mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 20:03:40 +00:00
Fix content and formatting issues.
This commit is contained in:
@ -26,8 +26,7 @@ This policy setting determines the behavior of the elevation prompt for accounts
|
||||
|
||||
Assumes that the administrator will permit an operation that requires elevation, and additional consent or credentials are not required.
|
||||
|
||||
> [!NOTE]
|
||||
> Selecting **Elevate without prompting** minimizes the protection that is provided by UAC. We do not recommend selecting this value unless administrator accounts are tightly controlled and the operating environment is highly secure.
|
||||
**Note** Selecting **Elevate without prompting** minimizes the protection that is provided by UAC. We do not recommend selecting this value unless administrator accounts are tightly controlled and the operating environment is highly secure.
|
||||
|
||||
- **Prompt for credentials on the secure desktop**
|
||||
|
||||
@ -51,7 +50,8 @@ This policy setting determines the behavior of the elevation prompt for accounts
|
||||
|
||||
\*If you have enabled the built-in Administrator account and have configured Admin Approval Mode, you must also configure the option **Prompt for consent on the secure desktop**. You can also configure this option from User Account Control, by typing **UAC** in the search box. From the User Account Control Settings dialog box, set the slider control to **Notify me only when apps try to make changes to my computer (default)**.
|
||||
|
||||
To activate the setting, you must first log in and out. Alternatively, you may perform **gpupdate /force** from an elevated command prompt.
|
||||
> [!NOTE]
|
||||
> After enabling Admin Approval Mode, to activate the setting, you must first log in and out. Alternatively, You may perform **gpupdate /force** from an elevated command prompt.
|
||||
|
||||
### Best practices
|
||||
|
||||
@ -59,9 +59,6 @@ This policy setting determines the behavior of the elevation prompt for accounts
|
||||
|
||||
- It is recommended not to enable the built-in Administrator account on the client computer, but to use the standard user account and User Account Control (UAC) instead. If you want to enable the built-in Administrator account to carry out administrative tasks, for security reasons you should also enable Admin Approval Mode. For further information, see [UAC-Admin-Approval-Mode-for-the-Built-in-Administrator-account](https://docs.microsoft.com/en-us/windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account)
|
||||
|
||||
> [!NOTE]
|
||||
> After enabling Admin Approval Mode, to activate the setting, you must first log in and out. Alternatively, You may perform **gpupdate /force** from an elevated command prompt.
|
||||
|
||||
### Location
|
||||
|
||||
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
|
||||
|
Reference in New Issue
Block a user