WbemPrivilegeEnum constants define privileges. These constants are used with
SWbemSecurity to grant the privileges required for some operations. For more information, see
The WMI scripting type library, wbemdisp.tlb defines these constants. Microsoft Visual Basic applications can access this library; script languages must use the value of the constant directly, unless they use Windows Script Host (WSH) XML file format. For more information, see
Using the WMI Scripting Type Library.
Required to assign the primary token of a process.
Required to lock physical pages in memory.
Required to increase the quota assigned to a process.
Required to create a machine account.
Identifies its holder as part of the trusted computer base. Some trusted, protected subsystems are granted this privilege.
Required to perform a number of security-related functions, such as controlling and viewing audit messages. This privilege identifies its holder as a security operator.
Required to take ownership of an object without being granted discretionary access. This privilege allows the owner value to be set only to those values that the holder may legitimately assign as the owner of an object.
Required to load or unload a device driver.
Required to gather profiling information for the entire system.
Required to modify the system time.
Required to gather profiling information for a single process.
Required to increase the base priority of a process.
Required to create a paging file.
Required to create a permanent object.
Required to perform backup operations.
Required to perform restore operations. This privilege enables you to set any valid user or group security identifier (SID) as the owner of an object.
Required to shut down a local system.
Required to debug a process.
Required to generate audit-log entries.
Required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information.
Required to receive notifications of changes to files or directories. This privilege also causes the system to skip all traversal access checks. It is enabled by default for all users.
Required to shut down a system using a network request.
Required to remove a computer from a docking station.
Required to synchronize directory service data.
Required to enable computer and user accounts to be trusted for delegation.