Skip to content

Commit afe6320

Browse files
authored
Added list of all rights that can be set 📜
All of the Options you can use: Replace a process level token (SeAssignPrimaryTokenPrivilege) Generate security audits (SeAuditPrivilege) Back up files and directories (SeBackupPrivilege) Log on as a batch job (SeBatchLogonRight) Bypass traverse checking (SeChangeNotifyPrivilege) Create global objects (SeCreateGlobalPrivilege) Create a pagefile (SeCreatePagefilePrivilege) Create permanent shared objects (SeCreatePermanentPrivilege) Create symbolic links (SeCreateSymbolicLinkPrivilege) Create a token object (SeCreateTokenPrivilege) Debug programs (SeDebugPrivilege) Obtain an impersonation token for another user in the same session (SeDelegateSessionUserImpersonatePrivilege) Deny log on as a batch job (SeDenyBatchLogonRight) Deny log on locally (SeDenyInteractiveLogonRight) Deny access to this computer from the network (SeDenyNetworkLogonRight) Deny log on through Remote Desktop Services (SeDenyRemoteInteractiveLogonRight) Deny log on as a service (SeDenyServiceLogonRight) Enable computer and user accounts to be trusted for delegation (SeEnableDelegationPrivilege) Impersonate a client after authentication (SeImpersonatePrivilege) Increase scheduling priority (SeIncreaseBasePriorityPrivilege) Adjust memory quotas for a process (SeIncreaseQuotaPrivilege) Increase a process working set (SeIncreaseWorkingSetPrivilege) Allow log on locally (SeInteractiveLogonRight) Load and unload device drivers (SeLoadDriverPrivilege) Lock pages in memory (SeLockMemoryPrivilege) Add workstations to domain (SeMachineAccountPrivilege) Perform volume maintenance tasks (SeManageVolumePrivilege) Access this computer from the network (SeNetworkLogonRight) Profile single process (SeProfileSingleProcessPrivilege) Modify an object label (SeRelabelPrivilege) Allow log on through Remote Desktop Services (SeRemoteInteractiveLogonRight) Force shutdown from a remote system (SeRemoteShutdownPrivilege) Restore files and directories (SeRestorePrivilege) Manage auditing and security log (SeSecurityPrivilege) Log on as a service (SeServiceLogonRight) Shut down the system (SeShutdownPrivilege) Synchronize directory service data (SeSyncAgentPrivilege) Modify firmware environment values (SeSystemEnvironmentPrivilege) Profile system performance (SeSystemProfilePrivilege) Change the system time (SeSystemtimePrivilege) Take ownership of files or other objects (SeTakeOwnershipPrivilege) Act as part of the operating system (SeTcbPrivilege) Change the time zone (SeTimeZonePrivilege) Access Credential Manager as a trusted caller (SeTrustedCredManAccessPrivilege) Remove computer from docking station (SeUndockPrivilege)
1 parent 048e121 commit afe6320

File tree

1 file changed

+53
-15
lines changed

1 file changed

+53
-15
lines changed

Powershell/General Functions/Set-UserRights.ps1

Lines changed: 53 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -25,17 +25,52 @@
2525
Name of the right you want to add to: SeServiceLogonRight
2626
There is no default for this argument
2727
28-
Some (but not all) of the Options you can use:
29-
"Log on as a batch job (SeBatchLogonRight)"
30-
"Allow log on locally (SeInteractiveLogonRight)"
31-
"Access this computer from the network (SeNetworkLogonRight)"
32-
"Allow log on through Remote Desktop Services (SeRemoteInteractiveLogonRight)"
33-
"Log on as a service (SeServiceLogonRight)"
34-
"Deny log on as a batch job (SeDenyBatchLogonRight)"
35-
"Deny log on locally (SeDenyInteractiveLogonRight)"
36-
"Deny access to this computer from the network (SeDenyNetworkLogonRight)"
37-
"Deny log on through Remote Desktop Services (SeDenyRemoteInteractiveLogonRight)"
38-
"Deny log on as a service (SeDenyServiceLogonRight)"
28+
All of the Options you can use:
29+
Replace a process level token (SeAssignPrimaryTokenPrivilege)
30+
Generate security audits (SeAuditPrivilege)
31+
Back up files and directories (SeBackupPrivilege)
32+
Log on as a batch job (SeBatchLogonRight)
33+
Bypass traverse checking (SeChangeNotifyPrivilege)
34+
Create global objects (SeCreateGlobalPrivilege)
35+
Create a pagefile (SeCreatePagefilePrivilege)
36+
Create permanent shared objects (SeCreatePermanentPrivilege)
37+
Create symbolic links (SeCreateSymbolicLinkPrivilege)
38+
Create a token object (SeCreateTokenPrivilege)
39+
Debug programs (SeDebugPrivilege)
40+
Obtain an impersonation token for another user in the same session (SeDelegateSessionUserImpersonatePrivilege)
41+
Deny log on as a batch job (SeDenyBatchLogonRight)
42+
Deny log on locally (SeDenyInteractiveLogonRight)
43+
Deny access to this computer from the network (SeDenyNetworkLogonRight)
44+
Deny log on through Remote Desktop Services (SeDenyRemoteInteractiveLogonRight)
45+
Deny log on as a service (SeDenyServiceLogonRight)
46+
Enable computer and user accounts to be trusted for delegation (SeEnableDelegationPrivilege)
47+
Impersonate a client after authentication (SeImpersonatePrivilege)
48+
Increase scheduling priority (SeIncreaseBasePriorityPrivilege)
49+
Adjust memory quotas for a process (SeIncreaseQuotaPrivilege)
50+
Increase a process working set (SeIncreaseWorkingSetPrivilege)
51+
Allow log on locally (SeInteractiveLogonRight)
52+
Load and unload device drivers (SeLoadDriverPrivilege)
53+
Lock pages in memory (SeLockMemoryPrivilege)
54+
Add workstations to domain (SeMachineAccountPrivilege)
55+
Perform volume maintenance tasks (SeManageVolumePrivilege)
56+
Access this computer from the network (SeNetworkLogonRight)
57+
Profile single process (SeProfileSingleProcessPrivilege)
58+
Modify an object label (SeRelabelPrivilege)
59+
Allow log on through Remote Desktop Services (SeRemoteInteractiveLogonRight)
60+
Force shutdown from a remote system (SeRemoteShutdownPrivilege)
61+
Restore files and directories (SeRestorePrivilege)
62+
Manage auditing and security log (SeSecurityPrivilege)
63+
Log on as a service (SeServiceLogonRight)
64+
Shut down the system (SeShutdownPrivilege)
65+
Synchronize directory service data (SeSyncAgentPrivilege)
66+
Modify firmware environment values (SeSystemEnvironmentPrivilege)
67+
Profile system performance (SeSystemProfilePrivilege)
68+
Change the system time (SeSystemtimePrivilege)
69+
Take ownership of files or other objects (SeTakeOwnershipPrivilege)
70+
Act as part of the operating system (SeTcbPrivilege)
71+
Change the time zone (SeTimeZonePrivilege)
72+
Access Credential Manager as a trusted caller (SeTrustedCredManAccessPrivilege)
73+
Remove computer from docking station (SeUndockPrivilege)
3974
4075
.Example
4176
Usage:
@@ -224,18 +259,21 @@ PROCESS
224259
if ($ActionType -eq 'Adding')
225260
{
226261
# If right has no value it needs to be added
227-
if($sids -eq $null) {
262+
if ($sids -eq $null)
263+
{
228264
$sids = "$right = *$sid"
229265
$sidList = $sids
230-
} else {
266+
}
267+
else
268+
{
231269
$sidList = "$sids,*$sid"
232270
}
233271
}
234272
elseif ($ActionType -eq 'Removing')
235273
{
236274
$sidList = "$($sids.Replace("*$sid", '').Replace("$Username", '').Replace(",,", ',').Replace("= ,", '= '))"
237275
}
238-
Write-Verbose $sidlist
276+
Write-Verbose $sidlist
239277
foreach ($line in @("[Unicode]", "Unicode=yes", "[System Access]", "[Event Audit]", "[Registry Values]", "[Version]", "signature=`"`$CHICAGO$`"", "Revision=1", "[Profile Description]", "Description=$ActionType `"$UserLogonRight`" right for user account: $Username", "[Privilege Rights]", "$sidList"))
240278
{
241279
Add-Content $import $line
@@ -386,7 +424,7 @@ PROCESS
386424
else
387425
{
388426

389-
<# Edit line 399 to modify the default command run when this script is executed.
427+
<# Edit line 437 to modify the default command run when this script is executed.
390428
Example:
391429
Set-UserRights -AddRight -UserRight SeServiceLogonRight, SeBatchLogonRight -ComputerName $env:COMPUTERNAME, SQL.contoso.com -UserName CONTOSO\User1, CONTOSO\User2
392430
or

0 commit comments

Comments
 (0)