AD Permissions – Advanced Filter Constants

This page provides the details on the various options that are available in Advanced Filter dialog of AD Permission Reporter and the flags that appear in the AD Permissions Browser (formally ACL Browser).

Security Descriptor Selection

Option Description
DACLThe Discretionary Access Control List (DACL) will be read from the nTSecurityDescriptor attribute
SACLThe System Access Control List (SACL) will be read from thenTSecurityDescriptor attribute. The user must have ACCESS_SYSTEM_SECURITY\SeSecurityPrivilege access right to be able to read the SACL.
MailboxSecurity Descriptor for the mailbox is read from the msExchMailboxSecurityDescriptor attribute of the object.
SchemaSecurity Descriptor of the Schema Classes is read from the DefaultSecurityDescriptor attribute. The Schema Context of the forest must be selected in the Context field on the main option.

SD Control

NetTools Label Constants Description
DACL Auto InheritSE_DACL_AUTO_INHERIT_REQIndicates a required security descriptor in which the discretionary access control list (DACL) is set up to support automatic propagation of inheritable access control entries (ACEs) to existing child objects.
DACL Auto InheritedSE_DACL_AUTO_INHERITEDIndicates a security descriptor in which the discretionary access control list (DACL) is set up to support automatic propagation of inheritable access control entries (ACEs) to existing child objects.
DACL DefaultedSE_DACL_DEFAULTEDIndicates a security descriptor with a default DACL. For example, if the creator an object does not specify a DACL, the object receives the default DACL from the access token of the creator. This flag can affect how the system treats the DACL with respect to ACE inheritance. The system ignores this flag if the SE_DACL_PRESENT flag is not set.
DACL PresentSE_DACL_PRESENTIndicates a security descriptor that has a DACL. If this flag is not set, or if this flag is set and the DACL is NULL, the security descriptor allows full access to everyone.
DACL ProtectedSE_DACL_PROTECTEDPrevents the DACL of the security descriptor from being modified by inheritable ACEs. To set this flag, use the SetSecurityDescriptorControl function.
Group DefaultedSE_GROUP_DEFAULTEDIndicates that the security identifier (SID) of the security descriptor group was provided by a default mechanism. This flag can be used by a resource manager to identify objects whose security descriptor group was set by a default mechanism.
Owner DefaultedSE_OWNER_DEFAULTEDIndicates that the SID of the owner of the security descriptor was provided by a default mechanism. This flag can be used by a resource manager to identify objects whose owner was set by a default mechanism.
SACL Auto InheritSE_SACL_AUTO_INHERIT_REQIndicates a required security descriptor in which the system access control list (SACL) is set up to support automatic propagation of inheritable ACEs to existing child objects. The system sets this bit when it performs the automatic inheritance algorithm for the object and its existing child objects.
SACL Auto InheritedSE_SACL_AUTO_INHERITEDIndicates a security descriptor in which the system access control list (SACL) is set up to support automatic propagation of inheritable ACEs to existing child objects.
SACL DefaultedSE_SACL_DEFAULTEDA default mechanism, rather than the original provider of the security descriptor, provided the SACL. This flag can affect how the system treats the SACL, with respect to ACE inheritance.
SACL PresentSE_SACL_PRESENTIndicates a security descriptor that has a SACL.
SACL ProtectedSE_SACL_PROTECTEDPrevents the SACL of the security descriptor from being modified by inheritable ACEs.
Resource ManagerSE_RM_CONTROL_VALIDIndicates that the resource manager control is valid.
Self RelativeSE_SELF_RELATIVEIndicates a self-relative security descriptor.

ACE Types

NetTools Label Constants Description
Allow ACEACCESS_ALLOWED_ACE_TYPEAccess-allowed ACE that uses the ACCESS_ALLOWED_ACE
Allow Object ACEACCESS_ALLOWED_OBJECT_ACE_TYPEObject-specific access-allowed ACE that uses the ACCESS_ALLOWED_OBJECT_ACE
Allow Callback ACEACCESS_ALLOWED_CALLBACK_ACE_TYPEAccess-allowed callback ACE that uses the ACCESS_ALLOWED_CALLBACK_ACE
Allow Callback Object ACEACCESS_ALLOWED_CALLBACK_OBJECT_ACE_TYPEObject-specific access-allowed callback ACE that uses the ACCESS_ALLOWED_CALLBACK_OBJECT_ACE
Deny ACEACCESS_DENIED_ACE_TYPEAccess-denied ACE that uses the ACCESS_DENIED_ACE
Deny Object ACEACCESS_DENIED_OBJECT_ACE_TYPEObject-specific access-denied ACE that uses the ACCESS_DENIED_OBJECT_ACE
Deny Callback ACEACCESS_DENIED_CALLBACK_ACE_TYPEAccess-denied callback ACE that uses the ACCESS_DENIED_CALLBACK_ACE
Deny Callback Object ACEACCESS_DENIED_CALLBACK_OBJECT_ACE_TYPEObject-specific access-denied callback ACE that uses the ACCESS_DENIED_CALLBACK_OBJECT_ACE
System Audit ACESYSTEM_AUDIT_ACE_TYPESystem-audit ACE that uses the SYSTEM_AUDIT_ACE
System Audit Object ACESYSTEM_AUDIT_OBJECT_ACE_TYPEObject-specific system-audit ACE that uses the SYSTEM_AUDIT_OBJECT_ACE
System Audit Callback ACESYSTEM_AUDIT_CALLBACK_ACE_TYPESystem-audit callback ACE that uses the SYSTEM_AUDIT_CALLBACK_ACE
System Audit Callback Object ACESYSTEM_AUDIT_CALLBACK_OBJECT_ACE_TYPEObject-specific system-audit callback ACE that uses the SYSTEM_AUDIT_CALLBACK_OBJECT_ACE
System Alarm ACESYSTEM_ALARM_ACE_TYPEReserved for future use.
System Alarm Object ACESYSTEM_ALARM_OBJECT_ACE_TYPEReserved for future use.
System Alarm Callback ACESYSTEM_ALARM_CALLBACK_ACE_TYPEReserved for future use.
System Alarm Callback Object ACESYSTEM_ALARM_CALLBACK_OBJECT_ACE_TYPEReserved for future use.
Mandatory Label ACESYSTEM_MANDATORY_LABEL_ACE_TYPEMandatory label ACE that uses the SYSTEM_MANDATORY_LABEL_ACE
Resource Attribute ACESYSTEM_RESOURCE_ATTRIBUTE_ACE_TYPEResource attribute ACE that uses the SYSTEM_RESOURCE_ATTRIBUTE_ACE
Scope Policy ID ACESYSTEM_SCOPED_POLICY_ID_ACE_TYPEA central policy ID ACE that uses the SYSTEM_SCOPED_POLICY_ID_ACE
Allow Compound ACEACCESS_ALLOWED_COMPOUND_ACE_TYPEReserved for future use.

ACE Header Flags

NetTools Label Constants Description
Container InheritCONTAINER_INHERIT_ACEChild objects that are containers, such as directories, inherit the ACE as an effective ACE. The inherited ACE is inheritable unless the NO_PROPAGATE_INHERIT_ACE bit flag is also set.
Inherit OnlyINHERIT_ONLY_ACEIndicates an inherit-only ACE, which does not control access to the object to which it is attached. If this flag is not set, the ACE is an effective ACE that controls access to the object to which it is attached.Both effective and inherit-only ACEs can be inherited depending on the state of the other inheritance flags.
InheritedINHERITED_ACEUsed to indicate that the ACE was inherited.
No Propagate InheritNO_PROPAGATE_INHERIT_ACEIf the ACE is inherited by a child object, the system clears the OBJECT_INHERIT_ACE and CONTAINER_INHERIT_ACE flags in the inherited ACE. This prevents the ACE from being inherited by subsequent generations of objects.
Object InheritOBJECT_INHERIT_ACENoncontainer child objects inherit the ACE as an effective ACE. For child objects that are containers, the ACE is inherited as an inherit-only ACE unless the NO_PROPAGATE_INHERIT_ACE bit flag is also set.
Failed AccessFAILED_ACCESS_ACE_FLAGUsed with system-audit ACEs in a system access control list (SACL) to generate audit messages for failed access attempts.
Successful AccessSUCCESSFUL_ACCESS_ACE_FLAGUsed with system-audit ACEs in a SACL to generate audit messages for successful access attempts.

Permissions

NetTool Label Constants Description
Full ControlConsists of all the rights below.
List ContentsADS_RIGHT_ACTRL_DS_LISTThe right to list child objects of this object.
List ObjectsADS_RIGHT_DS_LIST_OBJECTThe right to list a particular object. If the user is not granted such a right, and the user does not have ADS_RIGHT_ACTRL_DS_LIST set on the object parent, the object is hidden from the user.
DeleteADS_RIGHT_DELETEThe right to delete the object.
Delete subtreeADS_RIGHT_DS_DELETE_TREEThe right to delete all child objects of this object, regardless of the permissions of the child objects.
Read PermissionsADS_RIGHT_READ_CONTROLThe right to read data from the security descriptor of the object, not including the data in the SACL.
Write PermissionsADS_RIGHT_WRITE_DACThe right to modify the discretionary access-control list (DACL) in the object security descriptor.
Modify OwnerADS_RIGHT_WRITE_OWNERThe right to assume ownership of the object. The user must be an object trustee. The user cannot transfer the ownership to other users.
Read PropertyADS_RIGHT_DS_READ_PROPThe right to read properties of the object of the selected attribute, if no attrtibute is selected, then it checks for read all properties. Selecting -None- means only Read All Properties will match.
Write PropertyADS_RIGHT_DS_WRITE_PROPThe right to write properties of the object of the selected attribute, if no attrtibute is selected, then it checks for write all properties. Selecting -None- means only Write All Properties will match.
Create childADS_RIGHT_DS_CREATE_CHILDThe right to create child objects of the selected object, if no object is selected, then it checks for create all child rights. Selecting -None- means only Create All Child will match.
Delete childADS_RIGHT_DS_DELETE_CHILDThe right to delete child objects of the selected object, if no object is selected, then it checks for delete all child rights. Selecting -None- means only Delete All Child will match.
Validated RightsADS_RIGHT_DS_SELFThe right to perform an operation controlled by a validated write access right for the selected right, if no right is selected it will check for all validated rights. Selecting -None- means only All Validated Rights will match.
Extended RightsADS_RIGHT_DS_CONTROL_ACCESSThe right to perform an operation controlled by an extended access right of the selected right, if no right is selected, then it will check for all extended rights. Selecting -None- means only All Extended Rights will match.