All access attempts are audited.
The access mask is propagated to child container objects.
Failed access attempts are audited.
An ACE is inherited from a parent container rather than being explicitly set for an object.
The access mask is propagated only to child objects. This includes both container and leaf child objects.
No ACE flags are set.
The access checks do not apply to the object; they only apply to its children.
The access mask is propagated onto child leaf objects.
Successful access attempts are audited.