Sunday, October 5, 2014

How to make Windows 8 understand you ARE the Administrator

This tweak goes well when UAC is already disabled and is assumed you have done so already.


 1.       Type secpol.msc in the Start Menu and press Enter.
2.       Double click on Local Policies then double click on Security Options.
3.       Scroll to the bottom to this entry - User Account Control: Run all administrators in Admin approval mode *
4.       Double click that line . Set it to disabled then press OK
5.       Reboot.

This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer.
*
The options are
• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.

But be aware!
The prompt that asks you to elevate a process with your administrator privileges is not designed to be irritating, it is designed to protect you. It's called the Least Privileged User component and it is designed to give the user a one click solution to a wide range of vulnerabilities like Blaster Worm and other viruses because everyone ran Windows XP with an unprotected administrator account.

in Windows Vista and later, all administrator accounts run as standard users unless the user (or an unknown component) initiates a process that requires administrator privileges and this is when the system will ask the logged on user for those privileges. This gives complete control back to the user and allows you to approve any administrator elevation with one click.

Remember: It is your computer, but only until you intentionally defeat the built-in security components. Then it will belong to them.

No comments:

Post a Comment