SlideShare ist ein Scribd-Unternehmen logo
1 von 7
User Account Control
By W.Solomon
Why its Important
 UAC will
prompt for
confirmation
 Limits the risk
of Malware
Example of
UAC
Task that trigger an UAC
 Running a task as
administrator
 Installing active x
controls
 Changing an users
account type
Features
Secure
Desktop
mode
Credential
prompt
Elevation
prompt
Secure Desktop Mode
Different Elevations
Bibliography
 Microsoft.com
 Cyber net news http://cybernetnews.com/vista-uac-secure-desktop-explained/
 http://www.microsoft.com/windows/windows-vista/features/user-account-control.aspx
 Wikipedia
 # "The Windows Vista and Windows Server 2008 Developer Story: Windows Vista
Application Development Requirements for User Account Control (UAC)". The Windows
Vista and Windows Server 2008 Developer Story Series. Microsoft. April 2007.
http://msdn2.microsoft.com/en-us/library/aa905330.aspx. Retrieved 2007-10-08.
 # ^ "Understanding and Working in Protected Mode Internet Explorer". Microsoft. January
2006. http://msdn2.microsoft.com/en-us/library/bb250462.aspx. Retrieved 2007-12-08.
 # ^ a b c Kerr, Kenny (September 29, 2006). "Windows Vista for Developers – Part 4 –
User Account Control". http://weblogs.asp.net/kennykerr/archive/2006/09/
 # ^ "User Account Control Overview". TechNet. Microsoft. http://technet.microsoft.com/en-
us/windowsvista/aa906021.aspx.
 # ^ "User Account Control Prompts on the Secure Desktop". UAC Blog. MSDN Blogs.
2006-05-03. http://blogs.msdn.com/uac/archive/2006/05/03/589561.aspx. Retrieved 2007-
02-25.

Weitere ähnliche Inhalte

Was ist angesagt?

Linux standard file system
Linux standard file systemLinux standard file system
Linux standard file systemTaaanu01
 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administratorAisha Talat
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Linux installation and booting process
Linux installation and booting processLinux installation and booting process
Linux installation and booting processSiddharth Jain
 
Active directory
Active directory Active directory
Active directory deshvikas
 
Linux Administration
Linux AdministrationLinux Administration
Linux AdministrationHarish1983
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in LinuxHenry Osborne
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Tuan Yang
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and FilteringAisha Talat
 
NFS(Network File System)
NFS(Network File System)NFS(Network File System)
NFS(Network File System)udamale
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administrationKhang-Ling Loh
 

Was ist angesagt? (20)

Windows registry forensics
Windows registry forensicsWindows registry forensics
Windows registry forensics
 
Linux file system
Linux file systemLinux file system
Linux file system
 
Linux standard file system
Linux standard file systemLinux standard file system
Linux standard file system
 
Linux security
Linux securityLinux security
Linux security
 
LDAP
LDAPLDAP
LDAP
 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administrator
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Linux installation and booting process
Linux installation and booting processLinux installation and booting process
Linux installation and booting process
 
Active directory
Active directory Active directory
Active directory
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
 
User management
User managementUser management
User management
 
Software Security
Software SecuritySoftware Security
Software Security
 
Distributed file systems dfs
Distributed file systems   dfsDistributed file systems   dfs
Distributed file systems dfs
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and Filtering
 
File system
File systemFile system
File system
 
Dns ppt
Dns pptDns ppt
Dns ppt
 
NFS(Network File System)
NFS(Network File System)NFS(Network File System)
NFS(Network File System)
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 

Andere mochten auch

Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10Individual Software
 
Remote management, LDP SoftServe
Remote management, LDP SoftServeRemote management, LDP SoftServe
Remote management, LDP SoftServePetro Porchuk
 
Difference between windows 7 and windows 8 and windows 8 features
 Difference between windows 7 and windows 8 and windows 8 features Difference between windows 7 and windows 8 and windows 8 features
Difference between windows 7 and windows 8 and windows 8 featuresRizwan Ansari
 
windows7 vs windows8 ppt
windows7 vs windows8 ppt windows7 vs windows8 ppt
windows7 vs windows8 ppt KUMAR V S
 
Remote access connection
Remote access connection Remote access connection
Remote access connection Ah Fawad Saiq
 
Remote Access
Remote AccessRemote Access
Remote Accesszaisahil
 
Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone pptLaxman Puri
 
Windows 10: The Top Features!
Windows 10: The Top Features!Windows 10: The Top Features!
Windows 10: The Top Features!Total Toolbar
 
Windows 8 vs windows 7 ppt
Windows 8 vs windows 7 pptWindows 8 vs windows 7 ppt
Windows 8 vs windows 7 pptDiya Mirza
 
Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Vibhanshu Chaturvedi
 
Remote access service
Remote access serviceRemote access service
Remote access serviceApoorw Pandey
 
Evolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsEvolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsSai praveen Seva
 

Andere mochten auch (17)

Windows 10 – 8 Tips & Tricks
Windows 10 – 8 Tips & TricksWindows 10 – 8 Tips & Tricks
Windows 10 – 8 Tips & Tricks
 
Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10
 
Remote management, LDP SoftServe
Remote management, LDP SoftServeRemote management, LDP SoftServe
Remote management, LDP SoftServe
 
Difference between windows 7 and windows 8 and windows 8 features
 Difference between windows 7 and windows 8 and windows 8 features Difference between windows 7 and windows 8 and windows 8 features
Difference between windows 7 and windows 8 and windows 8 features
 
windows7 vs windows8 ppt
windows7 vs windows8 ppt windows7 vs windows8 ppt
windows7 vs windows8 ppt
 
Remote access connection
Remote access connection Remote access connection
Remote access connection
 
Remote Access
Remote AccessRemote Access
Remote Access
 
Remote Login
Remote LoginRemote Login
Remote Login
 
Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone ppt
 
Windows 10: The Top Features!
Windows 10: The Top Features!Windows 10: The Top Features!
Windows 10: The Top Features!
 
Windows 8 vs windows 7 ppt
Windows 8 vs windows 7 pptWindows 8 vs windows 7 ppt
Windows 8 vs windows 7 ppt
 
Windows 7 Security
Windows 7 SecurityWindows 7 Security
Windows 7 Security
 
Window 10 ppt
Window 10 pptWindow 10 ppt
Window 10 ppt
 
Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8
 
Remote access service
Remote access serviceRemote access service
Remote access service
 
Evolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsEvolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systems
 
What's New in Windows 10
What's New in Windows 10What's New in Windows 10
What's New in Windows 10
 

Ähnlich wie User Account Control Prensentation2

Openstack Icehouse IaaS Presentation
Openstack Icehouse  IaaS PresentationOpenstack Icehouse  IaaS Presentation
Openstack Icehouse IaaS Presentationemad ahmed
 
Integrating Security Roles into Microsoft Silverlight Applications
Integrating Security Roles into Microsoft Silverlight ApplicationsIntegrating Security Roles into Microsoft Silverlight Applications
Integrating Security Roles into Microsoft Silverlight ApplicationsDan Wahlin
 
02 asp.net session02
02 asp.net session0202 asp.net session02
02 asp.net session02Mani Chaubey
 
The complete ASP.NET (IIS) Tutorial with code example in power point slide show
The complete ASP.NET (IIS) Tutorial with code example in power point slide showThe complete ASP.NET (IIS) Tutorial with code example in power point slide show
The complete ASP.NET (IIS) Tutorial with code example in power point slide showSubhas Malik
 
Wcl310 Raiders of the Elevated Token
Wcl310 Raiders of the Elevated TokenWcl310 Raiders of the Elevated Token
Wcl310 Raiders of the Elevated TokenRaymond Comvalius
 
08 asp.net session11
08 asp.net session1108 asp.net session11
08 asp.net session11Niit Care
 
Parallelminds.asp.net with sp
Parallelminds.asp.net with spParallelminds.asp.net with sp
Parallelminds.asp.net with spparallelminder
 
Embedding custom ActiveX controls into SAP GUI
Embedding custom ActiveX controls into SAP GUIEmbedding custom ActiveX controls into SAP GUI
Embedding custom ActiveX controls into SAP GUIDr. Kerem Koseoglu
 
ASP.Net Presentation Part3
ASP.Net Presentation Part3ASP.Net Presentation Part3
ASP.Net Presentation Part3Neeraj Mathur
 
Security Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren ShahSecurity Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren ShahNSConclave
 
SynapseIndia dotnet website security development
SynapseIndia  dotnet website security developmentSynapseIndia  dotnet website security development
SynapseIndia dotnet website security developmentSynapseindiappsdevelopment
 
WinAppDriver - Windows Store Apps Test Automation
WinAppDriver - Windows Store Apps Test AutomationWinAppDriver - Windows Store Apps Test Automation
WinAppDriver - Windows Store Apps Test AutomationJeremy Kao
 
Critical Analysis of SW Development tool/methodology
Critical Analysis of SW Development tool/methodologyCritical Analysis of SW Development tool/methodology
Critical Analysis of SW Development tool/methodologyDavid O' Connor
 
Windows 7 Application Compatibility
Windows 7 Application CompatibilityWindows 7 Application Compatibility
Windows 7 Application Compatibilitymicham
 
Microsoft az-303 Dumps
Microsoft az-303 DumpsMicrosoft az-303 Dumps
Microsoft az-303 DumpsArmstrongsmith
 
Behind the Code 'September 2022 // by Exness
Behind the Code 'September 2022 // by ExnessBehind the Code 'September 2022 // by Exness
Behind the Code 'September 2022 // by ExnessMaxim Gaponov
 

Ähnlich wie User Account Control Prensentation2 (20)

Openstack Icehouse IaaS Presentation
Openstack Icehouse  IaaS PresentationOpenstack Icehouse  IaaS Presentation
Openstack Icehouse IaaS Presentation
 
Integrating Security Roles into Microsoft Silverlight Applications
Integrating Security Roles into Microsoft Silverlight ApplicationsIntegrating Security Roles into Microsoft Silverlight Applications
Integrating Security Roles into Microsoft Silverlight Applications
 
02 asp.net session02
02 asp.net session0202 asp.net session02
02 asp.net session02
 
The complete ASP.NET (IIS) Tutorial with code example in power point slide show
The complete ASP.NET (IIS) Tutorial with code example in power point slide showThe complete ASP.NET (IIS) Tutorial with code example in power point slide show
The complete ASP.NET (IIS) Tutorial with code example in power point slide show
 
Wcl310 Raiders of the Elevated Token
Wcl310 Raiders of the Elevated TokenWcl310 Raiders of the Elevated Token
Wcl310 Raiders of the Elevated Token
 
08 asp.net session11
08 asp.net session1108 asp.net session11
08 asp.net session11
 
Parallelminds.asp.net with sp
Parallelminds.asp.net with spParallelminds.asp.net with sp
Parallelminds.asp.net with sp
 
Embedding custom ActiveX controls into SAP GUI
Embedding custom ActiveX controls into SAP GUIEmbedding custom ActiveX controls into SAP GUI
Embedding custom ActiveX controls into SAP GUI
 
ASP.Net Presentation Part3
ASP.Net Presentation Part3ASP.Net Presentation Part3
ASP.Net Presentation Part3
 
Security Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren ShahSecurity Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren Shah
 
SynapseIndia dotnet website security development
SynapseIndia  dotnet website security developmentSynapseIndia  dotnet website security development
SynapseIndia dotnet website security development
 
WinAppDriver - Windows Store Apps Test Automation
WinAppDriver - Windows Store Apps Test AutomationWinAppDriver - Windows Store Apps Test Automation
WinAppDriver - Windows Store Apps Test Automation
 
Critical Analysis of SW Development tool/methodology
Critical Analysis of SW Development tool/methodologyCritical Analysis of SW Development tool/methodology
Critical Analysis of SW Development tool/methodology
 
10215 A 08
10215 A 0810215 A 08
10215 A 08
 
ASP.NET Lecture 5
ASP.NET Lecture 5ASP.NET Lecture 5
ASP.NET Lecture 5
 
ASP.NET OVERVIEW
ASP.NET OVERVIEWASP.NET OVERVIEW
ASP.NET OVERVIEW
 
Windows 7 Application Compatibility
Windows 7 Application CompatibilityWindows 7 Application Compatibility
Windows 7 Application Compatibility
 
ASP.NET Lecture 2
ASP.NET Lecture 2ASP.NET Lecture 2
ASP.NET Lecture 2
 
Microsoft az-303 Dumps
Microsoft az-303 DumpsMicrosoft az-303 Dumps
Microsoft az-303 Dumps
 
Behind the Code 'September 2022 // by Exness
Behind the Code 'September 2022 // by ExnessBehind the Code 'September 2022 // by Exness
Behind the Code 'September 2022 // by Exness
 

User Account Control Prensentation2

  • 2. Why its Important  UAC will prompt for confirmation  Limits the risk of Malware Example of UAC
  • 3. Task that trigger an UAC  Running a task as administrator  Installing active x controls  Changing an users account type
  • 7. Bibliography  Microsoft.com  Cyber net news http://cybernetnews.com/vista-uac-secure-desktop-explained/  http://www.microsoft.com/windows/windows-vista/features/user-account-control.aspx  Wikipedia  # "The Windows Vista and Windows Server 2008 Developer Story: Windows Vista Application Development Requirements for User Account Control (UAC)". The Windows Vista and Windows Server 2008 Developer Story Series. Microsoft. April 2007. http://msdn2.microsoft.com/en-us/library/aa905330.aspx. Retrieved 2007-10-08.  # ^ "Understanding and Working in Protected Mode Internet Explorer". Microsoft. January 2006. http://msdn2.microsoft.com/en-us/library/bb250462.aspx. Retrieved 2007-12-08.  # ^ a b c Kerr, Kenny (September 29, 2006). "Windows Vista for Developers – Part 4 – User Account Control". http://weblogs.asp.net/kennykerr/archive/2006/09/  # ^ "User Account Control Overview". TechNet. Microsoft. http://technet.microsoft.com/en- us/windowsvista/aa906021.aspx.  # ^ "User Account Control Prompts on the Secure Desktop". UAC Blog. MSDN Blogs. 2006-05-03. http://blogs.msdn.com/uac/archive/2006/05/03/589561.aspx. Retrieved 2007- 02-25.