IBM Endpoint Manager Inspectors Reference |
Win: Windows
Lin: Red Hat and SUSE Linux
Sol: SUN Solaris
HPUX: Hewlett-Packard UNIX version
AIX: IBM AIX
Mac: Apple Macintosh
Ubu: Ubuntu/Debian
WM: Windows Mobile
The version (e.g. Lin:8.1) corresponds to the version of the IEM product (8.1) in which the inspector was introduced in the client on that platform.
The version number is not shown if it is less than 8.0.
These inspectors retrieve security and access settings.
Declaration | Description | Platforms (?) |
Declaration | Return type | Description | Platforms (?) |
effective access mode for <security account> of <access control list> | <integer> Plural: effective access modes for | Returns an integer corresponding to the access mode for the trustee specified by the security account of the given access control list. | Win:8.0 |
effective access mode for <string> of <access control list> | <integer> Plural: effective access modes for | Returns an integer corresponding to the access mode for the trustee specified by <string> of the given access control list. | Win |
effective access system security permission for <security account> of <access control list> | <boolean> Plural: effective access system security permissions for | Returns TRUE if the trustee specified by the security account has access system security permissions on the given access control list. | Win:8.0 |
effective access system security permission for <string> of <access control list> | <boolean> Plural: effective access system security permissions for | Returns TRUE if the trustee specified by <string> has access system security permissions on the given access control list. | Win |
effective append permission for <security account> of <access control list> | <boolean> Plural: effective append permissions for | Returns TRUE if the trustee specified by the security account has append permissions on the given access control list. | Win:8.0 |
effective append permission for <string> of <access control list> | <boolean> Plural: effective append permissions for | Returns TRUE if the trustee specified by <string> has append permissions on the given access control list. | Win |
effective change notification permission for <security account> of <access control list> | <boolean> Plural: effective change notification permissions for | Returns TRUE if the trustee specified by the security account has change notification permissions on the given access control list. | Win:8.0 |
effective change notification permission for <string> of <access control list> | <boolean> Plural: effective change notification permissions for | Returns TRUE if the trustee specified by <string> has change notification permissions on the given access control list. | Win |
effective create file permission for <security account> of <access control list> | <boolean> Plural: effective create file permissions for | Returns TRUE if the trustee specified by the security account has file creation permissions on the given access control list. | Win:8.0 |
effective create file permission for <string> of <access control list> | <boolean> Plural: effective create file permissions for | Returns TRUE if the trustee specified by <string> has file creation permissions on the given access control list. | Win |
effective create folder permission for <security account> of <access control list> | <boolean> Plural: effective create folder permissions for | Returns TRUE if the trustee specified by the security account has folder creation permissions on the given access control list. | Win:8.0 |
effective create folder permission for <string> of <access control list> | <boolean> Plural: effective create folder permissions for | Returns TRUE if the trustee specified by <string> has folder creation permissions on the given access control list. | Win |
effective create link permission for <security account> of <access control list> | <boolean> Plural: effective create link permissions for | Returns TRUE if the trustee specified by the security account has link creation permissions on the given access control list. | Win:8.0 |
effective create link permission for <string> of <access control list> | <boolean> Plural: effective create link permissions for | Returns TRUE if the trustee specified by <string> has link creation permissions on the given access control list. | Win |
effective create subkey permission for <security account> of <access control list> | <boolean> Plural: effective create subkey permissions for | Returns TRUE if the trustee specified by the security account has subkey creation permissions on the given access control list. | Win:8.0 |
effective create subkey permission for <string> of <access control list> | <boolean> Plural: effective create subkey permissions for | Returns TRUE if the trustee specified by <string> has subkey creation permissions on the given access control list. | Win |
effective delete child permission for <security account> of <access control list> | <boolean> Plural: effective delete child permissions for | Returns TRUE if the trustee specified by the security account has child deletion permissions on the given access control list. | Win:8.0 |
effective delete child permission for <string> of <access control list> | <boolean> Plural: effective delete child permissions for | Returns TRUE if the trustee specified by <string> has child deletion permissions on the given access control list. | Win |
effective delete permission for <security account> of <access control list> | <boolean> Plural: effective delete permissions for | Returns TRUE if the trustee specified by the security account has delete permissions on the given access control list. | Win:8.0 |
effective delete permission for <string> of <access control list> | <boolean> Plural: effective delete permissions for | Returns TRUE if the trustee specified by <string> has delete permissions on the given access control list. | Win |
effective enumerate subkeys permission for <security account> of <access control list> | <boolean> Plural: effective enumerate subkeys permissions for | Returns TRUE if the specified security account provides the right to list the subkeys of a registry key. | Win:8.0 |
effective enumerate subkeys permission for <string> of <access control list> | <boolean> Plural: effective enumerate subkeys permissions for | Returns TRUE if the trustee specified by <string> has subkey enumeration permissions on the given access control list. | Win |
effective execute permission for <security account> of <access control list> | <boolean> Plural: effective execute permissions for | Returns TRUE if the trustee specified by the security account has execution permissions on the given access control list. | Win:8.0 |
effective execute permission for <string> of <access control list> | <boolean> Plural: effective execute permissions for | Returns TRUE if the trustee specified by <string> has execution permissions on the given access control list. | Win |
effective generic all permission for <security account> of <access control list> | <boolean> Plural: effective generic all permissions for | Returns TRUE if the trustee specified by the security account has all generic permissions on the given access control list. | Win:8.0 |
effective generic all permission for <string> of <access control list> | <boolean> Plural: effective generic all permissions for | Returns TRUE if the trustee specified by <string> has all generic permissions on the given access control list. | Win |
effective generic execute permission for <security account> of <access control list> | <boolean> Plural: effective generic execute permissions for | Returns TRUE if the trustee specified by the security account has generic execution permissions on the given access control list. | Win:8.0 |
effective generic execute permission for <string> of <access control list> | <boolean> Plural: effective generic execute permissions for | Returns TRUE if the trustee specified by the security account has generic execution permissions on the given access control list. | Win |
effective generic read permission for <security account> of <access control list> | <boolean> Plural: effective generic read permissions for | Returns TRUE if the trustee specified by the security account has generic read permissions on the given access control list. | Win:8.0 |
effective generic read permission for <string> of <access control list> | <boolean> Plural: effective generic read permissions for | Returns TRUE if the trustee specified by the security account has generic read permissions on the given access control list. | Win |
effective generic write permission for <security account> of <access control list> | <boolean> Plural: effective generic write permissions for | Returns TRUE if the trustee specified by the security account has generic write permissions on the given access control list. | Win:8.0 |
effective generic write permission for <string> of <access control list> | <boolean> Plural: effective generic write permissions for | Returns TRUE if the trustee specified by the security account has generic write permissions on the given access control list. | Win |
effective list permission for <security account> of <access control list> | <boolean> Plural: effective list permissions for | Returns TRUE if the trustee specified by the security account has list permissions on the given access control list. | Win:8.0 |
effective list permission for <string> of <access control list> | <boolean> Plural: effective list permissions for | Returns TRUE if the trustee specified by <string> has list permissions on the given access control list. | Win |
effective maximum allowed permission for <security account> of <access control list> | <boolean> Plural: effective maximum allowed permissions for | Returns TRUE if the trustee specified by the security account has maximum allowed permissions on the given access control list. | Win:8.0 |
effective maximum allowed permission for <string> of <access control list> | <boolean> Plural: effective maximum allowed permissions for | Returns TRUE if the trustee specified by the security account has maximum allowed permissions on the given access control list. | Win |
effective query value permission for <security account> of <access control list> | <boolean> Plural: effective query value permissions for | Returns TRUE if the trustee specified by the security account has query value permissions on the given access control list. | Win:8.0 |
effective query value permission for <string> of <access control list> | <boolean> Plural: effective query value permissions for | Returns TRUE if the trustee specified by <string> has query value permissions on the given access control list. | Win |
effective read attributes permission for <security account> of <access control list> | <boolean> Plural: effective read attributes permissions for | Returns TRUE if the trustee specified by the security account has read attribute permissions on the given access control list. | Win:8.0 |
effective read attributes permission for <string> of <access control list> | <boolean> Plural: effective read attributes permissions for | Returns TRUE if the trustee specified by <string> has read attribute permissions on the given access control list. | Win |
effective read control permission for <security account> of <access control list> | <boolean> Plural: effective read control permissions for | Returns TRUE if the trustee specified by the security account has read control permissions on the given access control list. | Win:8.0 |
effective read control permission for <string> of <access control list> | <boolean> Plural: effective read control permissions for | Returns TRUE if the trustee specified by <string> has read control permissions on the given access control list. | Win |
effective read extended attributes permission for <security account> of <access control list> | <boolean> Plural: effective read extended attributes permissions for | Returns TRUE if the trustee specified by the security account has extended read attribute permissions on the given access control list. | Win:8.0 |
effective read extended attributes permission for <string> of <access control list> | <boolean> Plural: effective read extended attributes permissions for | Returns TRUE if the trustee specified by <string> has extended read attribute permissions on the given access control list. | Win |
effective read permission for <security account> of <access control list> | <boolean> Plural: effective read permissions for | Returns TRUE if the trustee specified by the security account has read permissions on the given access control list. | Win:8.0 |
effective read permission for <string> of <access control list> | <boolean> Plural: effective read permissions for | Returns TRUE if the trustee specified by <string> has read permissions on the given access control list. | Win |
effective set value permission for <security account> of <access control list> | <boolean> Plural: effective set value permissions for | Returns TRUE if the trustee specified by the security account has value setting permissions on the given access control list. | Win:8.0 |
effective set value permission for <string> of <access control list> | <boolean> Plural: effective set value permissions for | Returns TRUE if the trustee specified by <string> has value setting permissions on the given access control list. | Win |
effective synchronize permission for <security account> of <access control list> | <boolean> Plural: effective synchronize permissions for | Returns TRUE if the trustee specified by the security account has synchronization permissions on the given access control list. | Win:8.0 |
effective synchronize permission for <string> of <access control list> | <boolean> Plural: effective synchronize permissions for | Returns TRUE if the trustee specified by <string> has synchronization permissions on the given access control list. | Win |
effective traverse permission for <security account> of <access control list> | <boolean> Plural: effective traverse permissions for | Returns TRUE if the trustee specified by the security account has traverse permissions on the given access control list. | Win:8.0 |
effective traverse permission for <string> of <access control list> | <boolean> Plural: effective traverse permissions for | Returns TRUE if the trustee specified by <string> has traverse permissions on the given access control list. | Win |
effective write attributes permission for <security account> of <access control list> | <boolean> Plural: effective write attributes permissions for | Returns TRUE if the trustee specified by the security account has attribute writing permissions on the given access control list. | Win:8.0 |
effective write attributes permission for <string> of <access control list> | <boolean> Plural: effective write attributes permissions for | Returns TRUE if the trustee specified by <string> has attribute writing permissions on the given access control list. | Win |
effective write dac permission for <security account> of <access control list> | <boolean> Plural: effective write dac permissions for | Returns TRUE if the trustee specified by the security account has dac writing permissions on the given access control list. | Win:8.0 |
effective write dac permission for <string> of <access control list> | <boolean> Plural: effective write dac permissions for | Returns TRUE if the trustee specified by <string> has dac writing permissions on the given access control list. | Win |
effective write extended attributes permission for <security account> of <access control list> | <boolean> Plural: effective write extended attributes permissions for | Returns TRUE if the trustee specified by the security account has extended attribute writing permissions on the given access control list. | Win:8.0 |
effective write extended attributes permission for <string> of <access control list> | <boolean> Plural: effective write extended attributes permissions for | Returns TRUE if the trustee specified by <string> has extended attribute writing permissions on the given access control list. | Win |
effective write owner permission for <security account> of <access control list> | <boolean> Plural: effective write owner permissions for | Returns TRUE if the trustee specified by the security account has write owner permissions on the given access control list. | Win:8.0 |
effective write owner permission for <string> of <access control list> | <boolean> Plural: effective write owner permissions for | Returns TRUE if the trustee specified by <string> has write owner permissions on the given access control list. | Win |
effective write permission for <security account> of <access control list> | <boolean> Plural: effective write permissions for | Returns TRUE if the trustee specified by the security account has write permissions on the given access control list. | Win:8.0 |
effective write permission for <string> of <access control list> | <boolean> Plural: effective write permissions for | Returns TRUE if the trustee specified by <string> has write permissions on the given access control list. | Win |
entry of <access control list> | <access control entry> Plural: entries | Iterates the ACEs of an ACL. | Win |
Declaration | Description | Platforms (?) |
entry of <access control list> | Iterates the ACEs of an ACL. | Win |
Declaration | Return type | Description | Platforms (?) |
access mode of <access control entry> | <integer> Plural: access modes | For a discretionary ACL (DACL), this flag indicates whether the ACL allows (1) or denies (3) the specified access rights. | Win |
ace flag of <access control entry> | <integer> Plural: ace flags | Returns the Access Control Entry (ACE) flag, an unsigned 8-bit integer containing a set of one-bit control flags related to inheritance and auditing. The values include:0x01 - OBJECT_INHERIT_ACE0x02 - CONTAINER_INHERIT_ACE0x04 - NO_PROPAGATE_INHERIT_ACE 0x08 - INHERIT_ONLY_ACE0x10 - INHERITED_ACE0x40 - SUCCESSFUL_ACCESS_ACE_FLAG 0x80 - FAILED_ACCESS_ACE_FLAG | Win:8.2 |
ace type of <access control entry> | <integer> Plural: ace types | Returns the Access Control Entry (ACE) type, an unsigned 8-bit integer containing a set of types related to granting and denying access. For more information, see the MSDN article on ACE_HEADER. | Win:8.2 |
append permission of <access control entry> | <boolean> Plural: append permissions | For a file ACE, returns TRUE if the ACE grants or denies append permissions. | Win |
audit failure of <access control entry> | <boolean> Plural: audit failures | Returns TRUE if the ACE header flag has the value 0x80, indicating a failed access attempt. | Win:8.2 |
audit success of <access control entry> | <boolean> Plural: audit successes | Returns TRUE if the ACE header flag has the value 0x40, indicating a successful access attempt. | Win:8.2 |
change notification permission of <access control entry> | <boolean> Plural: change notification permissions | For a registry key ACE, returns TRUE if the ACE grants or denies change notification permissions. | Win |
container inherit of <access control entry> | <boolean> Plural: container inherits | Returns TRUE if the ACE header flag has the value 0x02, indicating that the OBJECT INHERITANCE is set. | Win:8.2 |
create file permission of <access control entry> | <boolean> Plural: create file permissions | For a folder ACE, returns TRUE if the ACE grants or denies create file permissions. | Win |
create folder permission of <access control entry> | <boolean> Plural: create folder permissions | For a folder ACE, returns TRUE if the ACE grants or denies create folder permissions. | Win |
create link permission of <access control entry> | <boolean> Plural: create link permissions | For a registry key ACE, returns TRUE if the ACE grants or denies create key link permissions. | Win |
create subkey permission of <access control entry> | <boolean> Plural: create subkey permissions | For a registry key ACE, returns TRUE if the ACE grants or denies creation of subkey permissions. | Win |
delete child permission of <access control entry> | <boolean> Plural: delete child permissions | For a folder ACE, returns TRUE if the ACE grants or denies child deletion permissions. | Win |
delete permission of <access control entry> | <boolean> Plural: delete permissions | For any ACE, returns TRUE if the ACE grants or generic delete permissions. | Win |
deny type of <access control entry> | <boolean> Plural: deny types | Returns TRUE if the ACE header type is ACCESS DENIED. | Win:8.2 |
enumerate subkeys permission of <access control entry> | <boolean> Plural: enumerate subkeys permissions | For a registry key ACE, returns TRUE if the ACE grants or enumerate subkey permissions. | Win |
execute permission of <access control entry> | <boolean> Plural: execute permissions | For a file ACE, returns TRUE if the ACE grants or denies execute permissions. | Win |
generic all permission of <access control entry> | <boolean> Plural: generic all permissions | For any ACE, returns TRUE if the ACE grants or denies all generic permissions. | Win |
generic execute permission of <access control entry> | <boolean> Plural: generic execute permissions | For any ACE, returns TRUE if the ACE grants or denies generic execute permissions. | Win |
generic read permission of <access control entry> | <boolean> Plural: generic read permissions | For any ACE, returns TRUE if the ACE grants or denies generic read permissions. | Win |
generic write permission of <access control entry> | <boolean> Plural: generic write permissions | For any ACE, returns TRUE if the ACE grants or denies generic write permissions. | Win |
grant type of <access control entry> | <boolean> Plural: grant types | Returns TRUE if the ACE header type is ACCESS ALLOWED. | Win:8.2 |
inherit only of <access control entry> | <boolean> Plural: inherit onlys | Returns TRUE if the ACE header flag has the value 0x08, indicating that the OBJECT INHERITANCE flag is set. | Win:8.2 |
inheritance of <access control entry> | <integer> Plural: inheritances | A set of bit flags that determines whether other containers or objects can inherit the ACE from the primary object to which the ACL is attached. The actual values of the constants are:NO_INHERITANCE = 0SUB_OBJECTS_ONLY_INHERIT = 1SUB_CONTAINERS_ONLY_INHERIT = 2SUB_CONTAINERS_AND_OBJECTS_INHERIT = 3OJECT_INHERIT_ACE = 1CONTAINER_INHERIT_ACE = 2NO_PROPAGATE_INHERIT_ACE = 4INHERIT_ONLY_ACE = 8. | Win |
inherited of <access control entry> | <boolean> Plural: inheriteds | Returns TRUE if the ACE header flag has the value 0x10, indicating that the INHERITED flag is set. | Win:8.2 |
list permission of <access control entry> | <boolean> Plural: list permissions | For a folder ACE, returns TRUE if the ACE grants or denies list permissions. | Win |
maximum allowed permission of <access control entry> | <boolean> Plural: maximum allowed permissions | For any ACE, returns TRUE if the ACE grants or denies maximum allowed permissions. | Win |
no propagate inherit of <access control entry> | <boolean> Plural: no propagate inherits | Returns TRUE if the ACE header flag has the value 0x04, indicating that the NO PROPAGATE INHERIT flag is set. | Win:8.2 |
object inherit of <access control entry> | <boolean> Plural: object inherits | Returns TRUE if the ACE header flag has the value 0x01, indicating that the OBJECT INHERIT flag is set. | Win:8.2 |
query value permission of <access control entry> | <boolean> Plural: query value permissions | For a registry key ACE, returns TRUE if the ACE grants or denies query value permissions. | Win |
read attributes permission of <access control entry> | <boolean> Plural: read attributes permissions | For a file or folder ACE, returns TRUE if the ACE grants or denies read attributes permissions. | Win |
read control permission of <access control entry> | <boolean> Plural: read control permissions | For any ACE, returns TRUE if the ACE grants or denies reading access control permissions. | Win |
read extended attributes permission of <access control entry> | <boolean> Plural: read extended attributes permissions | For a file or folder ACE, returns TRUE if the ACE grants or denies read extended attributes permissions. | Win |
read permission of <access control entry> | <boolean> Plural: read permissions | For a file ACE, returns TRUE if the ACE grants or denies read permissions. | Win |
set value permission of <access control entry> | <boolean> Plural: set value permissions | For a registry key ACE, returns TRUE if the ACE grants or denies set value permissions. | Win |
synchronize permission of <access control entry> | <boolean> Plural: synchronize permissions | For any ACE, returns TRUE if the ACE grants or denies synchronize permissions. | Win |
traverse permission of <access control entry> | <boolean> Plural: traverse permissions | For the specified folder ACE, returns TRUE if it grants or denies traversefolder permission. | Win |
trustee of <access control entry> | <security identifier> Plural: trustees | Returns the trustee to whom the specified ACE applies. | Win |
trustee type of <access control entry> | <integer> Plural: trustee types | Returns the type of trustee to whom the specified ACE applies. | Win |
write attributes permission of <access control entry> | <boolean> Plural: write attributes permissions | For a file or folder ACE, returns TRUE if the ACE grants or denies write attribute permissions. | Win |
write dac permission of <access control entry> | <boolean> Plural: write dac permissions | For any ACE, returns TRUE if the ACE grants or denies write DAC permissions. | Win |
write extended attributes permission of <access control entry> | <boolean> Plural: write extended attributes permissions | For a file or folder ACE, returns TRUE if the ACE grants or denies write extended attribute permissions. | Win |
write owner permission of <access control entry> | <boolean> Plural: write owner permissions | For any ACE, returns TRUE if the ACE grants or denies write owner permissions. | Win |
write permission of <access control entry> | <boolean> Plural: write permissions | For a file ACE, returns TRUE if the ACE grants or denies write permissions. | Win |
Declaration | Description | Platforms (?) |
sacl of <security descriptor> | Returns the system access control list (SACL), an ACL that controls the generation of audit messages for attempts to access a securable object. | Win |
Declaration | Return type | Description | Platforms (?) |
<system access control list> as string | <string> | Converts the specified system access control list (SACL) into a string value in the Microsoft Security Descriptor String Format. | Win |
Declaration | Description | Platforms (?) |
dacl of <security descriptor> | Returns the discretionary access control list (DACL) that identifies the users and groups who are allowed or denied access to the specified security descriptor. | Win |
Declaration | Return type | Description | Platforms (?) |
<discretionary access control list> as string | <string> | Converts the discretionary system access control list (DACL) into a string value in the Microsoft Security Descriptor String Format. | Win |
Declaration | Description | Platforms (?) |
account with privilege <string> | Returns a security account constant corresponding to an account with the privilege specified in the string. | Win:8.0 |
account with privileges | Returns a security account constant corresponding to an 'account with privileges'. | Win:8.0 |
anonymous logon group | This refers to users who have logged in anonymously. | Win:8.0 |
authenticated users group | This refers to a group including users whose identities were authenticated when they logged on. Membership is controlled by the operating system. | Win:8.0 |
batch group | This refers to a group including all users who have logged on through a batch queue facility such as the task scheduler. Membership is controlled by the operating system. | Win:8.0 |
builtin administrators group | This refers to a built-in group . After the initial installation of the OS, the first member of the group is the Administrator account. When a computer then joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group is also added to the Administrators group. The Administrators group has built-in capabilities that give its members full control over the system. The group is the default owner of any object that is created by any other member of the group. | Win:8.0 |
builtin backup operators group | This refers to a built-in group which, by default, has no members. Backup Operators can back up and restore all files on a computer, regardless of file permissions. Backup Operators can log on to a computer and shut it down. | Win:8.0 |
builtin guests group | This refers to a built-in group which, by default, only contains the Guest account. This group allows otherwise unauthorized users to log on with limited privileges to a computer's built-in Guest account. | Win:8.0 |
builtin network configuration operators group | This refers to XP machines, where some admin privileges include managing the configuration of networking features. | Win:8.0 |
builtin power users group | This refers to a built-in group which, by default, has no members. This group does not exist for domain controllers. Power Users can create other local users and groups as well as modify and delete accounts. They can also remove users from the other groups. Power Users also can install, manage and delete applications, local printers and file shares. | Win:8.0 |
builtin remote desktop users group | This refers to the XP only. Members of this group are granted the right to log in remotely. | Win:8.0 |
builtin replicator group | This refers to Windows NT domains. This group is called Replicators and is used by the directory replication service. In 2K/XP the group is present but is not used. | Win:8.0 |
builtin users group | This refers to a built-in group. After the initial installation of the OS, the first member is the Authenticated Users group. When a computer subsequently joins a domain, the Domain Users group is added to the Users group. These users can perform tasks such as running applications, using printers, shutting down or locking the computer. Users can install applications for their use only, provided the installation program supports per-user installation. | Win:8.0 |
creator group group | This refers to a placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces the SID with the one from the primary group of the object's current owner. The primary group is used only by the POSIX subsystem. | Win:8.0 |
creator owner group | This refers to a placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the one from the object's current owner. | Win:8.0 |
dialup group | This refers to a group implicitly including all users who logged in to the system through a dial-up connection. Membership is controlled by the operating system. | Win:8.0 |
everyone group | This refers to a group including all users, even anonymous users and guests. Membership is controlled by the operating system. | Win:8.0 |
interactive group | This refers to a group including all users who have logged on interactively. Membership is controlled by the operating system. | Win:8.0 |
local service group | Returns a security account constant corresponding to a 'local service group'. | Win:8.0 |
network group | This refers to a group implicitly including all users who are logged on through a network connection. Membership is controlled by the operating system. | Win:8.0 |
network service group | Returns a security account constant corresponding to a 'network service group'. | Win:8.0 |
remote interactive logon group | Refers to the group of users who log on using an RDP connection. | Win:8.0 |
security account <string> | This is a named Inspector that uses the LookupAccountName API function to return an object representing a user or group. Example: privileges of security account "Network Service" - Returns a list of privileges for the specified security account, such as SeAuditPrivilege, SeChangeNotifyPrivilege, etcetera. | Win |
service group | This refers to a group including all security principals that have logged on as a service. Membership is controlled by the operating system. | Win:8.0 |
system group | Returns a security account constant corresponding to a 'system group'. | Win:8.0 |
terminal server user group | Refers to a group including all users who have logged on to a Terminal Services server. Membership is controlled by the operating system. | Win:8.0 |
well known account <integer> | Returns a security account constant corresponding to a numbered 'well known account'. | Win:8.0 |
Declaration | Return type | Description | Platforms (?) |
privilege of <security account> | <string> Plural: privileges | Returns a string describing the privileges assigned to the specified security account. For more information, see the MSDN article on LsaEnumerateAccountRights. For a description of the possible constants that can be returned, see the articles on Account Rights Constants and Privilege Constants. | Win |
sid of <security account> | <security identifier> Plural: sids | Returns the Security ID (SID) associated with the specified security account. | Win |
Declaration | Description | Platforms (?) |
security descriptor of <registry key> | Specifies the security descriptor associated with the specified registry key. | Win |
security descriptor of <file> | Specifies the security descriptor associated with the specified file. | Win |
security descriptor of <folder> | Specifies the security descriptor associated with the specified folder. | Win |
security descriptor of <service> | This Windows-specific Inspector returns a security descriptor for the specified service. Example: (DISPLAY name of it, security descriptor of it ) of service "TapiSrv" - Returns the name of the service and its associated security descriptor. | Win |
security descriptor of <network share> | Specifies the security descriptor associated with the specified network share. | Win |
security descriptor of <scheduled task> | Returns the security descriptor for the specified scheduled task.2.0 interface only. | Win:8.0 |
security descriptor of <task folder> | Returns the security descriptor for the specified task folder. | Win:8.0 |
security descriptor of <task registration info> | Returns the security descriptor of the scheduled task referred to by the specified task registration information object. | Win:8.0 |
Declaration | Return type | Description | Platforms (?) |
<security descriptor> as string | <string> | Returns the security descriptor in string format. | Win |
control of <security descriptor> | <integer> Plural: controls | Returns the integer property obtained by using the Microsoft Windows GetSecurityDescriptorControl API. This integer contains bits that indicate DACL behaviors as well as default behaviors. See the MSDN documentation of SECURITY_DESCRIPTOR_CONTROL for more information. | Win |
dacl of <security descriptor> | <discretionary access control list> Plural: dacls | Returns the discretionary access control list (DACL) that identifies the users and groups who are allowed or denied access to the specified security descriptor. | Win |
group of <security descriptor> | <security identifier> Plural: groups | Returns the security identifier of the group of the specified security descriptor. | Win |
null dacl of <security descriptor> | <boolean> Plural: null dacls | Win:8.2 | |
null sacl of <security descriptor> | <boolean> Plural: null sacls | Win:8.2 | |
owner of <security descriptor> | <security identifier> Plural: owners | Returns the security identifier of the owner of the specified security descriptor. | Win |
sacl of <security descriptor> | <system access control list> Plural: sacls | Returns the system access control list (SACL), an ACL that controls the generation of audit messages for attempts to access a securable object. | Win |
Declaration | Description | Platforms (?) |
sid <string> | Win:8.2 | |
sid of <active directory group> | Returns the security identifier object corresponding to the specified Active Directory groups for the local machine. | Win:8.1, Mac:8.1 |
user of <process> | Returns a security identifier associated with the user of specified process. This Inspector requires Terminal Services or Win2000+, and may not be available if the inspector application does not have sufficient permissions. This object corresponds to the 'User Name' column in Task Manager. | Win:8.0 |
user sid of <event log record> | Returns the user security ID for the specified record in the event log. Example: user sid of record (oldest record number of it) of application event log - Returns the user security ID for the oldest record in the application event log, for instance NT AUTHORITY\SYSTEM. | Win |
trustee of <access control entry> | Returns the trustee to whom the specified ACE applies. | Win |
sid of <security account> | Returns the Security ID (SID) associated with the specified security account. | Win |
group of <security descriptor> | Returns the security identifier of the group of the specified security descriptor. | Win |
owner of <security descriptor> | Returns the security identifier of the owner of the specified security descriptor. | Win |
sid of <user> | Win:8.2 | |
sid of <logged on user> | Returns the Security ID (SID) of the user associated with the session's primary access token. With Windows 2003/XP/Vista, this is determined by WTSQueryUserToken. With NT4/2000 it is determined by the apparent shell process running in the given session. This Inspector may fail if run in a non-privileged context. The SID does not exist under Windows 9x. | Win |
Declaration | Return Type | Description | Platforms (?) |
<security identifier> = <security identifier> | <boolean> | Tests two <security identifier> (SID) values for equality using EqualSid. | Win, Mac:8.1 |
Declaration | Return type | Description | Platforms (?) |
<security identifier> as string | <string> | Returns the security identifier in string format. | Win, Mac:8.1 |
account name of <security identifier> | <string> Plural: account names | Retrieves the name of the account for this SID and the name of the first domain on which this SID is found. | Win |
component string of <security identifier> | <string> Plural: component strings | This Windows-specific inspector returns a string formatted using the ConvertSidToStringSid windows API, discussed at: http://msdn2.microsoft.com/en-us/library/aa376399(VS.85).aspx. | Win, Mac:8.1 |
domain name of <security identifier> | <string> Plural: domain names | Returns the domain name of the first domain on which the specified SID is found. | Win |
user of <security identifier> | <user> Plural: users | Win:8.2 |
Declaration | Description | Platforms (?) |
security database | Returns the security accounts manager (SAM) database or, in the case of domain controllers, the Active Directory. | Win |
Declaration | Return type | Description | Platforms (?) |
account lockout duration of <security database> | <time interval> Plural: account lockout durations | Returns the time interval corresponding to how long a locked account remains locked before it is automatically unlocked. This may not exist for locked accounts that remain locked until an administrator unlocks them. For more information, see the MSDN article on NetUserModalsGet. | Win |
account lockout observation window of <security database> | <time interval> Plural: account lockout observation windows | Returns a time interval corresponding to the maximum time that can elapse between any two failed logon attempts before lockout occurs. For more information, see the MSDN article on NetUserModalsGet. | Win |
account lockout threshold of <security database> | <integer> Plural: account lockout thresholds | Returns an integer corresponding to the number of invalid password authentications that can occur before an account is marked 'locked out.' For more information, see the MSDN article on NetUserModalsGet. | Win |
force logoff interval of <security database> | <time interval> Plural: force logoff intervals | Returns the time interval between the end of the valid logon time and the time when the user must log off the network. A value of zero indicates that the user must log off immediately as soon as the valid logon time expires. This will not exist if the user is never forced to log off. For more information, see the MSDN article on NetUserModalsGet. | Win |
maximum password age of <security database> | <time interval> Plural: maximum password ages | Returns a time interval corresponding to the maximum password age found in the specified security database. This will not exist if the password never expires. | Win |
minimum password age of <security database> | <time interval> Plural: minimum password ages | Returns a time interval corresponding to the minimum password age found in the specified security database. | Win |
minimum password length of <security database> | <integer> Plural: minimum password lengths | Returns an integer corresponding to the minimum password length found in the specified security database. | Win |
password history length of <security database> | <integer> Plural: password history lengths | Returns the integer length of the password history maintained by the security database. A new password cannot match any of the previous passwords in the specified history. For more information, see the MSDN article on NetUserModalsGet. | Win |
Declaration | Description | Platforms (?) |
audit policy | Windows Vista (and later versions of Windows) allows a finer granularity with audit policies by using subcategories. Setting audit policy at the category level overrides the new subcategory feature. A new registry key introduced in Vista is used to manage subcategories without requiring a change to Group Policy. This registry can be set to prevent the application of category-level audit policy from both Group Policy and the Local Security Policy admin tool. Example: (name of it, (audit success of it, audit failure of it) of system policy of it) of subcategories of categories of audit policy - This example lists the names along with the success and failure status of all the subcategories of the audit policy. | Win |
Declaration | Return type | Description | Platforms (?) |
account logon category of <audit policy> | <audit policy category> Plural: account logon categories | Returns an object corresponding to the Account Logon category of the audit policy. | Win |
account management category of <audit policy> | <audit policy category> Plural: account management categories | Returns an object corresponding to the Account Management category of the audit policy. | Win |
category of <audit policy> | <audit policy category> Plural: categories | Returns the categories of the specified audit policy. | Win |
detailed tracking category of <audit policy> | <audit policy category> Plural: detailed tracking categories | Returns an object corresponding to the Detailed Tracking category of the specified audit policy. | Win |
ds access category of <audit policy> | <audit policy category> Plural: ds access categories | Returns an object corresponding to the DS Access category of the audit policy. | Win |
logon logoff category of <audit policy> | <audit policy category> Plural: logon logoff categories | Returns an object corresponding to the Logon/Logoff category of the audit policy. | Win |
object access category of <audit policy> | <audit policy category> Plural: object access categories | Returns an object corresponding to the Object Access category of the audit policy. | Win |
policy change category of <audit policy> | <audit policy category> Plural: policy change categories | Returns an object corresponding to the Policy Change category of the audit policy. | Win |
privilege use category of <audit policy> | <audit policy category> Plural: privilege use categories | Returns an object corresponding to the Privilege Use category of the audit policy. | Win |
system category of <audit policy> | <audit policy category> Plural: system categories | Returns an object corresponding to the System category of the audit policy. | Win |
Declaration | Description | Platforms (?) |
account logon category of <audit policy> | Returns an object corresponding to the Account Logon category of the audit policy. Example: (name of it, audit success of system policies of it) of subcategories of account logon category of audit policy - Returns the names and the system policy audit success status of the account logon subcategories. | Win |
account management category of <audit policy> | Returns an object corresponding to the Account Management category of the audit policy. Example: names of subcategories of account management category of audit policy - Returns a list of the subcategory names of the of the account management categories. | Win |
category of <audit policy> | Returns the categories of the specified audit policy. Example: names of categories of audit policy - Returns the names of the audit policy categories, including System, Logon/Logoff, Object Access, Privilege Use, Detailed Tracking, Policy Change, Account Management, DS Access and Account Logon. | Win |
detailed tracking category of <audit policy> | Returns an object corresponding to the Detailed Tracking category of the specified audit policy. | Win |
ds access category of <audit policy> | Returns an object corresponding to the DS Access category of the audit policy. Example: names of subcategories of ds access category of audit policy - Returns the names of the specified subcategories. Produces the same result as 'names of subcategories of category whose (name of it is "DS Access") of audit policy'. | Win |
logon logoff category of <audit policy> | Returns an object corresponding to the Logon/Logoff category of the audit policy. | Win |
object access category of <audit policy> | Returns an object corresponding to the Object Access category of the audit policy. | Win |
policy change category of <audit policy> | Returns an object corresponding to the Policy Change category of the audit policy. | Win |
privilege use category of <audit policy> | Returns an object corresponding to the Privilege Use category of the audit policy. | Win |
system category of <audit policy> | Returns an object corresponding to the System category of the audit policy. | Win |
Declaration | Return type | Description | Platforms (?) |
name of <audit policy category> | <string> Plural: names | Returns the name of the specified audit policy category. | Win |
subcategory of <audit policy category> | <audit policy subcategory> Plural: subcategories | Returns the subcategory for the specified audit policy category. | Win |
Declaration | Description | Platforms (?) |
subcategory of <audit policy category> | Returns the subcategory for the specified audit policy category. | Win |
Declaration | Return type | Description | Platforms (?) |
effective policy <security account> of <audit policy subcategory> | <audit policy information> Plural: effective policies | Returns the effective audit policy information for the specified subcategory for the given security account. The effective audit policy is determined by combining the system audit policy with per-user policy. | Win |
guid of <audit policy subcategory> | <string> Plural: guids | Win:8.2 | |
name of <audit policy subcategory> | <string> Plural: names | Returns the name of the specified audit policy subcategory. | Win |
per user policy <security account> of <audit policy subcategory> | <audit policy information> Plural: per user policies | Returns the per-user audit policy information for the given audit-policy subcategory and the specified security account. | Win |
system policy of <audit policy subcategory> | <audit policy information> Plural: system policies | Returns the audit policy information (audit success or audit failure) corresponding to the specified audit policy subcategory. | Win |
Declaration | Description | Platforms (?) |
effective policy <security account> of <audit policy subcategory> | Returns the effective audit policy information for the specified subcategory for the given security account. The effective audit policy is determined by combining the system audit policy with per-user policy. Example: (name of it, audit failure of effective policy (security account "Network Service") of it) of subcategories of categories of audit policy - Returns a list of the names and audit failure states of the all the audit policy subcategories for the specified security account. | Win |
per user policy <security account> of <audit policy subcategory> | Returns the per-user audit policy information for the given audit-policy subcategory and the specified security account. | Win |
system policy of <audit policy subcategory> | Returns the audit policy information (audit success or audit failure) corresponding to the specified audit policy subcategory. Example: audit success of system policy of subcategory whose (name of it is "Security Group Management") of account management category of audit policy - Returns the boolean audit success status of the specified system policy. | Win |
Declaration | Return type | Description | Platforms (?) |
audit failure of <audit policy information> | <boolean> Plural: audit failures | Returns the boolean audit failure status of the specified audit policy information. | Win |
audit success of <audit policy information> | <boolean> Plural: audit successes | Returns the boolean audit success status of the specified audit policy information. | Win |
guid of <audit policy information> | <string> Plural: guids | Win:8.2 |
Declaration | Description | Platforms (?) |
cryptography | A global object that implements the FIPS 140-2 standard for secure signing and authentication throughout the BigFix application. | Win, Lin, Sol, HPUX, AIX, Mac, Ubu:8.1 |
Declaration | Return type | Description | Platforms (?) |
desired fips mode of <cryptography> | <boolean> Plural: desired fips modes | Returns TRUE if the application (the client, console, or web reports, depending on the context) tried to enter FIPS 140-2 compliant mode. | Win, Lin, Sol, HPUX, AIX, Mac, Ubu:8.1 |
fips mode failure message of <cryptography> | <string> Plural: fips mode failure messages | Returns the error message returned by the cryptographic library if the application (the client, console, or web reports, depending on the context) tried to enter FIPS 140-2 compliant mode and failed. | Win, Lin, Sol, HPUX, AIX, Mac, Ubu:8.1 |
fips mode of <cryptography> | <boolean> Plural: fips modes | Returns TRUE if the application (the client, console, or web reports, depending on the context) is operating in FIPS 140-2 mode (the mode provided by openssl). FIPS mode limits the set of ciphers and SSL protocols that can be used in the cryptographic library. | Win, Lin, Sol, HPUX, AIX, Mac, Ubu:8.1 |
Declaration | Description | Platforms (?) |
client cryptography | This Inspector is similar to the core cryptography object except that it returns properties exclusive to the client (whereas <cryptography> is also available in the Console/Web Reports contexts). | Win, Lin, Sol, HPUX, AIX, Mac, WM, Ubu:8.1 |
Declaration | Return type | Description | Platforms (?) |
desired encrypt report of <client_cryptography> | <boolean> Plural: desired encrypt reports | Returns TRUE if the client is configured to attempt to encrypt reports. | Win, Lin, Sol, HPUX, AIX, Mac, WM, Ubu:8.1 |
encrypt report failure message of <client_cryptography> | <string> Plural: encrypt report failure messages | If the client is not successfully encrypting reports, this Inspector returns the failure message. | Win, Lin, Sol, HPUX, AIX, Mac, WM, Ubu:8.1 |
encrypt report of <client_cryptography> | <boolean> Plural: encrypt reports | Returns TRUE if the client is successfully encrypting reports. | Win, Lin, Sol, HPUX, AIX, Mac, WM, Ubu:8.1 |
Declaration | Description | Platforms (?) |
pem encoded certificate of <file> | Reads and returns the certificate from a file in the PEM format. This can be used to analyze encryption credentials on decrypting relays or root servers. | Win, WM |
encryption certificate of <license> | Provides the encryption certificate that is currently active and which will be used by clients to encrypt reports. | Win, Lin, Sol, HPUX, AIX, Mac, WM, Ubu:8.1 |
Declaration | Return type | Description | Platforms (?) |
invalid before of <x509 certificate> | <time> Plural: invalid befores | Returns the date on which the certificate first becomes valid. This is useful for examining encryption certificates, where the 'invalid before date' is the time when the encryption credentials were generated. | Win, Lin, Sol, HPUX, AIX, Mac, WM, Ubu:8.1 |
sha1 of <x509 certificate> | <string> Plural: sha1s | Returns the SHA1 hash of the given certificate, which uniquely identifies it. | Win, Lin, Sol, HPUX, AIX, Mac, WM, Ubu:8.1 |
Declaration | Description | Platforms (?) |
local group | Returns local groups defined on the local computer using the windows NetLocalGroupEnum API. Several local groups are defined simply by a default operating system install, and have names such as Administrators, Backup Operators, Guests, Network Configuration Operators, Power users, Users, etcetera. Some software applications also define local groups in order to help manage protections. | Win |
local group <string> | Returns a local group corresponding to the given name, such as Adminstrator, Guests, and others. For backward compatibility, the 'as string' cast of this Inspector only returns the user name, not the other components of the sid. For all parts, use 'component string' instead. Example: component strings of sids of members of local group "Administrators" - Returns a list of the member security IDs of the local administrators group. | Win |
Declaration | Return type | Description | Platforms (?) |
comment of <local group> | <string> Plural: comments | Returns a string containing a comment associated with the specfied local group (Administrator, Guest, Users). | Win |
member of <local group> | <local group member> Plural: members | Returns a list of the members of the specified local group. | Win |
name of <local group> | <string> Plural: names | Returns the name of the local group. | Win |
Declaration | Description | Platforms (?) |
member of <local group> | Returns a list of the members of the specified local group. Example: members of local group "Administrators" - Returns a list of the members of the local administration group. | Win |
Declaration | Return type | Description | Platforms (?) |
<local group member> as string | <string> | Casts a local group member as a string. | Win |