removed uac

This commit is contained in:
Paolo Matarazzo 2024-10-15 08:21:22 -04:00
parent 72e43a3bbc
commit 2039188a73
7 changed files with 7 additions and 22 deletions

View File

@ -45,22 +45,15 @@ Customers can use some built-in options for App Control for Business or upload t
- [Application Control for Windows][LINK-2]
- [Automatically allow apps deployed by a managed installer with App Control for Business][LINK-3]
## User Account Control
## :::image type="icon" source="images/soon-button-title.svg" border="false"::: Administrator protection
User Account Control (UAC) helps prevent malware from damaging a PC and enables organizations to deploy a better-managed desktop. With UAC, apps and tasks always run in the security context of a non-administrator account unless an administrator specifically authorizes administrator-level access to the system. UAC can block the automatic installation of unauthorized apps and prevent inadvertent changes to system settings.
Most people run as full admins on their devices, which means apps and services have the same access to the kernel and other critical services as users. And the problem is that these apps and services can access critical resources without the user knowing. This is why Windows is being updated to require just in time administrative access to the kernel and other critical services as needed, not all the time, and certainly not by default. This makes it harder for an app to unexpectedly abuse admin privileges and secretly put malware or malicious code on Windows.
Organizations can use a device management solution like Microsoft Intune to remotely configure UAC settings. For those without such a solution, settings can be adjusted directly on the device.
When Administrator protection is enabled, if an app needs special permissions like administrative rights, you'll be asked for approval. When an approval is needed, Windows Hello provides a secure and easy way to approve or deny these requests, giving you, and only you, full control over your device.
Enabling UAC helps prevent malware from altering PC settings and potentially gaining access to networks and sensitive data. UAC can also block the automatic installation of unauthorized
apps and prevent inadvertent changes to system settings.
This helps reduce elevation of privilege (EOP) attacks on Windows where admin privileges are abused. The feature is currently in preview available on Windows Insider channel.
Users with standard accounts, or those using administrative accounts with UAC enabled, run most programs with limited access rights. This includes the Windows shell and any apps started from the shell, such as Windows Explorer, a web browser, productivity suite, graphics programs, or games.
Some apps require more permissions and won't work properly (or at all) when running with limited permissions. When an app needs to run with more than standard user rights, UAC allows users to run apps with a *full* administrator token (with administrative groups and privileges) instead of their default user access token. Users continue to operate in the standard user security context while enabling certain executables to run with elevated privileges if needed.
[!INCLUDE [learn-more](includes/learn-more.md)]
- [How User Account Control works](/windows/security/identity-protection/user-account-control/how-user-account-control-works)
Replacement for [User Account Control](/windows/security/identity-protection/user-account-control/how-user-account-control-works).
## Microsoft vulnerable driver blocklist

View File

@ -15,7 +15,7 @@ We will continue to innovate with security by design and security by default at
New:
- [Administrator protection](operating-system-security-system-security.md#-administrator-protection)
- [Administrator protection](application-security-application-and-driver-control.md#-administrator-protection)
- [Config Refresh](operating-system-security-system-security.md#-config-refresh)
- [Rust in Windows](operating-system-security-system-security.md#-rust-in-windows)
- [Trusted signing](application-security-application-and-driver-control.md#-trusted-signing)

File diff suppressed because one or more lines are too long

View File

@ -108,14 +108,6 @@ IT administrators can refine the application and management of access to:
- [Access control][LINK-7]
## :::image type="icon" source="images/soon-button-title.svg" border="false"::: Administrator protection
Most people run as full admins on their devices, which means apps and services have the same access to the kernel and other critical services as users. And the problem is that these apps and services can access critical resources without the user knowing. This is why Windows is being updated to require just in time administrative access to the kernel and other critical services as needed, not all the time, and certainly not by default. This makes it harder for an app to unexpectedly abuse admin privileges and secretly put malware or malicious code on Windows.
When Administrator protection is enabled, if an app needs special permissions like administrative rights, you'll be asked for approval. When an approval is needed, Windows Hello provides a secure and easy way to approve or deny these requests, giving you, and only you, full control over your device.
This helps reduce elevation of privilege (EOP) attacks on Windows where admin privileges are abused. The feature is currently in preview available on Windows Insider channel.
<!--links-->
[LINK-2]: /windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection

Binary file not shown.

Before

Width:  |  Height:  |  Size: 281 KiB

After

Width:  |  Height:  |  Size: 282 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.3 MiB

After

Width:  |  Height:  |  Size: 1.3 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 399 KiB

After

Width:  |  Height:  |  Size: 396 KiB