System.Threading.AccessControl Represents a set of access rights allowed or denied for a user or group. This class cannot be inherited. Initializes a new instance of the class, specifying the user or group the rule applies to, the access rights, and whether the specified access rights are allowed or denied. The user or group the rule applies to. Must be of type or a type such as that can be converted to type . A bitwise combination of values specifying the rights allowed or denied. One of the values specifying whether the rights are allowed or denied. specifies an invalid value. -or- specifies an invalid value. is . -or- is zero. is neither of type nor of a type such as that can be converted to type . Initializes a new instance of the class, specifying the name of the user or group the rule applies to, the access rights, and whether the specified access rights are allowed or denied. The name of the user or group the rule applies to. A bitwise combination of values specifying the rights allowed or denied. One of the values specifying whether the rights are allowed or denied. specifies an invalid value. -or- specifies an invalid value. is zero. is . -or- is a zero-length string. -or- is longer than 512 characters. Gets the rights allowed or denied by the access rule. A bitwise combination of values indicating the rights allowed or denied by the access rule. Represents a set of access rights to be audited for a user or group. This class cannot be inherited. Initializes a new instance of the class, specifying the user or group to audit, the rights to audit, and whether to audit success, failure, or both. The user or group the rule applies to. Must be of type or a type such as that can be converted to type . A bitwise combination of values specifying the kinds of access to audit. A bitwise combination of values specifying whether to audit success, failure, or both. specifies an invalid value. -or- specifies an invalid value. is . -or- is zero. is neither of type nor of a type such as that can be converted to type . Gets the access rights affected by the audit rule. A bitwise combination of values that indicates the rights affected by the audit rule. Specifies the access control rights that can be applied to named system event objects. The right to change the security and audit rules associated with a named event. The right to delete a named event. The right to exert full control over a named event, and to modify its access rules and audit rules. The right to set or reset the signaled state of a named event. The right to open and copy the access rules and audit rules for a named event. The right to wait on a named event. The right to change the owner of a named event. Represents the Windows access control security applied to a named system wait handle. This class cannot be inherited. Initializes a new instance of the class with default values. Creates a new access control rule for the specified user, with the specified access rights, access control, and flags. An that identifies the user or group the rule applies to. A bitwise combination of values specifying the access rights to allow or deny, cast to an integer. Meaningless for named wait handles, because they have no hierarchy. Meaningless for named wait handles, because they have no hierarchy. Meaningless for named wait handles, because they have no hierarchy. One of the values specifying whether the rights are allowed or denied. , , , or specifies an invalid value. is . -or- is zero. is neither of type , nor of a type such as that can be converted to type . An object representing the specified rights for the specified user. Searches for a matching access control rule with which the new rule can be merged. If none are found, adds the new rule. The access control rule to add. is . Searches for an audit rule with which the new rule can be merged. If none are found, adds the new rule. The audit rule to add. The user specified by this rule determines the search. is . Creates a new audit rule, specifying the user the rule applies to, the access rights to audit, and the outcome that triggers the audit rule. An that identifies the user or group the rule applies to. A bitwise combination of values specifying the access rights to audit, cast to an integer. Meaningless for named wait handles, because they have no hierarchy. Meaningless for named wait handles, because they have no hierarchy. Meaningless for named wait handles, because they have no hierarchy. A bitwise combination of values specifying whether to audit successful access, failed access, or both. , , , or specifies an invalid value. is . -or- is zero. is neither of type , nor of a type such as that can be converted to type . An object representing the specified audit rule for the specified user. The return type of the method is the base class, , but the return value can be cast safely to the derived class. Searches for an access control rule with the same user and (allow or deny) as the specified access rule, and with compatible inheritance and propagation flags; if such a rule is found, the rights contained in the specified access rule are removed from it. An that specifies the user and to search for, and a set of inheritance and propagation flags that a matching rule, if found, must be compatible with. Specifies the rights to remove from the compatible rule, if found. is . if a compatible rule is found; otherwise, . Searches for all access control rules with the same user and (allow or deny) as the specified rule and, if found, removes them. An that specifies the user and to search for. Any rights specified by this rule are ignored. is . Searches for an access control rule that exactly matches the specified rule and, if found, removes it. The to remove. is . Searches for an audit rule with the same user as the specified rule, and with compatible inheritance and propagation flags; if a compatible rule is found, the rights contained in the specified rule are removed from it. An that specifies the user to search for and a set of inheritance and propagation flags that a matching rule, if found, must be compatible with. Specifies the rights to remove from the compatible rule, if found. is . if a compatible rule is found; otherwise, . Searches for all audit rules with the same user as the specified rule and, if found, removes them. An that specifies the user to search for. Any rights specified by this rule are ignored. is . Searches for an audit rule that exactly matches the specified rule and, if found, removes it. The to remove. is . Removes all access control rules with the same user as the specified rule, regardless of , and then adds the specified rule. The to add. The user specified by this rule determines the rules to remove before this rule is added. is . Removes all access control rules with the same user and (allow or deny) as the specified rule, and then adds the specified rule. The to add. The user and of this rule determine the rules to remove before this rule is added. is . Removes all audit rules with the same user as the specified rule, regardless of the value, and then adds the specified rule. The to add. The user specified by this rule determines the rules to remove before this rule is added. is . Gets the enumeration type that the class uses to represent access rights. A object representing the enumeration. Gets the type that the class uses to represent access rules. A object representing the class. Gets the type that the class uses to represent audit rules. A object representing the class. Represents a set of access rights allowed or denied for a user or group. This class cannot be inherited. Initializes a new instance of the class, specifying the user or group the rule applies to, the access rights, and whether the specified access rights are allowed or denied. The user or group the rule applies to. Must be of type or a type such as that can be converted to type . A bitwise combination of values specifying the rights allowed or denied. One of the values specifying whether the rights are allowed or denied. specifies an invalid value. -or- specifies an invalid value. is . -or- is zero. is neither of type nor of a type such as that can be converted to type . Initializes a new instance of the class, specifying the name of the user or group the rule applies to, the access rights, and whether the specified access rights are allowed or denied. The name of the user or group the rule applies to. A bitwise combination of values specifying the rights allowed or denied. One of the values specifying whether the rights are allowed or denied. specifies an invalid value. -or- specifies an invalid value. is zero. is . -or- is a zero-length string. -or- is longer than 512 characters. Gets the rights allowed or denied by the access rule. A bitwise combination of values indicating the rights allowed or denied by the access rule. Represents a set of access rights to be audited for a user or group. This class cannot be inherited. Initializes a new instance of the class, specifying the user or group to audit, the rights to audit, and whether to audit success, failure, or both. The user or group the rule applies to. Must be of type or a type such as that can be converted to type . A bitwise combination of values specifying the kinds of access to audit. A bitwise combination of values specifying whether to audit success, failure, or both. specifies an invalid value. -or- specifies an invalid value. is . -or- is zero. is neither of type nor of a type such as that can be translated to type . Gets the access rights affected by the audit rule. A bitwise combination of values that indicates the rights affected by the audit rule. Specifies the access control rights that can be applied to named system mutex objects. The right to change the security and audit rules associated with a named mutex. The right to delete a named mutex. The right to exert full control over a named mutex, and to modify its access rules and audit rules. The right to release a named mutex. The right to open and copy the access rules and audit rules for a named mutex. The right to wait on a named mutex. The right to change the owner of a named mutex. Represents the Windows access control security for a named mutex. This class cannot be inherited. Initializes a new instance of the class with default values. Initializes a new instance of the class with the specified sections of the access control security rules from the system mutex with the specified name. The name of the system mutex whose access control security rules are to be retrieved. A combination of flags specifying the sections to retrieve. There is no system object with the specified name. Creates a new access control rule for the specified user, with the specified access rights, access control, and flags. An that identifies the user or group the rule applies to. A bitwise combination of values specifying the access rights to allow or deny, cast to an integer. Meaningless for named mutexes, because they have no hierarchy. Meaningless for named mutexes, because they have no hierarchy. Meaningless for named mutexes, because they have no hierarchy. One of the values specifying whether the rights are allowed or denied. , , , or specifies an invalid value. is . -or- is zero. is neither of type , nor of a type such as that can be converted to type . A object representing the specified rights for the specified user. Searches for a matching access control rule with which the new rule can be merged. If none are found, adds the new rule. The access control rule to add. is . cannot be mapped to a known identity. Searches for an audit rule with which the new rule can be merged. If none are found, adds the new rule. The audit rule to add. The user specified by this rule determines the search. Creates a new audit rule, specifying the user the rule applies to, the access rights to audit, and the outcome that triggers the audit rule. An that identifies the user or group the rule applies to. A bitwise combination of values specifying the access rights to audit, cast to an integer. Meaningless for named wait handles, because they have no hierarchy. Meaningless for named wait handles, because they have no hierarchy. Meaningless for named wait handles, because they have no hierarchy. A bitwise combination of values that specify whether to audit successful access, failed access, or both. , , , or specifies an invalid value. is . -or- is zero. is neither of type , nor of a type such as that can be converted to type . A object representing the specified audit rule for the specified user. The return type of the method is the base class, , but the return value can be cast safely to the derived class. Searches for an access control rule with the same user and (allow or deny) as the specified rule, and with compatible inheritance and propagation flags; if such a rule is found, the rights contained in the specified access rule are removed from it. A that specifies the user and to search for, and a set of inheritance and propagation flags that a matching rule, if found, must be compatible with. Specifies the rights to remove from the compatible rule, if found. is . if a compatible rule is found; otherwise . Searches for all access control rules with the same user and (allow or deny) as the specified rule and, if found, removes them. A that specifies the user and to search for. Any rights specified by this rule are ignored. is . Searches for an access control rule that exactly matches the specified rule and, if found, removes it. The to remove. is . Searches for an audit control rule with the same user as the specified rule, and with compatible inheritance and propagation flags; if a compatible rule is found, the rights contained in the specified rule are removed from it. A that specifies the user to search for, and a set of inheritance and propagation flags that a matching rule, if found, must be compatible with. Specifies the rights to remove from the compatible rule, if found. is . if a compatible rule is found; otherwise, . Searches for all audit rules with the same user as the specified rule and, if found, removes them. A that specifies the user to search for. Any rights specified by this rule are ignored. is . Searches for an audit rule that exactly matches the specified rule and, if found, removes it. The to be removed. is . Removes all access control rules with the same user as the specified rule, regardless of , and then adds the specified rule. The to add. The user specified by this rule determines the rules to remove before this rule is added. is . Removes all access control rules with the same user and (allow or deny) as the specified rule, and then adds the specified rule. The to add. The user and of this rule determine the rules to remove before this rule is added. is . Removes all audit rules with the same user as the specified rule, regardless of the value, and then adds the specified rule. The to add. The user specified by this rule determines the rules to remove before this rule is added. is . Gets the enumeration that the class uses to represent access rights. A object representing the enumeration. Gets the type that the class uses to represent access rules. A object representing the class. Gets the type that the class uses to represent audit rules. A object representing the class. Represents a set of access rights allowed or denied for a user or group. This class cannot be inherited. Initializes a new instance of the class, specifying the user or group the rule applies to, the access rights, and whether the specified access rights are allowed or denied. The user or group the rule applies to. Must be of type or a type such as that can be converted to type . A bitwise combination of values specifying the rights allowed or denied. One of the values specifying whether the rights are allowed or denied. specifies an invalid value. -or- specifies an invalid value. is . -or- is zero. is neither of type nor of a type such as that can be converted to type . Initializes a new instance of the class, specifying the name of the user or group the rule applies to, the access rights, and whether the specified access rights are allowed or denied. The name of the user or group the rule applies to. A bitwise combination of values specifying the rights allowed or denied. One of the values specifying whether the rights are allowed or denied. specifies an invalid value. -or- specifies an invalid value. is zero. is . -or- is a zero-length string. -or- is longer than 512 characters. Gets the rights allowed or denied by the access rule. A bitwise combination of values indicating the rights allowed or denied by the access rule. Represents a set of access rights to be audited for a user or group. This class cannot be inherited. Initializes a new instance of the class, specifying the user or group to audit, the rights to audit, and whether to audit success, failure, or both. The user or group the rule applies to. Must be of type or a type such as that can be converted to type . A bitwise combination of values specifying the kinds of access to audit. A bitwise combination of values specifying whether to audit success, failure, or both. specifies an invalid value. -or- specifies an invalid value. is . -or- is zero. is neither of type nor of a type such as that can be converted to type . Gets the access rights affected by the audit rule. A bitwise combination of values that indicates the rights affected by the audit rule. Specifies the access control rights that can be applied to named system semaphore objects. The right to change the security and audit rules associated with a named semaphore. The right to delete a named semaphore. The right to exert full control over a named semaphore, and to modify its access rules and audit rules. The right to release a named semaphore. The right to open and copy the access rules and audit rules for a named semaphore. The right to wait on a named semaphore. The right to change the owner of a named semaphore. Represents the Windows access control security for a named semaphore. This class cannot be inherited. Initializes a new instance of the class with default values. Initializes a new instance of the class with the specified sections of the access control security rules from the system semaphore with the specified name. The name of the system semaphore whose access control security rules are to be retrieved. A combination of flags specifying the sections to retrieve. Creates a new access control rule for the specified user, with the specified access rights, access control, and flags. An that identifies the user or group the rule applies to. A bitwise combination of values specifying the access rights to allow or deny, cast to an integer. Meaningless for named semaphores, because they have no hierarchy. Meaningless for named semaphores, because they have no hierarchy. Meaningless for named semaphores, because they have no hierarchy. One of the values specifying whether the rights are allowed or denied. , , , or specifies an invalid value. is . -or- is zero. is neither of type , nor of a type such as that can be converted to type . A object representing the specified rights for the specified user. Searches for a matching rule with which the new rule can be merged. If none are found, adds the new rule. The access control rule to add. is . Searches for an audit rule with which the new rule can be merged. If none are found, adds the new rule. The audit rule to add. The user specified by this rule determines the search. Creates a new audit rule, specifying the user the rule applies to, the access rights to audit, and the outcome that triggers the audit rule. An that identifies the user or group the rule applies to. A bitwise combination of values specifying the access rights to audit, cast to an integer. Meaningless for named wait handles, because they have no hierarchy. Meaningless for named wait handles, because they have no hierarchy. Meaningless for named wait handles, because they have no hierarchy. A bitwise combination of values that specify whether to audit successful access, failed access, or both. , , , or specifies an invalid value. is . -or- is zero. is neither of type , nor of a type such as that can be converted to type . A object representing the specified audit rule for the specified user. The return type of the method is the base class, , but the return value can be cast safely to the derived class. Searches for an access control rule with the same user and (allow or deny) as the specified rule, and with compatible inheritance and propagation flags; if such a rule is found, the rights contained in the specified access rule are removed from it. A that specifies the user and to search for, and a set of inheritance and propagation flags that a matching rule, if found, must be compatible with. Specifies the rights to remove from the compatible rule, if found. is . if a compatible rule is found; otherwise . Searches for all access control rules with the same user and (allow or deny) as the specified rule and, if found, removes them. A that specifies the user and to search for. Any rights specified by this rule are ignored. is . Searches for an access control rule that exactly matches the specified rule and, if found, removes it. The to remove. is . Searches for an audit control rule with the same user as the specified rule, and with compatible inheritance and propagation flags; if a compatible rule is found, the rights contained in the specified rule are removed from it. A that specifies the user to search for, and a set of inheritance and propagation flags that a matching rule, if found, must be compatible with. Specifies the rights to remove from the compatible rule, if found. is . if a compatible rule is found; otherwise, . Searches for all audit rules with the same user as the specified rule and, if found, removes them. A that specifies the user to search for. Any rights specified by this rule are ignored. is . Searches for an audit rule that exactly matches the specified rule and, if found, removes it. The to remove. is . Removes all access control rules with the same user as the specified rule, regardless of , and then adds the specified rule. The to add. The user specified by this rule determines the rules to remove before this rule is added. is . Removes all access control rules with the same user and (allow or deny) as the specified rule, and then adds the specified rule. The to add. The user and of this rule determine the rules to remove before this rule is added. is . Removes all audit rules with the same user as the specified rule, regardless of the value, and then adds the specified rule. The to add. The user specified by this rule determines the rules to remove before this rule is added. is . Gets the enumeration that the class uses to represent access rights. A object representing the enumeration. Gets the type that the class uses to represent access rules. A object representing the class. Gets the type that the class uses to represent audit rules. A object representing the class. Provides a Windows-specific extension method for creating objects with specific access control list (ACL) security. Gets or creates an instance, allowing a instance to be optionally specified to set it during the event creation. to set the initial state to signaled if the named event is created as a result of this call; to set it to non-signaled. One of the enum values that determines whether the event resets automatically or manually. The name, if the synchronization object is to be shared with other processes; otherwise, or an empty string. The name is case-sensitive. The backslash character (\) is reserved and may only be used to specify a namespace. For more information on namespaces, see the remarks section. There may be further restrictions on the name depending on the operating system. For example, on Unix-based operating systems, the name after excluding the namespace must be a valid file name. When this method returns, this argument is always set to if a local event is created; that is, when is or . If has a valid, non-empty value, this argument is set to when the system event is created, or it is set to if an existing system event is found with that name. The optional Windows access control security to apply. The enum value was out of legal range. -or- .NET Framework only: is longer than MAX_PATH (260 characters). The enum value was out of legal range. In some cases is thrown instead. is invalid. This can be for various reasons, including some restrictions that may be placed by the operating system, such as an unknown prefix or invalid characters. Note that the name and common prefixes "Global\" and "Local\" are case-sensitive. -or- There was some other error. The HResult property may provide more information. Windows only: specified an unknown namespace. See Object Names for more information. The is too long. Length restrictions may depend on the operating system or configuration. A synchronization object with the provided cannot be created. A synchronization object of a different type might have the same name. The named event exists, but the user does not have the desired security access. .NET Framework only: The length is beyond MAX_PATH (260 characters). An object that represents an event wait handle as requested. Opens a specified named event wait handle, if it already exists, and applies the desired access rights. The name of the event wait handle to be opened. If it's prefixed by "Global", it refers to a machine-wide event wait handle. If it's prefixed by "Local", or doesn't have a prefix, it refers to a session-wide event wait handle. Both prefix and name are case-sensitive. The desired access rights to apply to the returned event wait handle. is . is an empty string. The named event wait handle does not exist or is invalid. The path was not found. A Win32 error occurred. The named event wait handle exists, but the user does not have the security access required to use it. An existing named event wait handle. Tries to open a specified named event wait handle, if it already exists, applies the desired access rights, and returns a value that indicates whether the operation succeeded. The name of the event wait handle to be opened. If it's prefixed by "Global", it refers to a machine-wide event wait handle. If it's prefixed by "Local", or doesn't have a prefix, it refers to a session-wide event wait handle. Both prefix and name are case-sensitive. The desired access rights to apply to the returned event wait handle. When this method returns , contains an object that represents the named event wait handle if the call succeeded, or otherwise. This parameter is treated as uninitialized. is is an empty string. A Win32 error occurred. The named event wait handle exists, but the user does not have the security access required to use it. if the named event wait handle was opened successfully; otherwise, . Provides a Windows-specific extension method for creating objects with specific access control list (ACL) security. Gets or creates instance, allowing a to be optionally specified to set it during the mutex creation. to give the calling thread initial ownership of the named system mutex if the named system mutex is created as a result of this call; otherwise, . The name, if the synchronization object is to be shared with other processes; otherwise, or an empty string. The name is case-sensitive. The backslash character (\) is reserved and may only be used to specify a namespace. For more information on namespaces, see the remarks section. There may be further restrictions on the name depending on the operating system. For example, on Unix-based operating systems, the name after excluding the namespace must be a valid file name. When this method returns, this argument is always set to if a local mutex is created; that is, when is or . If has a valid non-empty value, this argument is set to when the system mutex is created, or it is set to if an existing system mutex is found with that name. This parameter is passed uninitialized. The optional mutex access control security to apply. .NET Framework only: is longer than MAX_PATH (260 characters). is invalid. This can be for various reasons, including some restrictions that may be placed by the operating system, such as an unknown prefix or invalid characters. Note that the name and common prefixes "Global\" and "Local\" are case-sensitive. -or- There was some other error. The HResult property may provide more information. Windows only: specified an unknown namespace. See Object Names for more information. The is too long. Length restrictions may depend on the operating system or configuration. A synchronization object with the provided cannot be created. A synchronization object of a different type might have the same name. An object that represents a system mutex, if named, or a local mutex, if nameless. Opens a specified named mutex, if it already exists, and applies the desired access rights. The name of the mutex to be opened. If it's prefixed by "Global", it refers to a machine-wide mutex. If it's prefixed by "Local", or doesn't have a prefix, it refers to a session-wide mutex. Both prefix and name are case-sensitive. The desired access rights to apply to the returned mutex. is . is an empty string. The named mutex does not exist or is invalid. The path was not found. A Win32 error occurred. The named mutex exists, but the user does not have the security access required to use it. An existing named mutex. Tries to open a specified named mutex, if it already exists, applies the desired access rights, and returns a value that indicates whether the operation succeeded. The name of the mutex to be opened. If it's prefixed by "Global", it refers to a machine-wide mutex. If it's prefixed by "Local", or doesn't have a prefix, it refers to a session-wide mutex. Both prefix and name are case-sensitive. The desired access rights to apply to the returned mutex. When this method returns , contains an object that represents the named mutex if the call succeeded, or otherwise. This parameter is treated as uninitialized. is is an empty string. A Win32 error occurred. The named mutex exists, but the user does not have the security access required to use it. if the named mutex was opened successfully; otherwise, . Provides a Windows-specific extension method for creating objects with specific access control list (ACL) security. Gets or creates an instance, allowing a instance to be optionally specified to set it during the event creation. The initial number of requests for the semaphore that can be satisfied concurrently. The maximum number of requests for the semaphore that can be satisfied concurrently. The name, if the synchronization object is to be shared with other processes; otherwise, or an empty string. The name is case-sensitive. The backslash character (\) is reserved and may only be used to specify a namespace. For more information on namespaces, see the remarks section. There may be further restrictions on the name depending on the operating system. For example, on Unix-based operating systems, the name after excluding the namespace must be a valid file name. When this method returns, this argument is always set to if a local semaphore is created; that is, when is or . If has a valid, non-empty value, this argument is set to when the system semaphore is created, or it is set to if an existing system semaphore is found with that name. This parameter is passed uninitialized. The optional semaphore access control security to apply. is a negative number. -or- is not a positive number. is greater than . -or- .NET Framework only: is longer than MAX_PATH (260 characters). is invalid. This can be for various reasons, including some restrictions that may be placed by the operating system, such as an unknown prefix or invalid characters. Note that the name and common prefixes "Global\" and "Local\" are case-sensitive. -or- There was some other error. The HResult property may provide more information. Windows only: specified an unknown namespace. See Object Names for more information. The is too long. Length restrictions may depend on the operating system or configuration. A synchronization object with the provided cannot be created. A synchronization object of a different type might have the same name. An object that represents a system semaphore, if named, or a local semaphore, if nameless. Opens a specified named semaphore, if it already exists, and applies the desired access rights. The name of the semaphore to be opened. If it's prefixed by "Global", it refers to a machine-wide semaphore. If it's prefixed by "Local", or doesn't have a prefix, it refers to a session-wide semaphore. Both prefix and name are case-sensitive. The desired access rights to apply to the returned semaphore. is . is an empty string. The named semaphore does not exist or is invalid. The path was not found. -or- A Win32 error occurred. The named semaphore exists, but the user does not have the security access required to use it. An existing named semaphore. Tries to open a specified named semaphore, if it already exists, applies the desired access rights, and returns a value that indicates whether the operation succeeded. The name of the semaphore to be opened. If it's prefixed by "Global", it refers to a machine-wide semaphore. If it's prefixed by "Local", or doesn't have a prefix, it refers to a session-wide semaphore. Both prefix and name are case-sensitive. The desired access rights to apply to the returned semaphore. When this method returns , contains an object that represents the named semaphore if the call succeeded, or otherwise. This parameter is treated as uninitialized. is is an empty string. A Win32 error occurred. The named semaphore exists, but the user does not have the security access required to use it. if the named semaphore was opened successfully; otherwise, . Provides Windows-specific extension methods for managing the access control list (ACL) security descriptors for , , and . Returns the security descriptors for the specified . The event wait handle from which the security descriptors should be returned. The security descriptors for the specified . Returns the security descriptors for the specified . The mutex from which the security descriptors should be returned. The security descriptors for the specified . Returns the security descriptors for the specified . The semaphore from which the security descriptors should be returned. The security descriptors for the specified semaphore. Sets the security descriptors for the specified event wait handle. The event wait handle onto which the will be applied. The security descriptors to apply to the specified . is . Sets the security descriptors for the specified mutex. The mutex onto which the will be applied. The security descriptors to apply to the specified . is . Sets the security descriptors for the specified semaphore. The semaphore onto which the will be applied. The security descriptors to apply to the specified . is .