Spectra Assure
Community
Docs

Behaviors

List of software behaviors discovered with static code analysis.

Requests permission required to access Credential Manager as a trusted caller. (x2)
permissions
Requests permission required to identify itself as a part of the trusted computer base. (x2)
permissions
Requests permission required to create a computer account. (x2)
permissions
Requests permission required to load or unload a device driver. (x2)
permissions
Requests permission required to enable volume management privileges. (x2)
permissions
Requests permission required to shut down a system using a network request. (x2)
permissions
Requests permission required to perform a number of security-related functions, such as controlling and viewing audit messages. (x2)
permissions
Requests permission to open other processes. (x2)
permissions
Requests permission required to impersonate a client after authentication. (x2)
permissions
Requests permission required to perform restore operations. (x2)
permissions