Skip to main content
deleted 1 character in body
Source Link
abstrask
  • 4.9k
  • 5
  • 27
  • 34

Security is a balance between, well, security and convenienceSecurity is a balance between, well, security and convenience. UAC was introduced with Windows Vista, primarily to detect when admin rights were needed, and to automatically prompt you to authenticate with an(other) account, with admin rights. This made practicing the Principle of Least Privilege a lot easier.

Security is a balance between, well, security and convenience. UAC was introduced with Windows Vista, primarily to detect when admin rights were needed, and to automatically prompt you to authenticate with an(other) account, with admin rights. This made practicing the Principle of Least Privilege a lot easier.

Security is a balance between, well, security and convenience. UAC was introduced with Windows Vista, primarily to detect when admin rights were needed, and to automatically prompt you to authenticate with an(other) account, with admin rights. This made practicing the Principle of Least Privilege a lot easier.

Pointed dead link to archive.org
Source Link
abstrask
  • 4.9k
  • 5
  • 27
  • 34

Security is a balance between, well, security and convenienceSecurity is a balance between, well, security and convenience. UAC was introduced with Windows Vista, primarily to detect when admin rights were needed, and to automatically prompt you to authenticate with an(other) account, with admin rights. This made practicing the Principle of Least Privilege a lot easier.

Security is a balance between, well, security and convenience. UAC was introduced with Windows Vista, primarily to detect when admin rights were needed, and to automatically prompt you to authenticate with an(other) account, with admin rights. This made practicing the Principle of Least Privilege a lot easier.

Security is a balance between, well, security and convenience. UAC was introduced with Windows Vista, primarily to detect when admin rights were needed, and to automatically prompt you to authenticate with an(other) account, with admin rights. This made practicing the Principle of Least Privilege a lot easier.

Grammar, clarify
Source Link
abstrask
  • 4.9k
  • 5
  • 27
  • 34

As a side-effect, performing tasks requiring admin rights, while logged in with an admin account, gives you a chance to actually confirm that you want to exercise these rights. UAC prompts when installing software seemsseem reasonable, whereas when opening a normal webpage doesn't.

However, it turns out most users don't use separate accounts and quite a few day-to-day tasks requiresrequire admin rights (adjusting settings for clock, network, power plan etc.), and would thus trigger an UAC prompt in Vista. This slew of prompts causes most users to

b) Disable UAC confirmation entirely

Both actions defeat the purpose of UAC.

As a side-effect, performing tasks requiring admin rights, while logged in with an admin account, gives you a chance to actually confirm that you want to exercise these rights. UAC prompts when installing software seems reasonable, whereas when opening a normal webpage doesn't.

However, it turns out most users don't use separate accounts and quite a few day-to-day tasks requires admin rights (adjusting settings for clock, network, power plan etc.), and would thus trigger an UAC prompt in Vista. This slew of prompts causes most users to

b) Disable UAC confirmation entirely

Both actions defeat the purpose of UAC.

As a side-effect, performing tasks requiring admin rights, while logged in with an admin account, gives you a chance to actually confirm that you want to exercise these rights. UAC prompts when installing software seem reasonable, whereas when opening a normal webpage doesn't.

However, it turns out most users don't use separate accounts and quite a few day-to-day tasks require admin rights (adjusting settings for clock, network, power plan etc.), and would thus trigger an UAC prompt in Vista. This slew of prompts causes most users to

b) Disable UAC confirmation entirely

Changed "remote code execution" to "code injection"
Source Link
abstrask
  • 4.9k
  • 5
  • 27
  • 34
Loading
Source Link
abstrask
  • 4.9k
  • 5
  • 27
  • 34
Loading