@@ -182,12 +182,12 @@ public bool IsACLProtected(byte[] ntSecurityDescriptor) {
182182
183183 // If we got a valid hash, check if it matches this domain's AdminSDHolder hash
184184 if ( ! string . IsNullOrEmpty ( currentObjectHash ) ) {
185- _log . LogDebug ( "Comparing ACL hash {Hash} with AdminSDHolder hashes for {Name}" ,
185+ _log . LogTrace ( "Comparing ACL hash {Hash} with AdminSDHolder hashes for {Name}" ,
186186 currentObjectHash , objectName ) ;
187187 isAdminSdHolderProtected = adminSdHolderHash . Equals ( currentObjectHash , StringComparison . OrdinalIgnoreCase ) ;
188188
189189 if ( isAdminSdHolderProtected == true ) {
190- _log . LogDebug ( "Object {Name} is protected by AdminSDHolder" , objectName ) ;
190+ _log . LogTrace ( "Object {Name} is protected by AdminSDHolder" , objectName ) ;
191191 }
192192 }
193193
@@ -245,7 +245,7 @@ public string CalculateImplicitACLHash(byte[] ntSecurityDescriptor, string objec
245245 return string . Empty ;
246246 }
247247
248- _log . LogInformation ( "Calculating hash of implicit ACEs for {Name}" , objectName ) ;
248+ _log . LogTrace ( "Calculating hash of implicit ACEs for {Name}" , objectName ) ;
249249 var descriptor = _utils . MakeSecurityDescriptor ( ) ;
250250
251251 try
@@ -262,7 +262,7 @@ public string CalculateImplicitACLHash(byte[] ntSecurityDescriptor, string objec
262262
263263 // Check if DACL is protected
264264 bool isDaclProtected = descriptor . AreAccessRulesProtected ( ) ;
265- _log . LogInformation ( "DACL Protection status for {Name}: {IsProtected}" , objectName , isDaclProtected ) ;
265+ _log . LogTrace ( "DACL Protection status for {Name}: {IsProtected}" , objectName , isDaclProtected ) ;
266266
267267 // Get all ACEs, including Deny ACEs, but skip inherited ones
268268 var aceList = new List < ACEForHashing > ( ) ;
0 commit comments