Results 1 to 2 of 2

Thread: How to disable UAC in Windows 2008

  1. #1
    Join Date
    Apr 2008
    Posts
    598

    How to disable UAC in Windows 2008

    What is User Account Control?

    User Account Control (UAC) is a new security component in Windows Vista. UAC enables users to perform common tasks as non-administrators, called standard users in Windows Vista, and as administrators without having to switch users, log off, or use Run As. A standard user account is synonymous with a user account in Windows XP. User accounts that are members of the local Administrators group will run most applications as a standard user. By separating user and administrator functions while enabling productivity, UAC is an important enhancement for Windows Vista.

    When an administrator logs on to a computer running Windows Vista, the user is assigned two separate access tokens. Access tokens, which contain a user's group membership and authorization and access control data, are used by Windows to control what resources and tasks the user can access. Before Windows Vista, an administrator account received only one access token, which included data to grant the user access to all Windows resources. This access control model did not include any failsafe checks to ensure that users truly wanted to perform a task that required their administrative access token. As a result, malicious software could install on users' computers without notifying the users.

    Even more damaging, because the user is an administrator, the malicious software could use the administrator's access control data to infect core operating system files and, in some instances, to become nearly impossible to remove.

    The primary difference between a standard user and an administrator in Windows Vista is the level of access the user has over core, protected areas of the computer. Administrators can change system state, turn off the firewall, configure security policy, install a service or a driver that affects every user on the computer, and install software for the entire computer. Standard users cannot perform these tasks and can only install per-user software.

    To help prevent malicious software from silently installing and causing computer-wide infection, Microsoft developed the UAC feature. Unlike previous versions of Windows, when an administrator logs on to a computer running Windows Vista, the user’s full administrator access token is split into two access tokens: a full administrator access token and a standard user access token. During the logon process, authorization and access control components that identify an administrator are removed, resulting in a standard user access token. The standard user access token is then used to start the desktop, the Explorer.exe process. Because all applications inherit their access control data from the initial launch of the desktop, they all run as a standard user as well.

    After an administrator logs on, the full administrator access token is not invoked until the user attempts to perform an administrative task.

    Contrasting with this process, when a standard user logs on, only a standard user access token is created. This standard user access token is then used to start the desktop.

  2. #2
    Join Date
    Apr 2008
    Posts
    598

    Re: How to disable UAC in Windows 2008

    How to disable UAC

    Use the following procedure to disable UAC:
    1. Click Start, and then click Control Panel.
    2. In Control Panel, click User Accounts.
    3. In the User Accounts window, click User Accounts.
    4. In the User Accounts tasks window, click Turn User Account Control on or off.
    5. If UAC is currently configured in Admin Approval Mode, the User Account Control message appears. Click Continue.
    6. Clear the Use User Account Control (UAC) to help protect your computer check box, and then click OK.
    7. Click Restart Now to apply the change right away, or click Restart Later and close the User Accounts tasks window.


    To disable UAC from prompting for credentials to install applications
    1. Click Start, click All Programs, click Accessories, click Run, type secpol.msc in the Open text box, and then click OK.
    2. From the Local Security Settings console tree, click Local Policies, and then Security Options.
    3. Scroll down and double-click User Account Control: Detect application installations and prompt for elevation.
    4. Select the Disabled option, and then click OK.
    5. Close the Local Security Settings window.

Similar Threads

  1. disable reboot in windows server 2008 r2
    By loverdo in forum Windows Server Help
    Replies: 1
    Last Post: 18-04-2012, 04:06 PM
  2. Disable Windows Firewall GPO in SBS 2008
    By shipper in forum Small Business Server
    Replies: 3
    Last Post: 07-12-2010, 10:29 PM
  3. How to Disable UAC in Windows Server 2008
    By jamiecc in forum Operating Systems
    Replies: 3
    Last Post: 31-05-2010, 11:49 PM
  4. Replies: 1
    Last Post: 11-05-2009, 08:44 PM
  5. Replies: 4
    Last Post: 11-01-2009, 01:55 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,750,896,573.98682 seconds with 16 queries