This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 100 lines
!!! Overview
[{$pagename}], in [Microsoft Windows], are represented by [Security Identifiers] ([SIDs]).
[Microsoft Windows] defines four integrity levels:
* Low (SID: [S-1-16-4096])
* Medium (SID: [S-1-16-8192]) - Standard [MSA] receive medium
* High (SID: [S-1-16-12288]) - elevated [MSA] receive high
* System (SID: [S-1-16-16384])
By default, [processes] started by a regular user gain a Medium [{$pagename}] and elevated processes have High [{$pagename}]
Processes started and objects you create receive the [{$pagename}] (medium or high) or low if the executable file's level is low.
System services receive system integrity.
Objects that lack an integrity label are treated as medium by the [Operating System]; this prevents low-integrity code from modifying unlabeled objects.
Additionally, Windows ensures that processes running with a low [{$pagename}] cannot obtain access a process which is associated with an app container.
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Mandatory Integrity Control|https://docs.microsoft.com/en-us/windows/win32/secauthz/mandatory-integrity-control|target='_blank'] - based on information obtained 2020-09-02