The invention controls operations performed on various system objects including those that are visible to a user interface, such as files and printers, and those that are hidden from users, such as processes, system events, semaphores and named pipes.