text
stringlengths
0
4.23k
%COMPUTERNAME%
hostname
_CLUSTER_NETWORK_NAME_
hostname
Examples
hostname
echo %COMPUTERNAME%
set "_CLUSTER_NETWORK_NAME_=Altered Computer Name"
hostname
icacls
Displays or modifies discretionary access control lists (DACLs) on specified files, and applies stored DACLs to files in specified directories.
Note
This command replaces the deprecated cacls command.
Syntax
icacls <filename> [/grant[:r] <sid>:<perm>[...]] [/deny <sid>:<perm>[...]] [/remove[:g|:d]] <sid>[...]] [/t] [/c] [/l] [/q] [/setintegritylevel <Level>:<policy>[...]]
icacls <directory> [/substitute <sidold> <sidnew> [...]] [/restore <aclfile> [/c] [/l] [/q]]
Parameters
Parameter
Description
<filename>
Specifies the file for which to display or modify DACLs.
<directory>
Specifies the directory for which to display or modify DACLs.
/t
Performs the operation on all specified files in the current directory and its subdirectories.
/c
Continues the operation despite any file errors. Error messages will still be displayed.
/l
Performs the operation on a symbolic link instead of its destination.
/q
Suppresses success messages.
[/save <ACLfile> [/t] [/c] [/l] [/q]]
Stores DACLs for all matching files into an access control list (ACL) file for later use with /restore.
[/setowner <username> [/t] [/c] [/l] [/q]]
Changes the owner of all matching files to the specified user.
[/findsid <sid> [/t] [/c] [/l] [/q]]
Finds all matching files that contain a DACL explicitly mentioning the specified security identifier (SID).
[/verify [/t] [/c] [/l] [/q]]
Finds all files with ACLs that are not canonical or have lengths inconsistent with access control entry (ACE) counts.
[/reset [/t] [/c] [/l] [/q]]
Replaces ACLs with default inherited ACLs for all matching files.
[/grant[:r] <sid>:<perm>[...]]
Grants specified user access rights. Permissions replace previously granted explicit permissions.Not adding the :r, means that permissions are added to any previously granted explicit permissions.
[/deny <sid>:<perm>[...]]
Explicitly denies specified user access rights. An explicit deny ACE is added for the stated permissions and the same permissions in any explicit grant are removed.
[/remove[:g | :d]] <sid>[...] [/t] [/c] [/l] [/q]
Removes all occurrences of the specified SID from the DACL. This command can also use::g - Removes all occurrences of granted rights to the specified SID.:d - Removes all occurrences of denied rights to the specified SID.
[/setintegritylevel [(CI)(OI)] <Level>:<Policy>[...]]
Explicitly adds an integrity ACE to all matching files. The level can be specified as:l - Lowm- Mediumh - HighInheritance options for the integrity ACE may precede the level and are applied only to directories.
[/substitute <sidold><sidnew> [...]]
Replaces an existing SID (sidold) with a new SID (sidnew). Requires using with the <directory> parameter.
/restore <ACLfile> [/c] [/l] [/q]
Applies stored DACLs from <ACLfile> to files in the specified directory. Requires using with the <directory> parameter.
/inheritancelevel: [e | d | r]
Sets the inheritance level, which can be:e - Enables inheritanced - Disables inheritance and copies the ACEsr - Disables inheritance and removes only inherited ACEs
Not adding the :r, means that permissions are added to any previously granted explicit permissions.