mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 04:13:41 +00:00
Fix content and formatting issues.
This commit is contained in:
@ -26,8 +26,7 @@ This policy setting determines the behavior of the elevation prompt for accounts
|
|||||||
|
|
||||||
Assumes that the administrator will permit an operation that requires elevation, and additional consent or credentials are not required.
|
Assumes that the administrator will permit an operation that requires elevation, and additional consent or credentials are not required.
|
||||||
|
|
||||||
> [!NOTE]
|
**Note** Selecting **Elevate without prompting** minimizes the protection that is provided by UAC. We do not recommend selecting this value unless administrator accounts are tightly controlled and the operating environment is highly secure.
|
||||||
> Selecting **Elevate without prompting** minimizes the protection that is provided by UAC. We do not recommend selecting this value unless administrator accounts are tightly controlled and the operating environment is highly secure.
|
|
||||||
|
|
||||||
- **Prompt for credentials on the secure desktop**
|
- **Prompt for credentials on the secure desktop**
|
||||||
|
|
||||||
@ -51,7 +50,8 @@ This policy setting determines the behavior of the elevation prompt for accounts
|
|||||||
|
|
||||||
\*If you have enabled the built-in Administrator account and have configured Admin Approval Mode, you must also configure the option **Prompt for consent on the secure desktop**. You can also configure this option from User Account Control, by typing **UAC** in the search box. From the User Account Control Settings dialog box, set the slider control to **Notify me only when apps try to make changes to my computer (default)**.
|
\*If you have enabled the built-in Administrator account and have configured Admin Approval Mode, you must also configure the option **Prompt for consent on the secure desktop**. You can also configure this option from User Account Control, by typing **UAC** in the search box. From the User Account Control Settings dialog box, set the slider control to **Notify me only when apps try to make changes to my computer (default)**.
|
||||||
|
|
||||||
To activate the setting, you must first log in and out. Alternatively, you may perform **gpupdate /force** from an elevated command prompt.
|
> [!NOTE]
|
||||||
|
> After enabling Admin Approval Mode, to activate the setting, you must first log in and out. Alternatively, You may perform **gpupdate /force** from an elevated command prompt.
|
||||||
|
|
||||||
### Best practices
|
### Best practices
|
||||||
|
|
||||||
@ -59,9 +59,6 @@ This policy setting determines the behavior of the elevation prompt for accounts
|
|||||||
|
|
||||||
- It is recommended not to enable the built-in Administrator account on the client computer, but to use the standard user account and User Account Control (UAC) instead. If you want to enable the built-in Administrator account to carry out administrative tasks, for security reasons you should also enable Admin Approval Mode. For further information, see [UAC-Admin-Approval-Mode-for-the-Built-in-Administrator-account](https://docs.microsoft.com/en-us/windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account)
|
- It is recommended not to enable the built-in Administrator account on the client computer, but to use the standard user account and User Account Control (UAC) instead. If you want to enable the built-in Administrator account to carry out administrative tasks, for security reasons you should also enable Admin Approval Mode. For further information, see [UAC-Admin-Approval-Mode-for-the-Built-in-Administrator-account](https://docs.microsoft.com/en-us/windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account)
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> After enabling Admin Approval Mode, to activate the setting, you must first log in and out. Alternatively, You may perform **gpupdate /force** from an elevated command prompt.
|
|
||||||
|
|
||||||
### Location
|
### Location
|
||||||
|
|
||||||
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
|
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
|
||||||
|
Reference in New Issue
Block a user