diff --git a/windows/security/book/application-security-application-and-driver-control.md b/windows/security/book/application-security-application-and-driver-control.md index 3592a7649b..3183073d92 100644 --- a/windows/security/book/application-security-application-and-driver-control.md +++ b/windows/security/book/application-security-application-and-driver-control.md @@ -55,8 +55,6 @@ Users with standard accounts, or those using administrative accounts with UAC en Some apps require more permissions and won't work properly (or at all) when running with limited permissions. When an app needs to run with more than standard user rights, UAC allows users to run apps with a *full* administrator token (with administrative groups and privileges) instead of their default user access token. Users continue to operate in the standard user security context while enabling certain executables to run with elevated privileges if needed. -:::image type="content" source="images/uac-settings.png" alt-text="Screenshot of the UAC settings." border="false"::: - :::image type="icon" source="images/learn-more.svg" border="false"::: **Learn more:** - [How User Account Control works](/windows/security/identity-protection/user-account-control/how-user-account-control-works) diff --git a/windows/security/book/images/uac-settings.png b/windows/security/book/images/uac-settings.png deleted file mode 100644 index d4a8fc4bb0..0000000000 Binary files a/windows/security/book/images/uac-settings.png and /dev/null differ