programming4us
programming4us
DESKTOP

Windows 8 : Managing authorization and access rights (part 3) - Running tasks as administrator and user account control

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Running tasks as administrator and user account control

When working with Windows 8, it might be necessary to impersonate another user, usually the administrator account, to perform a task. Prior to user account control (UAC), many applications relied on administrative credentials and privileges to perform their tasks. Doing this enabled the applications to function unchecked and, if compromised, cause potential problems across a computer or even throughout a networked environment. UAC requires the applications to function without elevated control, unless it is specifically granted by the user who is signed in.

User account control was created to ensure that most user accounts cannot perform actions that could damage the operating system. By default, UAC is enabled and set to a moderate level, which alerts you when system-changing events happen. For example, when you try to perform an action that exceeds the privilege level of your user account, UAC presents a sign-in dialog box asking for credentials with enough privilege to complete the task. Figure 1 shows an example of the UAC prompt dialog box.

UAC alerting you of an action

Figure 1. UAC alerting you of an action

The goal of UAC is to prevent users from allowing everything to run with the highest privilege possible without at least being alerted to the actions. Actions that require additional elevation will prompt the signed-in user to provide credentials with more access rights than the current user account or alert the user of actions being taken. When UAC is turned on, very few applications can perform actions without the knowledge of the person using the computer.

To determine and modify the level of universal account control on a computer, complete the following steps:

  1. On the Start screen, type UAC and press Enter.

  2. Select Settings from the search results.

  3. Select Change User Account Control Settings.

    Figure 2 shows the UAC Settings dialog box.

    UAC settings configuration

    Figure 2. UAC settings configuration

  4. Choose one of the following options:

    • Always notify me when:

      • Apps try to install software or make changes to my computer.

      • I make changes to Windows settings.

    • Notify me only when apps try to make changes to my computer (default).

    • Notify me only when apps try to make changes to my computer (do not dim my desktop).

    • Never notify me when:

      • Apps try to install software or make changes to my computer.

      • I make changes to Windows settings.

    If you choose the option of never being notified, you have effectively disabled UAC.

  5. When you have chosen the settings that will work best for your computer, tap or click OK.

  6. Restart your computer for the changes to UAC settings to take effect.

The option to dim the desktop as part of UAC helps make sure whoever is using the computer is aware of the prompt for changes. Many times with a dialog box, the first option selected or highlighted is chosen by using the Enter key, and the message presented is not reviewed. Changing the brightness of the desktop along with the dialog box will grab the user’s attention. In addition, because a malicious application could produce a dialog box that looks identical to a Microsoft dialog box, the desktop is dimmed to ensure that you notice when something is modifying your computer.

Other  
  •  Windows 8 : Determining who’s who through authentication (part 5) - Logging on by using a picture password,Using a personal identification number for authentication
  •  Windows 8 : Determining who’s who through authentication (part 4) - Managing credentials in Windows 8 by using Credential Manager,Configuring a Microsoft account for use with Windows
  •  Windows 8 : Determining who’s who through authentication (part 3) - Smart card authentication, Biometric authentication
  •  Windows 8 : Determining who’s who through authentication (part 2) - User name and password-based authentication
  •  Windows 8 : Determining who’s who through authentication (part 1) - How does Windows authenticate users accessing the system?
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 9) - Configuring WMI filtering
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 8) - Managing GPO links, Configuring security filtering
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 7) - Viewing infrastructure status, Creating GPOs
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 6) - Advanced Audit Policy Configuration
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 5) - User Rights Assignment, Security Options
  •  
    Top 10
    Free Mobile And Desktop Apps For Accessing Restricted Websites
    MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
    TOYOTA CAMRY 2; 2.5 : Camry now more comely
    KIA SORENTO 2.2CRDi : Fuel-sipping slugger
    How To Setup, Password Protect & Encrypt Wireless Internet Connection
    Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
    Backup & Restore Game Progress From Any Game With SaveGameProgress
    Generate A Facebook Timeline Cover Using A Free App
    New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
    SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
    - Messages forwarded by Outlook rule go nowhere
    - Create and Deploy Windows 7 Image
    - How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
    - Creating and using an unencrypted cookie in ASP.NET
    - Directories
    - Poor Performance on Sharepoint 2010 Server
    - SBS 2008 ~ The e-mail alias already exists...
    - Public to Private IP - DNS Changes
    - Send Email from Winform application
    - How to create a .mdb file from ms sql server database.......
    programming4us programming4us
    programming4us
     
     
    programming4us