mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-22 13:53:39 +00:00
Applied note styles and corrected table header cells
This commit is contained in:
@ -109,9 +109,7 @@ To better understand each component, review the table below:
|
|||||||
<th>Description</th>
|
<th>Description</th>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<th colspan="2">User</th>
|
||||||
<p><b>User</b></p>
|
|
||||||
</td>
|
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
@ -138,9 +136,7 @@ To better understand each component, review the table below:
|
|||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<th colspan="2">System</th>
|
||||||
<p><b>System</b></p>
|
|
||||||
</td>
|
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
@ -248,8 +244,7 @@ To better understand each component, review the table below:
|
|||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<th colspan="2">Kernel</th>
|
||||||
<p><b>Kernel</b></p>
|
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
@ -276,9 +271,11 @@ The slider will never turn UAC completely off. If you set it to <b>Never notify<
|
|||||||
- Cause all elevation request initiated by administrators to be auto-approved without showing a UAC prompt.
|
- Cause all elevation request initiated by administrators to be auto-approved without showing a UAC prompt.
|
||||||
- Automatically deny all elevation requests for standard users.
|
- Automatically deny all elevation requests for standard users.
|
||||||
|
|
||||||
> **Important:** In order to fully disable UAC you must disable the policy **User Account Control: Run all administrators in Admin Approval Mode**.
|
> [!IMPORTANT]
|
||||||
>
|
> In order to fully disable UAC you must disable the policy **User Account Control: Run all administrators in Admin Approval Mode**.
|
||||||
> **Warning:** Some Universal Windows Platform apps may not work when UAC is disabled.
|
|
||||||
|
> [!WARNING]
|
||||||
|
> Some Universal Windows Platform apps may not work when UAC is disabled.
|
||||||
|
|
||||||
### Virtualization
|
### Virtualization
|
||||||
|
|
||||||
@ -291,7 +288,9 @@ Most app tasks operate properly by using virtualization features. Although virtu
|
|||||||
Virtualization is not an option in the following scenarios:
|
Virtualization is not an option in the following scenarios:
|
||||||
|
|
||||||
- Virtualization does not apply to apps that are elevated and run with a full administrative access token.
|
- Virtualization does not apply to apps that are elevated and run with a full administrative access token.
|
||||||
|
|
||||||
- Virtualization supports only 32-bit apps. Non-elevated 64-bit apps simply receive an access denied message when they attempt to acquire a handle (a unique identifier) to a Windows object. Native Windows 64-bit apps are required to be compatible with UAC and to write data into the correct locations.
|
- Virtualization supports only 32-bit apps. Non-elevated 64-bit apps simply receive an access denied message when they attempt to acquire a handle (a unique identifier) to a Windows object. Native Windows 64-bit apps are required to be compatible with UAC and to write data into the correct locations.
|
||||||
|
|
||||||
- Virtualization is disabled if the app includes an app manifest with a requested execution level attribute.
|
- Virtualization is disabled if the app includes an app manifest with a requested execution level attribute.
|
||||||
|
|
||||||
### Request execution levels
|
### Request execution levels
|
||||||
@ -319,6 +318,8 @@ Before a 32-bit process is created, the following attributes are checked to dete
|
|||||||
- Key attributes in the resource script data are linked in the executable file.
|
- Key attributes in the resource script data are linked in the executable file.
|
||||||
- There are targeted sequences of bytes within the executable file.
|
- There are targeted sequences of bytes within the executable file.
|
||||||
|
|
||||||
> **Note:** The keywords and sequences of bytes were derived from common characteristics observed from various installer technologies.
|
> [!NOTE]
|
||||||
>
|
> The keywords and sequences of bytes were derived from common characteristics observed from various installer technologies.
|
||||||
> **Note:** The User Account Control: Detect application installations and prompt for elevation policy setting must be enabled for installer detection to detect installation programs. For more info, see [User Account Control security policy settings](user-account-control-security-policy-settings.md).
|
|
||||||
|
> [!NOTE]
|
||||||
|
> The User Account Control: Detect application installations and prompt for elevation policy setting must be enabled for installer detection to detect installation programs. For more info, see [User Account Control security policy settings](user-account-control-security-policy-settings.md).
|
||||||
|
Reference in New Issue
Block a user