????

Your IP : 216.73.216.152


Current Path : C:/Windows/System32/en-US/
Upload File :
Current File : C:/Windows/System32/en-US/aclui.dll.mui

MZ����@���	�!�L�!This program cannot be run in DOS mode.

$��<߱�R���R���R�U�����R�U�P���R�Rich��R�PEL�!

@�i@ h8.rdata�@@.rsrc  @@�9��
T88�9��$��8.rdata8x.rdata$zzzdbg �.rsrc$01�.Ȍ.rsrc$02 �u��Y���� �A�X9����P?�2�-E�9����8�P���X�p���g��h��i��j��k�l�o0�qH�~`�x������������������� ��8��P�*h��������������	(�
@�X�?p�@��A��B��C��D��E�F�G0�HH�I`�Jx�K��z��{��~�������� ��8��P��h���������������������(�@�X�p�	�	�	�	�	�	�	�	�					(		8		H		X		h		x		�		�		�		�		�		�		�		�		
	
	(
	8
	H
	X
	h
	x
	�
	�
	�
	�
	�
	�
	�
	�
			(	8	H	X	h	x	�	�	�	�	�	�	�	�			(	8	H	X	h	x�,��X-V��2���8D��?F�,D���H���M��PS�dY�h_��He�Hh��0l@�pq,��w8��| ��t�h�t�܃f�D�d����������f���@���r�4�������L�4�����.��������d�b�����\���T�p���r�8�b�����H���D�x���<��������
X�`
��(.�Xt��4����p�T@����$x����" ��%���(��P,���0X�H3���5��MUI����Y��^� ݱ��L��ͻ���w΍�ԛW������MUIen-US��@�P��SecurityMS Shell DlgH2����Object name:�H<�����H����@� ����The requested security information is either unavailable or can t be displayed.P�����&Group or user names:��P#�+�SysListView32�@#�+����HR�����To change permissions, click Edit.PtR2����A&dd...P�R2����&RemoveH�R<����&Edit...P�h(����DenyP�h(����AllowP`i����Phi�����Pr�=�CHECKLIST_ACLUIP��<����Ad&vancedP������For special permissions or advanced settings, click Advanced.@���Link Window<A>Learn about access control and permissions</A>PA��H�P��PermissionsMS Shell DlgP�����To view or edit details for a permission entry, select the entry and then click Edit.H8����Object name:�HBJ����H"����@"h ����The requested security information is either unavailable or can t be displayed.P.�����Permission en&tries:	�P:�S�SysListView32�@:�S����P�>����A&dd...PJ�>����&Edit...P��>����&RemoveH�W����&Change Permissions...P2�W����Restore de&faults,P������&Include inheritable permissions from this object's parent,P������Re&place all child object permissions with inheritable permissions from this object@���Link Window<A>Managing permission entries</A>��H�P��AuditingMS Shell DlgP�����To view or edit details for an auditing entry, select the entry and then click Edit.H8����Object name:�HBJ����H"����@"h ����The requested security information is either unavailable or can t be displayed.P.�����Auditing en&tries:@3�'����This object contains callback auditing entries that can't be viewed or edited in this dialog box.	�P:�S�SysListView32P�>����A&dd...PI�>����&Edit...P��>����&RemoveH�>����&Edit...P2�W����Restore de&faults,P������&Include inheritable auditing entries from this object's parent,P������Re&place all existing inheritable auditing entries on all descendants with inheritable auditing entries from this object@���Link WindowTo generate audit events, you must enable object access auditing for this object type.��H�P
��ObjectMS Shell DlgP� ����This permission is inherited from the parent object. Make changes here to override the inherited permissions.P-����&Name:��P#+�����P�*2����&Change...P@(����Apply t&o:!P/>�P����P�Q(����AllowP�Q(����DenyPQ2����&Permissions:�P[�`�CHECKLIST_ACLUI P������Apply &these permissions to objects and/or containers within this container onlyP��2����C&lear All@���Link Window<A>Managing permissions</A>PA��H�P
��ObjectMS Shell DlgP� ����This auditing entry is inherited from the parent object. Make changes here to create a new auditing entry that overrides the inherited permissions.P-����&Name:��P#+�����P�*2����&Change...P@(����Apply &onto:!P/>�P����P�Q(����SuccessfulP�Q(����FailedPQ2����Acce&ss:�P[�`�CHECKLIST_ACLUI P������Apply &these auditing entries to objects and/or containers within this container onlyP��2����C&lear All@���Link Window<A>Managing auditing</A>��@�P��OwnerMS Shell DlgP�����You can take or assign ownership of this object if you have the required permissions or privileges.H%8����Object name:�HB%J����H"����@"h ����The requested security information is either unavailable or can t be displayed.P6�����&Current owner:��PB�
����PV�����Change &owner to:
��Pb�F�SysListView32P�n����Other &users or groups...H�>����&Edit...P2�W����Restore de&faultP������&Replace owner on subcontainers and objects@���Link Window<A>Learn about object ownership</A>PA���Ȁ
��Effective PermissionsMS Shell DlgP�����The following list displays the permissions that would be granted to the selected group or user, based solely on the permissions granted directly through group membership.H-8����Object name:�HB-J����H"����@"h ����This application does not support displaying effective permissions.P>�~���&Group or user name:��XJO
}���P\I-w���&Select...P[����&Effective permissions:@�Pg�^ySysListView32List3@���Link Window<A>How are effective permissions determined?</A>H�>����&Edit...�@g�^����Windows can't calculate the effective permissions for %1���Ȁ	�DialogMS Shell DlgP[�2���YesP��2���No	��P-�T�SysListView32P$�����WarningP%�����The change you are about to make will result in the following permissions being added to the access control list:P�� ����Since these permissions propagate to all child objects, making this change will require more storage and time to evaluate. The higher this container is in the directory hierarchy, the more significant the performance degradation.P�� ����You should consider either replacing the above permissions with fewer, more inclusive permissions, not applying the permissions to child objects, or not proceeding with this change.P������Do you want to continue making this change?P�������Ȁ��Windows SecurityMS Shell DlgPZ�2���YesP��2���NoP����P$�����WarningP$�����The change you are about to make will result in 9 or more permissions that propagate to child objects being added to the access control list.P.� �����Because these permissions propagate to child objects, making this change will require more storage and time to evaluate. The higher this container is in the directory hierarchy, the more significant the performance degradation.PR� ����Consider either replacing these permissions with fewer, more inclusive permissions, not applying the permissions to child objects, or not proceeding with this change.Pv������Do you want to continue making this change?PA���Ȁ��Windows SecurityMS Shell DlgPZ�2���YesP��2���NoP����P$�����WarningP$�����The change you are about to make will result in auditing entries being added to the access control list.P.�(�����Because these auditing entries propagate to child objects, making this change will require more storage and time to evaluate. The higher this container is in the directory hierarchy, the more significant the performance degradation.PZ� ����Consider either replacing these auditing entries with fewer, more inclusive auditing entries, not applying the auditing entries to child objects, or not proceeding with this change.P~������Do you want to continue making this change?PA���Ȁ$eWindows SecurityMS Shell DlgP0�����The permissions on %s are incorrectly ordered, which may cause some entries to be ineffective.P����P0$�����-To order the permissions correctly, click Reorder.P05�����-To leave the permissions unchanged (the view will be read-only), click Cancel.P^P2���&ReorderP�P2���Cancel���Ȁ$uWindows SecurityMS Shell DlgP0�����The permissions on %s are incorrectly ordered, which may cause some entries to be ineffective.P����P0$�����-To order the permissions correctly, click Reorder.P05�����-To restore the default permission values, click Restore defaults.P0F�����-To leave the permissions unchanged (the view will be read-only), click Cancel.P:`2���&ReorderPq`>����Restore &defaultsP�`2���Cancel���Ȁ$�Windows SecurityMS Shell DlgP0�����One or more of the permission entries attached to %s has an unrecognized or application-specific (callback) type and can not be displayed.P����P0$�(����-To remove the unrecognized and callback permission entries, click Remove. Note that inherited permission entries will not be removed, because they can be removed only on the corresponding ancestor's level or inheritance can be disabled for this object.P0O�����-To leave the permissions unchanged and display only the recognized permission entries in a read-only view, click Cancel.P^s2���&RemoveP�s2���Cancel���Ȁ$�Windows SecurityMS Shell DlgP0�����One or more of the permission entries attached to %s has an unrecognized or application-specific (callback) type and can not be displayed.P����P0$�(����-To remove the unrecognized and callback permission entries, click Remove. Note that inherited permission entries will not be removed, because they can be removed only on the corresponding ancestor's level or inheritance can be disabled for this object.P0O�����-To restore the default permission entries, click Restore defaults.P0b�����-To leave the permissions unchanged and display only the recognized permission entries in a read-only view, click Cancel.P:�2���&RemovePq�>����Restore &defaultsP��2���Cancel���Ȁ$�Windows SecurityMS Shell DlgP0�����One or more of the auditing entries attached to %s has an unrecognized or application-specific (callback) type and can not be displayed.P����P0$�(����-To remove the unrecognized and callback auditing entries, click Remove. Note that inherited auditing entries will not be removed, because they can be removed only on the corresponding ancestor's level or inheritance can be disabled for this object.P0O�����-To leave the auditing entries unchanged and display only the recognized auditing entries in a read-only view, click Cancel.P^s2���&RemoveP�s2���Cancel���Ȁ$�Windows SecurityMS Shell DlgP0�����One or more of the auditing entries attached to %s has an unrecognized or application-specific (callback) type and can not be displayed.P����P0$�(����-To remove the unrecognized and callback auditing entries, click Remove. Note that inherited auditing entries will not be removed, because they can be removed only on the corresponding ancestor's level or inheritance can be disabled for this object.P0O�����-To restore the default auditing entries, click Restore defaults.P0b�����-To leave the auditing entries unchanged and display only the recognized auditing entries in a read-only view, click Cancel.P:�2���&RemovePq�>����Restore &defaultsP��2���Cancel��@��,Advanced Security SettingsMS Shell Dlg��@�bYAttribute-based ExpressionMS Shell Dlg��@�:�Central Access RuleMS Shell DlgPAWindows SecurityName&View...CNot enough memory is available to complete the requested operation.1Unable to complete the requested operation.%n%n%12Unable to display the user selection dialog.%n%n%1(Unable to lookup user names for display.�This will replace explicitly defined permissions on all descendants of this object with inheritable permissions from %1.

Do you wish to continue?%1 (%2)%2 %1\\%1\%2Code: 0x%1!08x!  %2.Unable to save permission changes on %2.%n%n%1^The permissions on %1 are incorrectly ordered, which may cause some entries to be ineffective.�You have denied the Everyone group access to %1. No one will be able to access %1 and only the owner will be able to change the permissions.

Do you want to continue?�You can't remove %1 because this object is inheriting permissions from its parent. To remove %1, you must prevent this object from inheriting permissions.  Turn off the option for inheriting permissions, and then try removing %1 again.oYou do not have permission to view the current permission settings for %1, but you can make permission changes.�You do not have permission to view or edit this object s permission settings.

To take ownership of the object, which includes permission to view its properties, click Advanced.�You do not have permission to view or edit this object s permission settings.

To change auditing settings of the object, click Advanced.�You do not have permission to view or edit this object s permission settings.

To take ownership of the object, which includes permission to view its properties, or to change auditing settings, click Advanced.MYou do not have permission to view or edit this object s permission settings.,Unable to save auditing changes on %2.%n%n%1;The current Audit Policy for this computer does not have auditing turned on.  If this computer gets audit policy from the domain, please ask a domain administrator to turn on auditing using Group Policy Editor.  Otherwise, use the Local Computer Policy Editor to configure the audit policy locally on this computer.9You only have permission to view the current owner on %1.$Unable to set new owner on %2.%n%n%1 Unable to display current owner.You are setting a deny permissions entry. Deny entries take precedence over allow entries. This means that if a user is a member of two groups, one that is allowed a permission and another that is denied the same permission, the user is denied that permission.
Do you want to continue?
Permissions for %1!Advanced Security Settings for %1Permission Entry for %1Auditing Entry for %1
PropertiesTypeName
PermissionApply ToTypeNameAccessApply ToMTo view details for a permission entry, select the entry and then click View.LTo view details for an auditing entry, select the entry and then click View.AllowDenyAuditAlarmUnknownSpecialSuccessFailAll
Read propertyWrite propertyRead/write propertyThis object onlyThis object and child objectsChild objects onlyNothingPASpecial permissions[Special permissions can't be defined here. Use Advanced page to define special permissions.�You do not have permission to view the current permission settings for %1.  It can not be determined if you have the permission to make changes. Permission changes will be allowed but it can not be guaranteed that the changes will successfully apply.�One or more of selected permissions are inherited from parent. Inherited permissions can't be deleted at this object.
 Do you want to delete other selected permissions.Permissions&Permissions for %1Inherited From
Parent ObjectNone9Windows can't calculate the effective permissions for %1.Account Deleted(%1)Account Unknown(%1):Object Permissions are not available for this object type.�The change you just made resulted in an access control list that exceeds the maximum size. You must remove approximately %1 access control entries before the changes can be saved.
�The access control list size exceeds the maximum size. You must remove approximately %1 access control entries before the changes can be saved or the advanced page can be opened.
lThe change you are about to make will result in  %1 auditing entries being added to the access control list.PAfThe change you are about to make will result in %1 permissions being added to the access control list.�Because these auditing entries propagate to child objects, making this change will require more storage and time to evaluate. The higher this container is in the directory hierarchy, the more significant the performance degradation.�Because these permissions propagate to child objects, making this change will require more storage and time to evaluate. The higher this container is in the directory hierarchy, the more significant the performance degradation.�Consider either replacing the above auditing entries with fewer, more inclusive auditing entries, not applying the auditing entries to child objects, or not proceeding with this change.�Consider either replacing the above permissions with fewer, more inclusive permissions, not applying the permissions to child objects, or not proceeding with this change.AuditingfThe change you are about to make will result in %1 permissions being added to the access control list.kThe change you are about to make will result in %1 auditing entries being added to the access control list.�Consider either replacing these auditing entries with fewer, more inclusive auditing entries, not applying the auditing entries to child objects, or not proceeding with this change.�Consider either replacing these permissions with fewer, more inclusive permissions, not applying the permissions to child objects, or not proceeding with this change.~You are about to add a disabled object. If you want to add an enabled object, try selecting the object from another location.
/Other users and groups (double-click to add)...eOne or more of the auditing entries attached to %1 has an unrecognized type and can not be displayed.nUnable to set new owner on %1. You do not have the Restore privilege required to set this user/group as owner.�You have denied all users access to %1. No one will be able to access %1 and only the owner will be able to change the permissions.

Do you want to continue?�If you have just taken ownership of this object, you will need to close and reopen this object's properties before you can view or change permissions.sNo groups or users have permission to access this object. However, the owner of this object can assign permissions.�No permissions have been assigned for this object.



Warning: this is a potential security risk because anyone who can access this object can take ownership of it. The object s owner should assign permissions as soon as possible.gOne or more of the permission entries attached to %1 has an unrecognized type and can not be displayed.�To display the requested security information on this page, the software developer needs to fix the following problem:
ISecurityInformation3 interface is not implemented.�You must have Read permissions to view the properties of this object.

Click Continue to attempt the operation with administrative permissions.	&Continue�You do not have permission to view this object s security properties, even as an administrative user.

To try taking ownership of the object, which includes permission to view its properties, click Advanced.�You must be an administrator or have been given the appropriate privileges to view the auditing properties of this object.

Do you want to continue?�To display the requested security information on this page, the software developer needs to fix the following problem:
Invalid combination of display options.�You do not have permission to view this object s security properties, even as an administrative user.

To try taking ownership of the object, which includes permission to view its properties, click Change above.

�To display the requested security information on this page, the software developer needs to fix the following problem:
Full object name is empty.�You do not have privileges to view this object s auditing properties, even as an administrative user.

To try taking ownership of the object, which includes permission to view its properties, click Change above.

PAWYou do not have permission to view this object s owner, even as an administrative user.$Can't open access control editor. %1
You do not have permission to view or edit this object s permission settings. To try again using a different administrator account, close this dialog box and log on using the other account.

To try changing or viewing this object's auditing settings, click Advanced.�You do not have permission to view this object s security properties. To view its security properties, you can try taking ownership of the object. As the owner, you can also control who gets permissions on the object. Please note that once you take ownership, the previous owner might not have access to the object.

Try taking ownership of the object, select an account from the list, and then click OK.oTo view details of a permission entry, double-click the entry. To modify permissions, click Change Permissions.Central PolicyShareBlock InheritanceAWhat would you like to do with the current inherited permissions?�You are about to block inheritance to this object, which means that permissions inherited from a parent object will no longer be applied to this object.GConvert inherited permissions into explicit permissions on this object.2Remove all inherited permissions from this object.�You are about to block inheritance to this object, which means that inheritable auditing entries will no longer propagate to this object. WConvert and add inherited auditing entries as explicit auditing entries on this object.7Remove all inherited auditing entries from this object.No Central Access PolicyObject permissionsEffective AccessSave Changes$Would you like to save your changes?�The action you selected requires administrative permissions. Save your changes before proceeding, otherwise your changes will be discarded.Save changesDiscard changesHYou do not have permission to view or edit this object s audit settings.FWhat would you like to do with the current inherited auditing entries?%1 (inherited)This rule applies to:Permission entries:All objectsbYou must have Read permissions to view the properties of this object.

Click Advanced to continue.PAOThe requested security information is either unavailable or can t be displayed.�To change the Central Access Policy applicable to the object, which may include permission to view its properties, go to the Central Policy tab.(Retrieving share security information...PAIntegrity level:Name:Security settingsOKCancel&ApplyOwner:Select a principal*Replace owner on subcontainers and objects!Network location for this share: Permission entries:Type	PrincipalAccessInherited from
Applies toChange permissionsA&dd&Remove&Edit&ViewRe&store defaultsPAToggle Expando,Show or hide Central Access Rule information	Co&ntinue
Principal:	PrincipalType:Applies to:Show basic permissionsShow advanced permissionsPermissions:PA	Clear allProperties:POnly apply &these permissions to objects and/or containers within this containerA&dd a conditionRemove&Group&UngroupAttribute TypeAttribute NameOperatorAttribute ValueeEffective Access allows you to view the effective permissions for a user, group, or device account. If the account is a member of a domain, you can also evaluate the impact of potential additions to the security token for the account. When you evaluate the impact of adding a group, any group that the intended group is a member of must be added separately.User/ Group:Select a &user&Include a user claimDevice:Se&lect a deviceInclude a device clai&m
PermissionEffective accessAccess limited byRemove
Condition:)This policy includes the following rules:Include a user claimInclude a device claim
PermissionEffective accessPAAccess limited byAuditing entries:Change Principal
Select a userSelect a device�For additional information, double-click a permission entry. To modify a permission entry, select the entry and click Edit (if available).eEffective Access allows you to view the effective permissions for a user, group, or device account. If the account is a member of a domain, you can also evaluate the impact of potential additions to the security token for the account. When you evaluate the impact of adding a group, any group that the intended group is a member of must be added separately.�For additional information, double-click an audit entry. To modify an audit entry, select the entry and click Edit (if available).aRe&place all child object permission entries with inheritable permission entries from this object]Re&place all child object auditing entries with inheritable auditing entries from this objectView e&ffective accessView effective accessAdd a new conditionRemove this conditionGroup selected conditionsUngroup selected conditionsIntegrity level)This policy includes the following rules:	Add itemsSelect groupPASelect groupResource PropertiesResource PropertiesDisable &inheritanceEnable &inheritance[To modify share permissions, use the Share Wizard from the network location for this share.CloseAttribute ChoiceNameLabel containerLabel
Property listOwnerPermission entries:Central Access Rule ContentPACentral Access Policies	PrincipalType:	Apply to:Permissions
PropertiesAttribute based expressionoperatorUser/Group SelectionDevice SelectionEffective Permission EntryAllowedDeniedClaim Selection=Equals
PermissionSelection SummaryOpenRemoveRemove claimPrincipal IconType	PrincipalAccessInheritence
Applies toVOnly apply &these auditing settings to objects and/or containers within this containerRestore default ownerRestore default ownerChangePAChangeDescription:DescriptionSelect Condition�Click Change to view available Central Access Policies that can be applied to this object, or view details of the applied Central Access Policy below.tAdd a condition to limit access. The principal will be granted the specified permissions only if conditions are met.tAdd a condition to limit access. The principal will be granted the specified permissions only if conditions are met.�Add a condition to specify the resource this Central Access Rule applies to and any additional restrictions that you want to apply. If you do not specify any restrictions, this Central Access Rule will be applied to all resources.�Add a condition to specify the resource this Central Access Rule applies to and any additional restrictions that you want to apply. If you do not specify any restrictions, this Central Access Rule will be applied to all resources.Access control entriesList of access control entries.=To modify share permissions, select the entry and click Edit.No Object Permissions:Object Permissions are not available for this object type.Remove&Manage groupingManage grouping of conditionsChange&ChangeuAdd a condition to limit the scope of this auditing entry. Security events will be logged only if conditions are met.uAdd a condition to limit the scope of this auditing entry. Security events will be logged only if conditions are met.GroupGroup of conditionsInformational message iconWarning message iconError message iconNo description specifiedNo description specifiedSelect value(s) from dropdownBasic permissions:Advanced permissions:Additional GroupsInclude group membershipInclude group membership	Apply to:Applies to:Central Policy:ActionUser ActionPAYPermission changes must be applied before they can be used to calculate effective access.CInheritance of permissions from parent container has been disabled.CUnable to contact Active Directory to access or verify claim types.GUnable to contact Active Directory for current Central Access Policies.oThe Central Access Policy could not be retrieved. Try again later or contact your administrator for assistance.qThe Central Access Policy on this object has been ignored because no CAPs have been applied to the target server.;Retrieving Central Access Policies from Active Directory...lWindows could not retrieve the Central Access Policy for this object. Recovery policy is being used instead.QWindows is in Safe Mode and the recovery Central Access Policy is being enforced.�This Central Access Policy cannot be displayed on this version of Windows. To view this Central Access Policy, go to Security Properties on on the computer where the object is hosted.�You do not have permission to evaluate effective access rights for the remote resource. Contact the administrator of the target server.�The effective access rights shown are based on group membership on this computer. For more accurate results, calculate effective access rights on the target server.Computing effective access...The RPC server is unavailable. Please enable the Netlogon Service Authz (RPC) firewall rule on the target server and try again.NComputing effective access (waiting to retrieve share security information)...YThe share security information is unavailable and was not evaluated for effective access.User.	Resource.Device.USorting the permission entries does not change the order in which they are evaluated.PSorting the audit entries does not change the order in which they are evaluated.Restore ordering.UserResourceDeviceGroupValueNo options to select from%1!d! item(s) selectedClick Add itemsMultiple ChoicesYesNoPAInvalidPAType	PrincipalAccess	ConditionInherited from
Applies toEquals
Not equals	Less thanLess than or equal toGreater thanGreater than or equal toContains each ofExistsAny ofMember of each
Member of anyMember of each
Member of any
Not existsNot contains
Not any ofNot member of eachNot member of eachNot member of anyNot member of anyAndOrBitwise AndAn unknown error has occurred.]Insufficient memory. Close one or more applications before trying to complete this operation.DCorrect the errors below and click OK. (Hover for more information.)7The condition contains one or more invalid value types.EThis access control entry is corrupt. Delete it and create a new one.CThe condition contains unexpected elements and cannot be displayed.6Conditional expressions cannot be used to deny access.eConditional expressions cannot be used to deny access. Remove all conditions, then save your changes.�Conditional expressions cannot be applied to computers that are not members of a domain. Remove all conditions before saving your changes. Use caution when saving this ACE so that you do not grant unintended access.�Conditional expressions cannot be applied to computers that are not members of a domain. Use caution when saving this ACE so that you do not grant unintended access.zThere are no resource properties in this forest. Define resource properties before authoring the target resource criteria.WCorrect the errors below and click View effective access. (Hover for more information.)~A fatal error has occurred. The system is running low on memory and may need to be restarted. Close this window and try again.RConditional expressions are not supported for object audit access control entries.�Conditional expressions are not supported for object audit access control entries. Remove all conditions, then save your changes.PAClaim Empty?The condition must include a claim to the left of the operator.@The condition must include a claim to the right of the operator.Value cannot be empty
Invalid ValueValue not specified(Select an option from the dropdown list.)Select one or more options from the list.HEnter a valid string that does not contain the following characters: " ;\Specify one or more strings separated by ';' that do not contain the following characters: "Enter a positive number.3Enter one or more positive numbers separated by ';'#Enter a valid blob beginning with #4Enter a valid SID in the format {SID(WD)[,SID(...)]}A single value is expected.Enter a number.*Enter one or more numbers separated by ';'[The value currently specified is not valid. Please select an option from the dropdown list.WThe currently selected values include invalid options. Remove invalid options (grayed).
Unknown Claim`The claim specified to the left of the operator is not known. Remove the condition and click OK.aThe claim specified to the right of the operator is not known. Remove the condition and click OK.
Invalid Claim�The claim specified to the right of the operator is not valid due to one or more of the following problems.

a) The type of claim is invalid.

b) The multiplicity of the claim's value.

c) Identical claims appear to the left and right of the operator.Malformed Condition@Please remove the condition and, if necessary, create a new one.PAInvalid OperatornThe operator specified in the condition is not applicable for the claim specified to the left of the operator.Unsupported Claim TypeIThe type of claim specified to the left of the operator is not supported.Duplicate AttributeSAn attribute can only be specified once. Remove any duplicate attributes specified.Condition in a Deny ACEeConditions cannot be specified for Deny access control entries. Remove these conditions and click OK.PACondition on non-domain machine�Conditions are invalid on computers that are not members of a domain. Remove any conditions and click OK. Use caution when saving this ACE to not grant unintended access.Unexpected Claim TypedOnly resource properties are allowed to the left of the operator. Remove the condition and click OK.pOnly values and resource properties are allowed to the right of the operator. Remove the condition and click OK. Condition in an object audit ACEmConditions cannot be specified for object audit access control entries. Remove these conditions and click OK.PAPrincipal accessing the object8Computer/device from which this object is being accessedThe object being accessedSecurity Group Specify value in the next columnNo description specifiedNo description availableEnter value here ...e.g. 1; 2; 3 ...Enter value here ...e.g. Value1; Value2 ...004PP\pp|��PStart

Stop

 Information

8Launch Advanced ACL UI

0Download Claim IDs

hDisplay Permissions Dialog when Editing an ACE

dDisplay Permissions Dialog when Adding an ACE

PDownload Central Access Policy IDs

PDisplay Effective Permission Report

<Microsoft-Windows-ACL-UI

�4VS_VERSION_INFO��
|O
|O?�StringFileInfo�040904B0LCompanyNameMicrosoft Corporation^FileDescriptionSecurity Descriptor Editorh$FileVersion10.0.20348.1 (WinBuild.160101.0800)4
InternalNameaclui.dll�.LegalCopyright� Microsoft Corporation. All rights reserved.DOriginalFilenameaclui.dll.muij%ProductNameMicrosoft� Windows� Operating System>
ProductVersion10.0.20348.1DVarFileInfo$Translation	�PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGX