Knowledge

Mandatory Integrity Control

Source 📝

2311: 2322: 64:. Windows restricts the allowed access rights depending on whether the subject's IL is higher or lower than the object, and depending on the integrity policy flags in the new access control entry (ACE). The security subsystem implements the integrity level as a mandatory label to distinguish it from the discretionary access under user control that ACLs provide. 243:
or other shared objects. The shared object must have an integrity level as low as the Low IL process and should be shared by both the Low IL and High IL processes. Since MIC does not prevent a Low IL process from sharing objects with a higher IL process, it can trigger flaws in the higher IL process
35:
based on their Integrity Level (IL). The IL represents the level of trustworthiness of an object. This mechanism's goal is to restrict the access permissions for potentially less trustworthy contexts (processes, files, and other securable objects), compared with other contexts running under the same
234:
However, in some cases a higher IL process do need to execute certain functions against the lower IL process, or a lower IL process need to access resources that only a higher IL process can access (for example, when viewing a webpage in protected mode, save a file downloaded from the internet to a
230:
introduced the "Protected View" isolated sandbox environment for Excel, PowerPoint, and Word that prohibits potentially unsafe documents from modifying components, files, and other resources on a system. Protected View operates as a low-integrity process and, in Windows Vista and later versions of
215:
introduces a MIC-based "Protected Mode" setting to control whether a web page is opened as a low-integrity process or not (provided the operating system supports MIC), based on security zone settings, thereby preventing some classes of security vulnerabilities. Since Internet Explorer in this case
188:
While processes inherit the integrity level of the process that spawned it, the integrity level can be customized at the time of process creation. As well as for defining the boundary for window messages in the
610: 536: 114:
IL. By introducing integrity levels, MIC allows classes of applications to be isolated, enabling scenarios like sandboxing potentially-vulnerable applications (such as
301: 56:
when initialized. When the subject tries to access an object (for example, a file), the Security Reference Monitor compares the integrity level in the subject's
590: 371: 157:
an object only when its integrity level is equal to or higher than the requested integrity level specified by the object. Additionally, for privacy reasons
800: 563: 52:(ACLs) are used to grant access rights (read, write, and execute permissions) and privileges to users or groups. An IL is assigned to a subject's 485: 149:
governing access to them, that defines the minimum integrity level of the process that can use the object. Windows makes sure that a process can
122:
IL are called low-integrity processes, which have less access than processes with higher ILs where the Access control enforcement is in Windows.
2347: 393: 1326: 1476: 168:
Consequently, a process cannot interact with another process that has a higher IL. So a process cannot perform functions such as inject a
1341: 1506: 583: 340: 1163: 415: 24: 2197: 576: 558: 1856: 2326: 599: 224:
are two other notable applications that are introducing the technology in order to reduce their vulnerability to malware.
1576: 1216: 635: 520: 1748: 1657: 1173: 805: 312: 253: 190: 44:
Mandatory Integrity Control is defined using a new access control entry (ACE) type to represent the object's IL in its
216:
runs as a Low IL process, it cannot modify system level objects—file and registry operations are instead virtualized.
438: 235:
folder specified by the user). High IL and Low IL processes can still communicate with each other by using files,
1496: 1439: 1401: 1386: 2242: 1824: 1351: 1366: 2207: 2076: 1763: 1753: 1627: 1531: 1391: 748: 703: 2315: 1683: 1541: 1396: 1193: 908: 858: 462: 1905: 1785: 1491: 990: 630: 623: 618: 2237: 2202: 1632: 1622: 1561: 1471: 1361: 1331: 980: 678: 142: 1602: 1546: 1526: 1371: 1140: 1025: 915: 495: 275: 158: 126: 28: 2187: 2182: 2026: 2021: 1981: 1941: 1891: 1637: 1381: 1376: 1251: 1226: 1188: 1158: 1108: 920: 843: 768: 688: 663: 2167: 2131: 1743: 1728: 1486: 1444: 1336: 1266: 1183: 1168: 763: 2296: 2116: 2061: 2001: 1986: 1795: 1466: 1421: 1278: 1231: 227: 2281: 2276: 2121: 2091: 2056: 1946: 1652: 1647: 1551: 1501: 1459: 1429: 1316: 903: 868: 815: 753: 308: 240: 169: 107: 8: 2222: 2081: 2036: 2011: 1966: 1912: 1711: 1566: 1449: 898: 883: 823: 743: 713: 270: 212: 138: 73: 61: 49: 45: 32: 2227: 2177: 1951: 1870: 1775: 1481: 1321: 1288: 1261: 1256: 1103: 930: 833: 828: 728: 2291: 2217: 2172: 2071: 2066: 2041: 1996: 1961: 1831: 1135: 945: 778: 202: 2232: 2141: 1976: 1919: 1877: 1738: 1706: 1662: 1617: 1536: 1296: 1093: 970: 960: 723: 718: 367: 245: 206: 134: 2268: 2151: 2126: 2111: 2101: 2051: 2046: 1800: 1434: 1150: 1015: 1005: 950: 935: 793: 683: 1758: 1301: 1113: 1088: 1020: 888: 863: 838: 788: 758: 668: 568: 249: 2341: 2247: 2106: 2006: 1346: 1306: 1083: 1058: 1050: 985: 853: 653: 490: 442: 221: 198: 193:(UIPI) technology, Mandatory Integrity Control is used by applications like 176:
function of the Windows API or send data to a different process by using the
130: 2016: 1971: 1898: 1863: 1571: 1521: 1311: 1063: 1010: 975: 893: 873: 693: 673: 217: 194: 57: 53: 2086: 2031: 1936: 1790: 1678: 1556: 1411: 1203: 1178: 773: 1991: 1815: 1356: 1246: 1120: 1040: 965: 783: 236: 102:
S-1-16-16384). By default, processes started by a regular user gain a
1612: 1607: 1241: 1130: 1078: 848: 544: 528: 470: 423: 401: 379: 348: 244:
and have it work on behalf of the low IL process, thereby causing a
2192: 2096: 1956: 1716: 1581: 1211: 1068: 955: 940: 878: 738: 698: 115: 2212: 2146: 1884: 1770: 1733: 1721: 1406: 1125: 1098: 1073: 1035: 1030: 733: 658: 559:
Introduction to Windows Integrity Control: Security Focus article
1000: 2286: 2136: 1805: 1586: 1511: 925: 265: 2252: 1688: 1516: 1221: 995: 708: 209:
to isolate documents from vulnerable objects in the system.
231:
Windows, uses MIC and UIPI to further restrict the sandbox.
1780: 1454: 1273: 1236: 146: 564:
Escaping from Microsoft’s Protected Mode Internet Explorer
1698: 477: 521:"Windows Vista Integrity Mechanism Technical Reference" 372:"PsExec, User Account Control and Security Boundaries" 486:"Microsoft struts Office 2010 'sandbox' security" 125:Objects with Access control lists, such as Named 2339: 598: 455: 463:"Plan Protected View settings for Office 2010" 341:"Mandatory Integrity Control in Windows Vista" 302:"Analysis of the Windows Vista Security Model" 584: 67:Windows Vista defines four integrity levels: 60:against the integrity level in the object's 366: 299: 25:security feature of Windows Vista and later 2321: 591: 577: 436: 295: 293: 291: 161:with higher IL are out-of-bounds for even 439:"Introducing Adobe Reader Protected Mode" 537:"Introduction to the Protected Mode API" 334: 332: 288: 2340: 483: 362: 360: 358: 172:into a higher IL process by using the 118:-facing applications). Processes with 2348:Microsoft Windows security technology 2198:Next-Generation Secure Computing Base 572: 338: 252:, however, can be prevented by using 165:access from processes with lower IL. 329: 36:user account that are more trusted. 1327:Distributed Transaction Coordinator 355: 13: 1658:User Interface Privilege Isolation 513: 254:User Interface Privilege Isolation 191:User Interface Privilege Isolation 14: 2359: 552: 484:Keizer, Gregg (August 19, 2009). 39: 2320: 2310: 2309: 1387:Remote Differential Compression 2243:Windows System Assessment Tool 430: 408: 386: 256:which takes advantage of MIC. 183: 1: 416:"WriteProcessMemory function" 394:"CreateRemoteThread function" 339:Riley, Steve (22 July 2006). 281: 1532:Open XML Paper Specification 1392:Remote Installation Services 600:Microsoft Windows components 7: 1684:Windows Subsystem for Linux 1643:Mandatory Integrity Control 1397:Windows Deployment Services 1194:Wireless Zero Configuration 259: 17:Mandatory Integrity Control 10: 2364: 1786:Universal Windows Platform 1492:Kernel Transaction Manager 1477:Hardware Abstraction Layer 1174:Multimedia Class Scheduler 147:System Access Control List 2305: 2265: 2238:Windows Services for UNIX 2160: 1929: 1848: 1841: 1814: 1697: 1671: 1623:Data Execution Prevention 1595: 1472:Graphics Device Interface 1420: 1362:Network Access Protection 1287: 1202: 1149: 1049: 981:Remote Desktop Connection 814: 644: 606: 437:Brad Arkin (2010-07-10). 1603:Security and Maintenance 1547:Security Account Manager 1141:Windows XP visual styles 276:Mandatory access control 29:mandatory access control 2188:Media Control Interface 2022:Help and Support Center 1638:Kernel Patch Protection 1402:System Resource Manager 1382:Remote Desktop Services 1377:Print Services for UNIX 1159:Service Control Manager 769:Windows Error Reporting 689:DirectX Diagnostic Tool 145:, have an entry in the 2168:Desktop Cleanup Wizard 1744:COM Structured storage 1445:Desktop Window Manager 1337:Windows Media Services 541:Microsoft Docs Archive 525:Microsoft Docs Archive 467:Microsoft Docs Archive 345:Microsoft Docs Archive 1796:Windows Mixed Reality 1467:Enhanced Write Filter 1317:Roaming user profiles 228:Microsoft Office 2010 2077:Mobile Device Center 2027:Health & Fitness 1825:Solitaire Collection 1653:User Account Control 1648:Protected Media Path 1552:Server Message Block 1502:Logical Disk Manager 754:System Policy Editor 739:System Configuration 376:Windows Blog Archive 370:(12 February 2007). 309:Symantec Corporation 178:WriteProcessMemory() 174:CreateRemoteThread() 50:Access Control Lists 2223:Virtual DOS machine 1567:System Idle Process 1542:Resource Protection 1450:Portable Executable 1342:Active DRM Services 744:System File Checker 714:Performance Monitor 271:Security Identifier 213:Internet Explorer 7 137:keys or even other 94:S-1-16-12288), and 62:security descriptor 46:security descriptor 2228:Windows on Windows 1952:Backup and Restore 1764:Transaction Server 1482:I/O request packet 1322:Folder redirection 991:Speech Recognition 749:System Information 704:Management Console 426:. 5 December 2018. 420:Windows Dev Center 404:. 5 December 2018. 398:Windows Dev Center 2335: 2334: 2261: 2260: 2218:Video for Windows 2173:Games for Windows 2042:Internet Explorer 1136:Windows Spotlight 779:Windows Installer 547:. 15 August 2007. 368:Russinovich, Mark 300:Matthew Conover. 203:Internet Explorer 2355: 2324: 2323: 2313: 2312: 2233:Windows SideShow 2012:Food & Drink 1906:Spider Solitaire 1846: 1845: 1739:ActiveX Document 1707:Active Scripting 1663:Windows Firewall 1618:Credential Guard 1297:Active Directory 1094:Indexing Service 724:Resource Monitor 719:Recovery Console 593: 586: 579: 570: 569: 548: 532: 507: 506: 504: 502: 481: 475: 474: 473:. 5 August 2011. 459: 453: 452: 450: 449: 434: 428: 427: 412: 406: 405: 390: 384: 383: 364: 353: 352: 336: 327: 326: 324: 323: 317: 311:. Archived from 306: 297: 246:Squatting attack 207:Windows Explorer 179: 175: 2363: 2362: 2358: 2357: 2356: 2354: 2353: 2352: 2338: 2337: 2336: 2331: 2301: 2269:Microsoft Store 2267: 2257: 2203:POSIX subsystem 2183:File Protection 2156: 2127:Program Manager 2112:Phone Companion 2102:Outlook Express 2052:Make Compatible 1982:Desktop Gadgets 1942:Anytime Upgrade 1925: 1837: 1810: 1801:Windows Runtime 1693: 1667: 1633:Family features 1591: 1416: 1372:DFS Replication 1283: 1198: 1189:Error Reporting 1145: 1045: 921:Mobility Center 916:Movies & TV 810: 794:Windows Insider 684:Driver Verifier 679:Drive Optimizer 646: 640: 631:Booting process 602: 597: 555: 535: 519: 516: 514:Further reading 511: 510: 500: 498: 482: 478: 461: 460: 456: 447: 445: 435: 431: 414: 413: 409: 392: 391: 387: 365: 356: 337: 330: 321: 319: 315: 304: 298: 289: 284: 262: 250:Shatter attacks 186: 177: 173: 159:process objects 110:processes have 42: 12: 11: 5: 2361: 2351: 2350: 2333: 2332: 2330: 2329: 2318: 2306: 2303: 2302: 2300: 2299: 2294: 2289: 2284: 2279: 2273: 2271: 2263: 2262: 2259: 2258: 2256: 2255: 2250: 2245: 2240: 2235: 2230: 2225: 2220: 2215: 2210: 2205: 2200: 2195: 2190: 2185: 2180: 2175: 2170: 2164: 2162: 2158: 2157: 2155: 2154: 2149: 2144: 2139: 2134: 2132:Steps Recorder 2129: 2124: 2119: 2114: 2109: 2104: 2099: 2094: 2089: 2084: 2079: 2074: 2069: 2064: 2059: 2054: 2049: 2044: 2039: 2034: 2029: 2024: 2019: 2014: 2009: 2004: 1999: 1994: 1989: 1984: 1979: 1974: 1969: 1964: 1959: 1954: 1949: 1944: 1939: 1933: 1931: 1927: 1926: 1924: 1923: 1916: 1909: 1902: 1895: 1888: 1881: 1874: 1867: 1860: 1852: 1850: 1843: 1839: 1838: 1836: 1835: 1828: 1820: 1818: 1812: 1811: 1809: 1808: 1803: 1798: 1793: 1788: 1783: 1778: 1773: 1768: 1767: 1766: 1761: 1759:OLE Automation 1756: 1751: 1746: 1741: 1736: 1726: 1725: 1724: 1719: 1714: 1703: 1701: 1695: 1694: 1692: 1691: 1686: 1681: 1675: 1673: 1669: 1668: 1666: 1665: 1660: 1655: 1650: 1645: 1640: 1635: 1630: 1625: 1620: 1615: 1610: 1605: 1599: 1597: 1593: 1592: 1590: 1589: 1584: 1579: 1574: 1569: 1564: 1559: 1554: 1549: 1544: 1539: 1534: 1529: 1527:Object Manager 1524: 1519: 1514: 1509: 1504: 1499: 1494: 1489: 1487:Imaging Format 1484: 1479: 1474: 1469: 1464: 1463: 1462: 1457: 1447: 1442: 1437: 1432: 1426: 1424: 1418: 1417: 1415: 1414: 1409: 1404: 1399: 1394: 1389: 1384: 1379: 1374: 1369: 1364: 1359: 1354: 1349: 1344: 1339: 1334: 1329: 1324: 1319: 1314: 1309: 1304: 1299: 1293: 1291: 1285: 1284: 1282: 1281: 1276: 1271: 1270: 1269: 1264: 1259: 1254: 1249: 1244: 1234: 1229: 1224: 1219: 1214: 1208: 1206: 1200: 1199: 1197: 1196: 1191: 1186: 1184:Task Scheduler 1181: 1176: 1171: 1166: 1161: 1155: 1153: 1147: 1146: 1144: 1143: 1138: 1133: 1128: 1123: 1118: 1117: 1116: 1114:Special folder 1111: 1106: 1101: 1096: 1086: 1081: 1076: 1071: 1066: 1061: 1055: 1053: 1047: 1046: 1044: 1043: 1038: 1033: 1028: 1026:Voice Recorder 1023: 1018: 1013: 1008: 1003: 998: 993: 988: 983: 978: 973: 968: 963: 958: 953: 948: 943: 938: 933: 928: 923: 918: 913: 912: 911: 901: 896: 891: 886: 881: 876: 871: 866: 861: 856: 851: 846: 841: 836: 831: 826: 820: 818: 812: 811: 809: 808: 803: 798: 797: 796: 789:Windows Update 786: 781: 776: 771: 766: 761: 759:System Restore 756: 751: 746: 741: 736: 731: 726: 721: 716: 711: 706: 701: 696: 691: 686: 681: 676: 671: 669:Device Manager 666: 661: 659:Command Prompt 656: 650: 648: 642: 641: 639: 638: 633: 628: 627: 626: 621: 613: 607: 604: 603: 596: 595: 588: 581: 573: 567: 566: 561: 554: 553:External links 551: 550: 549: 533: 531:. 5 July 2007. 515: 512: 509: 508: 476: 454: 429: 407: 385: 354: 328: 286: 285: 283: 280: 279: 278: 273: 268: 261: 258: 185: 182: 86:S-1-16-8192), 78:S-1-16-4096), 48:. In Windows, 41: 40:Implementation 38: 9: 6: 4: 3: 2: 2360: 2349: 2346: 2345: 2343: 2328: 2319: 2317: 2308: 2307: 2304: 2298: 2295: 2293: 2290: 2288: 2285: 2283: 2280: 2278: 2275: 2274: 2272: 2270: 2264: 2254: 2251: 2249: 2248:Windows To Go 2246: 2244: 2241: 2239: 2236: 2234: 2231: 2229: 2226: 2224: 2221: 2219: 2216: 2214: 2211: 2209: 2206: 2204: 2201: 2199: 2196: 2194: 2191: 2189: 2186: 2184: 2181: 2179: 2176: 2174: 2171: 2169: 2166: 2165: 2163: 2159: 2153: 2150: 2148: 2145: 2143: 2140: 2138: 2135: 2133: 2130: 2128: 2125: 2123: 2120: 2118: 2117:Photo Gallery 2115: 2113: 2110: 2108: 2105: 2103: 2100: 2098: 2095: 2093: 2090: 2088: 2085: 2083: 2080: 2078: 2075: 2073: 2070: 2068: 2065: 2063: 2062:Meeting Space 2060: 2058: 2055: 2053: 2050: 2048: 2045: 2043: 2040: 2038: 2035: 2033: 2032:HyperTerminal 2030: 2028: 2025: 2023: 2020: 2018: 2015: 2013: 2010: 2008: 2005: 2003: 2002:Easy Transfer 2000: 1998: 1995: 1993: 1990: 1988: 1985: 1983: 1980: 1978: 1975: 1973: 1970: 1968: 1965: 1963: 1960: 1958: 1955: 1953: 1950: 1948: 1945: 1943: 1940: 1938: 1935: 1934: 1932: 1928: 1922: 1921: 1917: 1915: 1914: 1910: 1908: 1907: 1903: 1901: 1900: 1896: 1894: 1893: 1889: 1887: 1886: 1882: 1880: 1879: 1875: 1873: 1872: 1868: 1866: 1865: 1861: 1859: 1858: 1854: 1853: 1851: 1847: 1844: 1840: 1834: 1833: 1829: 1827: 1826: 1822: 1821: 1819: 1817: 1813: 1807: 1804: 1802: 1799: 1797: 1794: 1792: 1789: 1787: 1784: 1782: 1779: 1777: 1774: 1772: 1769: 1765: 1762: 1760: 1757: 1755: 1752: 1750: 1747: 1745: 1742: 1740: 1737: 1735: 1732: 1731: 1730: 1727: 1723: 1720: 1718: 1715: 1713: 1710: 1709: 1708: 1705: 1704: 1702: 1700: 1696: 1690: 1687: 1685: 1682: 1680: 1677: 1676: 1674: 1672:Compatibility 1670: 1664: 1661: 1659: 1656: 1654: 1651: 1649: 1646: 1644: 1641: 1639: 1636: 1634: 1631: 1629: 1626: 1624: 1621: 1619: 1616: 1614: 1611: 1609: 1606: 1604: 1601: 1600: 1598: 1594: 1588: 1585: 1583: 1580: 1578: 1575: 1573: 1570: 1568: 1565: 1563: 1560: 1558: 1555: 1553: 1550: 1548: 1545: 1543: 1540: 1538: 1535: 1533: 1530: 1528: 1525: 1523: 1520: 1518: 1515: 1513: 1510: 1508: 1505: 1503: 1500: 1498: 1497:Library files 1495: 1493: 1490: 1488: 1485: 1483: 1480: 1478: 1475: 1473: 1470: 1468: 1465: 1461: 1458: 1456: 1453: 1452: 1451: 1448: 1446: 1443: 1441: 1438: 1436: 1433: 1431: 1428: 1427: 1425: 1423: 1419: 1413: 1410: 1408: 1405: 1403: 1400: 1398: 1395: 1393: 1390: 1388: 1385: 1383: 1380: 1378: 1375: 1373: 1370: 1368: 1365: 1363: 1360: 1358: 1355: 1353: 1350: 1348: 1345: 1343: 1340: 1338: 1335: 1333: 1330: 1328: 1325: 1323: 1320: 1318: 1315: 1313: 1310: 1308: 1305: 1303: 1300: 1298: 1295: 1294: 1292: 1290: 1286: 1280: 1277: 1275: 1272: 1268: 1265: 1263: 1260: 1258: 1257:Reparse point 1255: 1253: 1250: 1248: 1245: 1243: 1240: 1239: 1238: 1235: 1233: 1230: 1228: 1225: 1223: 1220: 1218: 1215: 1213: 1210: 1209: 1207: 1205: 1201: 1195: 1192: 1190: 1187: 1185: 1182: 1180: 1177: 1175: 1172: 1170: 1167: 1165: 1162: 1160: 1157: 1156: 1154: 1152: 1148: 1142: 1139: 1137: 1134: 1132: 1129: 1127: 1124: 1122: 1119: 1115: 1112: 1110: 1107: 1105: 1102: 1100: 1097: 1095: 1092: 1091: 1090: 1087: 1085: 1082: 1080: 1077: 1075: 1072: 1070: 1067: 1065: 1062: 1060: 1059:Action Center 1057: 1056: 1054: 1052: 1048: 1042: 1039: 1037: 1034: 1032: 1029: 1027: 1024: 1022: 1019: 1017: 1014: 1012: 1009: 1007: 1004: 1002: 999: 997: 994: 992: 989: 987: 986:Snipping Tool 984: 982: 979: 977: 974: 972: 969: 967: 964: 962: 959: 957: 954: 952: 949: 947: 944: 942: 939: 937: 934: 932: 929: 927: 924: 922: 919: 917: 914: 910: 907: 906: 905: 902: 900: 897: 895: 892: 890: 887: 885: 882: 880: 877: 875: 872: 870: 867: 865: 862: 860: 857: 855: 852: 850: 847: 845: 844:Character Map 842: 840: 837: 835: 832: 830: 827: 825: 822: 821: 819: 817: 813: 807: 804: 802: 799: 795: 792: 791: 790: 787: 785: 782: 780: 777: 775: 772: 770: 767: 765: 762: 760: 757: 755: 752: 750: 747: 745: 742: 740: 737: 735: 732: 730: 727: 725: 722: 720: 717: 715: 712: 710: 707: 705: 702: 700: 697: 695: 692: 690: 687: 685: 682: 680: 677: 675: 672: 670: 667: 665: 664:Control Panel 662: 660: 657: 655: 654:App Installer 652: 651: 649: 643: 637: 634: 632: 629: 625: 622: 620: 617: 616: 615:Architecture 614: 612: 609: 608: 605: 601: 594: 589: 587: 582: 580: 575: 574: 571: 565: 562: 560: 557: 556: 546: 542: 538: 534: 530: 526: 522: 518: 517: 497: 493: 492: 491:Computerworld 487: 480: 472: 468: 464: 458: 444: 443:Adobe Systems 440: 433: 425: 421: 417: 411: 403: 399: 395: 389: 381: 377: 373: 369: 363: 361: 359: 350: 346: 342: 335: 333: 318:on 2008-05-16 314: 310: 303: 296: 294: 292: 287: 277: 274: 272: 269: 267: 264: 263: 257: 255: 251: 247: 242: 238: 232: 229: 225: 223: 222:Google Chrome 219: 214: 210: 208: 204: 200: 199:Google Chrome 196: 192: 181: 171: 166: 164: 160: 156: 152: 148: 144: 140: 136: 132: 128: 123: 121: 117: 113: 109: 105: 101: 97: 93: 89: 85: 81: 77: 75: 70: 65: 63: 59: 55: 51: 47: 37: 34: 30: 26: 22: 18: 2282:File Manager 2122:Photo Viewer 2057:Media Center 2017:Groove Music 1947:Address Book 1918: 1911: 1904: 1899:Purble Place 1897: 1890: 1883: 1876: 1869: 1864:Chess Titans 1862: 1855: 1842:Discontinued 1830: 1823: 1642: 1522:Ntoskrnl.exe 1430:Boot Manager 1422:Architecture 1312:Group Policy 1204:File systems 1104:Saved search 1011:Sticky Notes 976:Quick Assist 904:Media Player 874:Feedback Hub 869:Fax and Scan 764:Task Manager 694:Event Viewer 674:Disk Cleanup 540: 524: 499:. Retrieved 489: 479: 466: 457: 446:. Retrieved 432: 419: 410: 397: 388: 375: 344: 320:. Retrieved 313:the original 233: 226: 218:Adobe Reader 211: 195:Adobe Reader 187: 167: 162: 154: 150: 129:, including 124: 119: 111: 103: 99: 95: 91: 87: 83: 79: 72: 68: 66: 58:access token 54:access token 43: 23:) is a core 20: 16: 15: 2297:Minesweeper 2266:Spun off to 2087:MSN Dial-up 2082:Movie Maker 1987:Diagnostics 1937:ActiveMovie 1679:COMMAND.COM 1557:Shadow Copy 1412:Server Core 1252:Mount Point 1179:Shadow Copy 774:Windows Ink 501:January 23, 237:Named pipes 184:Application 31:to running 2277:DVD Player 2092:NetMeeting 1992:DriveSpace 1857:3D Pinball 1357:SharePoint 1121:Start menu 966:Phone Link 829:Calculator 784:PowerShell 645:Management 448:2010-09-10 322:2007-10-08 282:References 180:function. 27:that adds 2072:Messenger 2067:Messaging 1997:DVD Maker 1967:CD Player 1962:CardSpace 1913:Solitaire 1613:BitLocker 1608:AppLocker 1242:Hard link 1131:Task View 1109:Namespace 1079:ClearType 899:Messaging 884:Magnifier 849:Clipchamp 824:3D Viewer 545:Microsoft 529:Microsoft 471:Microsoft 424:Microsoft 402:Microsoft 380:Microsoft 349:Microsoft 139:processes 33:processes 2342:Category 2316:Category 2193:MS-DOS 7 2178:ScanDisk 2097:NTBackup 1977:Contacts 1957:Cardfile 1892:Hold 'Em 1871:FreeCell 1717:VBScript 1628:Defender 1596:Security 1582:Winlogon 1537:Registry 1151:Services 1084:Explorer 1069:AutoPlay 956:Paint 3D 941:OneDrive 931:Narrator 879:Get Help 834:Calendar 729:Settings 699:IExpress 260:See also 151:write to 135:registry 116:Internet 108:elevated 2292:Mahjong 2213:Interix 2147:WinHelp 2047:Journal 2037:Imaging 1885:InkBall 1771:DirectX 1734:ActiveX 1722:JScript 1435:Console 1407:Hyper-V 1302:Domains 1126:Taskbar 1099:IFilter 1074:AutoRun 1036:WordPad 1031:Weather 946:OneNote 936:Notepad 859:Cortana 734:Sysprep 220:10 and 143:threads 127:objects 106:IL and 2325:  2314:  2287:Hover! 2161:Others 2142:Travel 2137:Syskey 1920:Tinker 1878:Hearts 1806:WinUSB 1791:WinAPI 1776:Native 1587:WinUSB 1512:MinWin 1289:Server 1089:Search 1001:Sports 971:Photos 961:People 839:Camera 266:icacls 205:, and 155:delete 104:Medium 96:System 80:Medium 2253:WinFS 2152:Write 1849:Games 1816:Games 1689:WoW64 1517:NTLDR 1507:LSASS 1440:CSRSS 1247:links 1222:exFAT 1051:Shell 1016:Store 1006:Start 996:Skype 951:Paint 926:Money 854:Clock 801:WinRE 709:Netsh 647:tools 636:Games 316:(PDF) 305:(PDF) 131:files 2327:List 2208:HPFS 1972:Chat 1930:Apps 1832:Surf 1781:.NET 1749:DCOM 1577:WHEA 1572:USER 1562:SMSS 1352:WSUS 1332:MSMQ 1274:ReFS 1237:NTFS 1212:CDFS 1169:CLFS 1164:BITS 1064:Aero 1041:Xbox 1021:Tips 909:2022 894:Maps 889:Mail 864:Edge 816:Apps 611:APIs 503:2017 163:read 141:and 112:High 100:SID: 92:SID: 88:High 84:SID: 2107:Pay 2007:Fax 1754:OLE 1729:COM 1712:WSH 1699:API 1460:DLL 1455:EXE 1367:PWS 1347:IIS 1307:DNS 1279:UDF 1267:EFS 1262:TxF 1232:FAT 1227:IFS 1217:DFS 806:WMI 496:IDG 241:LPC 170:DLL 153:or 120:Low 74:SID 69:Low 21:MIC 2344:: 624:NT 619:9x 543:. 539:. 527:. 523:. 494:. 488:. 469:. 465:. 441:. 422:. 418:. 400:. 396:. 378:. 374:. 357:^ 347:. 343:. 331:^ 307:. 290:^ 248:. 239:, 201:, 197:, 133:, 592:e 585:t 578:v 505:. 451:. 382:. 351:. 325:. 98:( 90:( 82:( 76:: 71:( 19:(

Index

security feature of Windows Vista and later
mandatory access control
processes
security descriptor
Access Control Lists
access token
access token
security descriptor
SID
elevated
Internet
objects
files
registry
processes
threads
System Access Control List
process objects
DLL
User Interface Privilege Isolation
Adobe Reader
Google Chrome
Internet Explorer
Windows Explorer
Internet Explorer 7
Adobe Reader
Google Chrome
Microsoft Office 2010
Named pipes
LPC

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.