This tweak goes
well when UAC is already disabled and is assumed you have done so
already.
1. Type secpol.msc in
the Start Menu and press Enter.
2. Double click on
Local Policies then double click on Security Options.3. Scroll to the bottom to this entry - User Account Control: Run all administrators in Admin approval mode *
4. Double click that line . Set it to disabled then press OK
5. Reboot.
This
policy setting controls the behavior of all User Account Control (UAC) policy
settings for the computer. If you change this policy setting, you must restart
your computer.
* The options are
• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.
* The options are
• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.
But be
aware!
The
prompt that asks you to elevate a process with your administrator privileges is
not designed to be irritating, it is designed to protect you. It's called the
Least Privileged User component and it is designed to give the
user a one click solution to a wide range of vulnerabilities
like Blaster Worm and other viruses because everyone ran Windows XP with an
unprotected administrator account.in Windows Vista and later, all administrator accounts run as standard users unless the user (or an unknown component) initiates a process that requires administrator privileges and this is when the system will ask the logged on user for those privileges. This gives complete control back to the user and allows you to approve any administrator elevation with one click.
Remember: It is your computer, but only until you intentionally defeat the built-in security components. Then it will belong to them.
No comments:
Post a Comment