Chapter 24. Advanced Security Administration

This last chapter covers all the write operations that can be performed on access control lists (ACLs) and access control entries (ACEs). Examples in this chapter include

  • Reading the owner of a resource

  • Adding a new access control entry to access control lists

  • Removing an access control entry from an access control list

  • Transferring access control lists from one resource to another

  • Setting access control lists using the Security Descriptor Definition Language (SDDL)

Account Identifier Translation

As we prepare to modify ACLs, you learn ...

Get Essential PowerShell now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.