!!! Overview
[{$pagename}], in [Microsoft Windows], are represented by [Security Identifiers] ([SIDs]).


[Microsoft Windows] defines four integrity levels:
* Low (SID: [S-1-16-4096])
* Medium (SID: [S-1-16-8192]) - Standard [MSA] receive medium
* High (SID: [S-1-16-12288]) - elevated [MSA] receive high
* System (SID: [S-1-16-16384])
By default, [processes] started by a regular user gain a Medium [{$pagename}] and elevated processes have High [{$pagename}]

Processes started and objects you create receive the [{$pagename}] (medium or high) or low if the executable file's level is low.

System services receive system integrity. 

Objects that lack an integrity label are treated as medium by the [Operating System]; this prevents low-integrity code from modifying unlabeled objects. 

Additionally, Windows ensures that processes running with a low [{$pagename}] cannot obtain access a process which is associated with an app container.

!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Mandatory Integrity Control|https://docs.microsoft.com/en-us/windows/win32/secauthz/mandatory-integrity-control|target='_blank'] - based on information obtained 2020-09-02