programming4us
programming4us
DESKTOP

Windows 8 : Managing authorization and access rights (part 3) - Running tasks as administrator and user account control

7/21/2014 9:18:55 PM

Running tasks as administrator and user account control

When working with Windows 8, it might be necessary to impersonate another user, usually the administrator account, to perform a task. Prior to user account control (UAC), many applications relied on administrative credentials and privileges to perform their tasks. Doing this enabled the applications to function unchecked and, if compromised, cause potential problems across a computer or even throughout a networked environment. UAC requires the applications to function without elevated control, unless it is specifically granted by the user who is signed in.

User account control was created to ensure that most user accounts cannot perform actions that could damage the operating system. By default, UAC is enabled and set to a moderate level, which alerts you when system-changing events happen. For example, when you try to perform an action that exceeds the privilege level of your user account, UAC presents a sign-in dialog box asking for credentials with enough privilege to complete the task. Figure 1 shows an example of the UAC prompt dialog box.

UAC alerting you of an action

Figure 1. UAC alerting you of an action

The goal of UAC is to prevent users from allowing everything to run with the highest privilege possible without at least being alerted to the actions. Actions that require additional elevation will prompt the signed-in user to provide credentials with more access rights than the current user account or alert the user of actions being taken. When UAC is turned on, very few applications can perform actions without the knowledge of the person using the computer.

To determine and modify the level of universal account control on a computer, complete the following steps:

  1. On the Start screen, type UAC and press Enter.

  2. Select Settings from the search results.

  3. Select Change User Account Control Settings.

    Figure 2 shows the UAC Settings dialog box.

    UAC settings configuration

    Figure 2. UAC settings configuration

  4. Choose one of the following options:

    • Always notify me when:

      • Apps try to install software or make changes to my computer.

      • I make changes to Windows settings.

    • Notify me only when apps try to make changes to my computer (default).

    • Notify me only when apps try to make changes to my computer (do not dim my desktop).

    • Never notify me when:

      • Apps try to install software or make changes to my computer.

      • I make changes to Windows settings.

    If you choose the option of never being notified, you have effectively disabled UAC.

  5. When you have chosen the settings that will work best for your computer, tap or click OK.

  6. Restart your computer for the changes to UAC settings to take effect.

The option to dim the desktop as part of UAC helps make sure whoever is using the computer is aware of the prompt for changes. Many times with a dialog box, the first option selected or highlighted is chosen by using the Enter key, and the message presented is not reviewed. Changing the brightness of the desktop along with the dialog box will grab the user’s attention. In addition, because a malicious application could produce a dialog box that looks identical to a Microsoft dialog box, the desktop is dimmed to ensure that you notice when something is modifying your computer.

Other  
  •  Windows 8 : Determining who’s who through authentication (part 5) - Logging on by using a picture password,Using a personal identification number for authentication
  •  Windows 8 : Determining who’s who through authentication (part 4) - Managing credentials in Windows 8 by using Credential Manager,Configuring a Microsoft account for use with Windows
  •  Windows 8 : Determining who’s who through authentication (part 3) - Smart card authentication, Biometric authentication
  •  Windows 8 : Determining who’s who through authentication (part 2) - User name and password-based authentication
  •  Windows 8 : Determining who’s who through authentication (part 1) - How does Windows authenticate users accessing the system?
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 9) - Configuring WMI filtering
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 8) - Managing GPO links, Configuring security filtering
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 7) - Viewing infrastructure status, Creating GPOs
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 6) - Advanced Audit Policy Configuration
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 5) - User Rights Assignment, Security Options
  •  
    video
     
    Video tutorials
    - How To Install Windows 8

    - How To Install Windows Server 2012

    - How To Install Windows Server 2012 On VirtualBox

    - How To Disable Windows 8 Metro UI

    - How To Install Windows Store Apps From Windows 8 Classic Desktop

    - How To Disable Windows Update in Windows 8

    - How To Disable Windows 8 Metro UI

    - How To Add Widgets To Windows 8 Lock Screen

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010
    programming4us programming4us
    programming4us
     
     
    programming4us