What does uac do




















This prompt ensures that no malicious software can be silently installed. The consent prompt is presented when a user attempts to perform a task that requires a user's administrative access token. The following is an example of the UAC consent prompt. The credential prompt is presented when a standard user attempts to perform a task that requires a user's administrative access token.

Administrators can also be required to provide their credentials by setting the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode policy setting value to Prompt for credentials. The UAC elevation prompts are color-coded to be app-specific, enabling for immediate identification of an application's potential security risk. When an app attempts to run with an administrator's full access token, Windows 10 or Windows 11 first analyzes the executable file to determine its publisher.

Apps are first separated into three categories based on the file's publisher: Windows 10 or Windows 11, publisher verified signed , and publisher not verified unsigned. The following diagram illustrates how Windows determines which color elevation prompt to present to the user. Some Control Panel items, such as Date and Time Properties , contain a combination of administrator and standard user operations.

Standard users can view the clock and change the time zone, but a full administrator access token is required to change the local system time. The shield icon on the Change date and time button indicates that the process requires a full administrator access token and will display a UAC elevation prompt.

The elevation process is further secured by directing the prompt to the secure desktop. The consent and credential prompts are displayed on the secure desktop by default in Windows 10 and Windows Only Windows processes can access the secure desktop.

For higher levels of security, we recommend keeping the User Account Control: Switch to the secure desktop when prompting for elevation policy setting enabled.

When an executable file requests elevation, the interactive desktop, also called the user desktop, is switched to the secure desktop. The secure desktop dims the user desktop and displays an elevation prompt that must be responded to before continuing. When the user clicks Yes or No , the desktop switches back to the user desktop. Malware can present an imitation of the secure desktop, but when the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode policy setting is set to Prompt for consent , the malware does not gain elevation if the user clicks Yes on the imitation.

If the policy setting is set to Prompt for credentials , malware imitating the credential prompt may be able to gather the credentials from the user. However, the malware does not gain elevated privilege and the system has other protections that mitigate malware from taking control of the user interface even with a harvested password.

While malware could present an imitation of the secure desktop, this issue cannot occur unless a user previously installed the malware on the PC. Because processes requiring an administrator access token cannot silently install when UAC is enabled, the user must explicitly provide consent by clicking Yes or by providing administrator credentials. If the operation changes the file system or registry, Virtualization is called. All other operations call ShellExecute.

ShellExecute calls CreateProcess. If it receives the error, ShellExecute calls the Application Information service to attempt to perform the requested task with the elevated prompt. A system service that helps start apps that require one or more elevated privileges or user rights to run, such as local administrative tasks, and apps that require higher integrity levels. The Application Information service helps start such apps by creating a new process for the application with an administrative user's full access token when elevation is required and depending on Group Policy consent is given by the user to do so.

Notify me only when programs try to make changes to my computer do not dim my desktop will:. The User Account Control: Switch to the secure desktop when prompting for elevation policy setting is checked:.

If the secure desktop is enabled, all elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users. If the secure desktop is not enabled, all elevation requests go to the interactive user's desktop, and the per-user settings for administrators and standard users are used. The nature of User Account Control depends on the concept of developing multiple user accounts on an operating system, which began with Windows NT in Using User Account Control involves administering application requests, doing configuration and manually providing these specific status levels for users.

Microsoft has published guidelines for the use of User Account Control, and detailed tutorials online explain UAC settings as well as how to disable this feature on Windows operating systems.

By: Justin Stoltzfus Contributor, Reviewer. By: Satish Balakrishnan. Dictionary Dictionary Term of the Day. In Windows 10 however, there are four UAC levels to choose from:. Confirm your selection or enter your admin password if prompted to, and then restart your computer to keep the changes.

If you want to enable or turn UAC on again, enter this command:. However, before you do that, make sure you back up the registry to avoid any system issues. UAC makes all the difference between standard user accounts and administrator accounts.

With the feature, you have a basic level system security that helps save your system from malicious processes even with a security suite in place. Elsie is a technology writer and editor with a special focus on Windows, Android and iOS. Is this page helpful? Yes No. Any additional feedback? Skip Submit. Submit and view feedback for This product This page. View all page feedback. How User Account Control works.

UAC helps mitigate the impact of malware.



0コメント

  • 1000 / 1000