--- title: Modify an object label (Windows 10) description: Describes the best practices, location, values, policy management, and security considerations for the Modify an object label security policy setting. ms.assetid: 3e5a97dd-d363-43a8-ae80-452e866ebfd5 ms.prod: W10 ms.mktglfcycl: deploy ms.sitesec: library author: brianlic-msft --- # Modify an object label **Applies to** - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Modify an object label** security policy setting. ## Reference This privilege determines which user accounts can modify the integrity label of objects, such as files, registry keys, or processes owned by other users. Processes running under a user account can modify the label of an object owned by that user to a lower level without this privilege. The integrity label is used by the Windows Integrity Controls (WIC) feature, which was introduced in Windows Server 2008 and Windows Vista. WIC keeps lower integrity processes from modifying higher integrity processes by assigning one of six possible labels to objects on the system. Although similar to NTFS file and folder permissions, which are discretionary controls on objects, the WIC integrity levels are mandatory controls that are put in place and enforced by the operating system. The following list describes the integrity levels from lowest to highest: - **Untrusted** Default assignment for processes that are logged on anonymously. - **Low** Default assignment for processes that interact with the Internet. - **Medium** Default assignment for standard user accounts and any object that is not explicitly designated with a lower or higher integrity level. - **High** Default assignment for administrator accounts and processes that request to run using administrative rights. - **System** Default assignment for Windows kernel and core services. - **Installer** Used by setup programs to install software. It is important that only trusted software is installed on computers because objects that are assigned the Installer integrity level can install, modify, and uninstall all other objects. Constant: SeRelabelPrivilege ### Possible values - User-defined list of accounts - Not Defined ### Best practices - Do not give any group this user right. ### Location Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment ### Default values By default this setting is Not defined on domain controllers and on stand-alone servers. The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page.
Server type or GPO | Default value |
---|---|
Default Domain Policy |
Not defined |
Default Domain Controller Policy |
Not defined |
Stand-Alone Server Default Settings |
Not defined |
Domain Controller Effective Default Settings |
Not defined |
Member Server Effective Default Settings |
Not defined |
Client Computer Effective Default Settings |
Not defined |