to create a token which it can then use to get access to any local resources when the process uses NtCreateToken() or other token-creation APIs. When a process requires this privilege, we recommend using the LocalSystem account (which already includes the privilege), rather than creating a separate user account and assigning this privilege to it.

SeDebugPrivilege

Debug programs
Required to debug and adjust the memory of a process owned by another account. With this privilege, the user can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need this user right. Developers who are debugging new system components need this user right. This user right provides complete access to sensitive and critical operating system components.

SeEnableDelegationPrivilege

Enable computer and user accounts to be trusted for delegation
Required to mark user and computer accounts as trusted for delegation. With this privilege, the user can set the Trusted for Delegation setting on a user or computer object. The user or object that is granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that is trusted for delegation can access resources on another computer using the delegated credentials of a client, as long as the account of the client does not have the Account cannot be delegated account control flag set.

SeImpersonatePrivilege

Impersonate a client after authentication
With this privilege, the user can impersonate other accounts.

SeIncreaseBasePriorityPrivilege

Increase scheduling priority
Required to increase the base priority of a process. With this privilege, the user can use a process with Write property access to another process to increase the execution priority assigned to the other process. A user with this privilege can change the scheduling priority of a process through the Task Manager user interface.

SeIncreaseQuotaPrivilege

Adjust memory quotas for a process
Required to increase the quota assigned to a process. With this privilege, the user can change the maximum memory that can be consumed by a process.

SeIncreaseWorkingSetPrivilege

Increase a process working set
Required to allocate more memory for applications that run in the context of users.

SeLoadDriverPrivilege

Load and unload device drivers
Required to load or unload a device driver. With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers.

SeLockMemoryPrivilege

Lock pages in memory
Required to lock physical pages in memory. With this privilege, the user can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM).

SeMachineAccountPrivilege

Add workstations to domain
With this privilege, the user can create a computer account. This privilege is valid only on domain controllers.

SeManageVolumePrivilege

Perform volume maintenance tasks
Required to run maintenance tasks on a volume, such as remote defragmentation.

SeProfileSingleProcessPrivilege

Profile single process
Required to gather profiling information for a single process. With this privilege, the user can use performance monitoring tools to monitor the performance of non-system processes.

SeRelabelPrivilege

Modify an object label
Required to modify the mandatory integrity level of an object.

SeRemoteShutdownPrivilege

Force shutdown from a remote system
Required to shut down a system using a network request.

SeRestorePrivilege

Restore files and directories
Required to perform restore operations. This privilege causes the system to grant all write access control to any file, regardless of the ACL specified for the file. Any access request other than write is still evaluated with the ACL. Additionally, this privilege enables you to set any valid user or group SID as the owner of a file. The following access rights are granted if this privilege is held: WRITE_DAC, WRITE_OWNER, ACCESS_SYSTEM_SECURITY, FILE_GENERIC_WRITE, FILE_ADD_FILE, FILE_ADD_SUBDIRECTORY, DELETE. With this privilege, the user can bypass file, directory, registry, and other persistent objects permissions when restoring backed up files and directories and determines which users can set any valid security principal as the owner of an object.

SeSecurityPrivilege

Manage auditing and security log
Required to perform a number of security-related functions, such as controlling and viewing audit events in security event log. With this privilege, the user can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys. A user with this privilege can also view and clear the security log.

SeShutdownPrivilege

Shut down the system
Required to shut down a local system.

SeSyncAgentPrivilege

Synchronize directory service data
This privilege enables the holder to read all objects and properties in the directory, regardless of the protection on the objects and properties. By default, it is assigned to the Administrator and LocalSystem accounts on domain controllers. With this privilege, the user can synchronize all directory service data. This is also known as Active Directory synchronization.

SeSystemEnvironmentPrivilege

Modify firmware environment values
Required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information.

SeSystemProfilePrivilege

Profile system performance
Required to gather profiling information for the entire system. With this privilege, the user can use performance monitoring tools to monitor the performance of system processes.

SeSystemtimePrivilege

Change the system time
Required to modify the system time. With this privilege, the user can change the time and date on the internal clock of the computer. Users that are assigned this user right can affect the appearance of event logs. If the system time is changed, events that are logged will reflect this new time, not the actual time that the events occurred.

SeTakeOwnershipPrivilege

Take ownership of files or other objects
Required to take ownership of an object without being granted discretionary access. This privilege allows the owner value to be set only to those values that the holder may legitimately assign as the owner of an object. With this privilege, the user can take ownership of any securable object in the system, including Active Directory objects, files and folders, printers, registry keys, processes, and threads.

SeTcbPrivilege

Act as part of the operating system
This privilege identifies its holder as part of the trusted computer base. This user right allows a process to impersonate any user without authentication. The process can therefore gain access to the same local resources as that user.

SeTimeZonePrivilege

Change the time zone
Required to adjust the time zone associated with the computer's internal clock.

SeTrustedCredManAccessPrivilege

Access Credential Manager as a trusted caller
Required to access Credential Manager as a trusted caller.

SeUndockPrivilege

Remove computer from docking station
Required to undock a laptop. With this privilege, the user can undock a portable computer from its docking station without logging on.

SeUnsolicitedInputPrivilege

Not applicable
Required to read unsolicited input from a terminal device.