Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

148 lines
4.2 KiB

/*++
Copyright (c) 2002 Microsoft Corporation
Module Name:
w2kstructdefs.h
Abstract:
structure definitions for a few w2k secedit.h structures
that are different from their xp definitions; specifically
SCE_PROFILE_INFO and SCETYPE
necessary for compatibility with w2k
Author:
Steven Chan (t-schan) July 2002
--*/
#ifndef W2KSTRUCTDEFSH
#define W2KSTRUCTDEFSH
//
// Windows 2000 Profile structure
//
typedef struct _W2K_SCE_PROFILE_INFO {
// Type is used to free the structure by SceFreeMemory
SCETYPE Type;
//
// Area: System access
//
DWORD MinimumPasswordAge;
DWORD MaximumPasswordAge;
DWORD MinimumPasswordLength;
DWORD PasswordComplexity;
DWORD PasswordHistorySize;
DWORD LockoutBadCount;
DWORD ResetLockoutCount;
DWORD LockoutDuration;
DWORD RequireLogonToChangePassword;
DWORD ForceLogoffWhenHourExpire;
PWSTR NewAdministratorName;
PWSTR NewGuestName;
DWORD SecureSystemPartition;
DWORD ClearTextPassword;
union {
struct {
// Area : user settings (scp)
PSCE_NAME_LIST pAccountProfiles;
// Area: privileges
// Name field is the user/group name, Status field is the privilege(s)
// assigned to the user/group
union {
// PSCE_NAME_STATUS_LIST pPrivilegeAssignedTo;
PSCE_PRIVILEGE_VALUE_LIST pPrivilegeAssignedTo;
PSCE_PRIVILEGE_ASSIGNMENT pInfPrivilegeAssignedTo;
} u;
} scp;
struct {
// Area: user settings (sap)
PSCE_NAME_LIST pUserList;
// Area: privileges
PSCE_PRIVILEGE_ASSIGNMENT pPrivilegeAssignedTo;
} sap;
struct {
// Area: user settings (smp)
PSCE_NAME_LIST pUserList;
// Area: privileges
// See sap structure for pPrivilegeAssignedTo
PSCE_PRIVILEGE_ASSIGNMENT pPrivilegeAssignedTo;
} smp;
} OtherInfo;
// Area: group membership
PSCE_GROUP_MEMBERSHIP pGroupMembership;
// Area: Registry
SCE_OBJECTS pRegistryKeys;
// Area: System Services
PSCE_SERVICES pServices;
// System storage
SCE_OBJECTS pFiles;
//
// ds object
//
SCE_OBJECTS pDsObjects;
//
// kerberos policy settings
//
PSCE_KERBEROS_TICKET_INFO pKerberosInfo;
//
// System audit 0-system 1-security 2-application
//
DWORD MaximumLogSize[3];
DWORD AuditLogRetentionPeriod[3];
DWORD RetentionDays[3];
DWORD RestrictGuestAccess[3];
DWORD AuditSystemEvents;
DWORD AuditLogonEvents;
DWORD AuditObjectAccess;
DWORD AuditPrivilegeUse;
DWORD AuditPolicyChange;
DWORD AuditAccountManage;
DWORD AuditProcessTracking;
DWORD AuditDSAccess;
DWORD AuditAccountLogon;
DWORD CrashOnAuditFull;
//
// registry values
//
DWORD RegValueCount;
PSCE_REGISTRY_VALUE_INFO aRegValues;
}W2K_SCE_PROFILE_INFO, *PW2K_SCE_PROFILE_INFO;
typedef enum _W2K_SCE_TYPE {
W2K_SCE_ENGINE_SCP=300, // effective table
W2K_SCE_ENGINE_SAP, // analysis table
W2K_SCE_ENGINE_SCP_INTERNAL,
W2K_SCE_ENGINE_SMP_INTERNAL,
W2K_SCE_ENGINE_SMP, // local table
W2K_SCE_STRUCT_INF,
W2K_SCE_STRUCT_PROFILE,
W2K_SCE_STRUCT_USER,
W2K_SCE_STRUCT_NAME_LIST,
W2K_SCE_STRUCT_NAME_STATUS_LIST,
W2K_SCE_STRUCT_PRIVILEGE,
W2K_SCE_STRUCT_GROUP,
W2K_SCE_STRUCT_OBJECT_LIST,
W2K_SCE_STRUCT_OBJECT_CHILDREN,
W2K_SCE_STRUCT_OBJECT_SECURITY,
W2K_SCE_STRUCT_OBJECT_ARRAY,
W2K_SCE_STRUCT_ERROR_LOG_INFO,
W2K_SCE_STRUCT_SERVICES,
W2K_SCE_STRUCT_PRIVILEGE_VALUE_LIST
} W2KSCETYPE;
#endif