User Account Control (UAC)

User Account Control (UAC) is a feature that enables a consent prompt for elevated activities.
Applications have different integrity levels, and a program with a high level can perform tasks that could potentially compromise the system.
This is why a CMD/Powershell "runned as Administrator" gives less restrictions, even if we're already logged in as an Administrator.
This page details the UAC process in details => https://learn.microsoft.com/en-us/windows/security/application-security/application-control/user-account-control/how-it-works

"When an administrator logs on, two separate access tokens are created for the user: a standard user access token and an administrator access token. The Administrator can sign in, browse the Web, and read e-mail while using a standard user access token. When the administrator needs to perform a task that requires the administrator access token, Windows automatically prompts the user for approval. This prompt is called an elevation prompt, and its behavior can be configured via policy or registry."
UAC can be configured by Administrators with Local Security Policies or GPO in AD:
FilterAdministratorToken
Disabled
EnableUIADesktopToggle
Disabled
ConsentPromptBehaviorAdmin
Prompt for consent for non-Windows binaries
ConsentPromptBehaviorUser
Prompt for credentials on the secure desktop
EnableInstallerDetection
Enabled (default for home) Disabled (default for enterprise)
ValidateAdminCodeSignatures
Disabled
EnableSecureUIAPaths
Enabled
PromptOnSecureDesktop
Enabled
EnableVirtualization
Enabled
Last updated