. . "This article contains examples of clients, programs, and operations that are affected by specific security settings or user rights assignments." . .