From d07ed3b3143eaa781f203e7cca04acc388a587a1 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Mon, 4 Oct 2021 17:24:56 -0700 Subject: [PATCH 1/2] Update user-account-control-overview.md --- .../user-account-control/user-account-control-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/user-account-control/user-account-control-overview.md b/windows/security/identity-protection/user-account-control/user-account-control-overview.md index 263dd2fe27..2b8371db00 100644 --- a/windows/security/identity-protection/user-account-control/user-account-control-overview.md +++ b/windows/security/identity-protection/user-account-control/user-account-control-overview.md @@ -30,7 +30,7 @@ UAC allows all users to log on to their computers using a standard user account. Other apps, especially those that were not specifically designed with security settings in mind, often require additional permissions to run successfully. These types of apps are referred to as legacy apps. Additionally, actions such as installing new software and making configuration changes to the Windows Firewall, require more permissions than what is available to a standard user account. -When an app needs to run with more than standard user rights, UAC can restore additional user groups to the token. This enables the user to have explicit control of apps that are making system level changes to their computer or device. +When an app needs to run with more than standard user rights, UAC allows users to run apps with their “full” administrator token (with administrative groups and privileges) instead of their default, standard user access token. Users continue to operate in the standard user security context, while enabling certain apps to run with elevated privileges, if needed. ## Practical applications From 3443c61357994978d964702470785e58786e53d4 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Mon, 4 Oct 2021 17:59:01 -0700 Subject: [PATCH 2/2] Update user-account-control-overview.md --- .../user-account-control/user-account-control-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/user-account-control/user-account-control-overview.md b/windows/security/identity-protection/user-account-control/user-account-control-overview.md index 2b8371db00..2e221d273c 100644 --- a/windows/security/identity-protection/user-account-control/user-account-control-overview.md +++ b/windows/security/identity-protection/user-account-control/user-account-control-overview.md @@ -30,7 +30,7 @@ UAC allows all users to log on to their computers using a standard user account. Other apps, especially those that were not specifically designed with security settings in mind, often require additional permissions to run successfully. These types of apps are referred to as legacy apps. Additionally, actions such as installing new software and making configuration changes to the Windows Firewall, require more permissions than what is available to a standard user account. -When an app needs to run with more than standard user rights, UAC allows users to run apps with their “full” administrator token (with administrative groups and privileges) instead of their default, standard user access token. Users continue to operate in the standard user security context, while enabling certain apps to run with elevated privileges, if needed. +When an app needs to run with more than standard user rights, UAC allows users to run apps with their administrator token (with administrative groups and privileges) instead of their default, standard user access token. Users continue to operate in the standard user security context, while enabling certain apps to run with elevated privileges, if needed. ## Practical applications