What is UAC? Details of UAC in Win7 system

  

In the process of using Win7 system, perhaps everyone has been exposed to UAC, but most of the general Win7 users are not familiar with UAC, do not know what UAC is, do not know what UAC has Function, so in order to let everyone better understand UAC, Xiaobian will give a detailed introduction to UAC in Win7 system.

UAC (User Account Control) is a new technology introduced by Microsoft in Windows Vista to improve system security. It requires users to perform other operations that may affect the operation of the computer or perform changes. Before setting the operation, provide permission or admin & zwnj; password. By verifying these operations before they are launched, UAC can help prevent malware and spyware from installing or making changes to the computer without permission.

But it doesn't mean that not turning off UAC will definitely cause the software to be unusable, because it will usually be prompted during the installation process, so the program has been installed, but if you do not close UAC, Some functions related to other functions of the system do not work properly. For example, if you install the player, you must associate the media file format. Make sure that the movie file is automatically played by double-clicking the movie file, but if you open UAC, it may be associated. Failure requires manual operation.

UAC security authentication mechanism


different security levels What is the difference:

Win7 security protection have to say UAC, As we all know, UAC is the abbreviation of User Account Control. Its Chinese translation is user account control. It is a new technology that Microsoft refers to in Windows Vista and Win7. The main function is to automatically trigger UAC when performing some operations that affect system security. After confirming, you can execute

Most of the malware, Trojans, and ad plugins will be like when you enter the computer: copy files to Windows or Program Files, install drivers, install ActiveX, etc. UAC will be triggered. In the face of these insecure factors, how can users solve the problems caused by UAC? This article details the detailed functions of the UAC touch and can disable these programs when prompted by UAC.

The ability to trigger UAC operations includes: modifying Windows Update configuration; adding or removing user accounts; changing user account types; changing UAC settings; installing ActiveX; installing or uninstalling programs; installing device drivers; modifying and setting Parental control; add or modify the registry; move or copy files to Program Files or Windows directory; access to other user directories UAC is annoying, Microsoft has joined UAC since Windows Vista, which has become dissatisfied with VISTA One of the diseases, because Vista does not set the level of UAC like Win7 (in fact, UAC of Windows7 is also very annoying), the general configuration of the computer at that time is also very low, so people will pop up when this does not move, and will also lock the screen. The guy is very disgusted.

UAC is perfect in Win7 because UAC is too annoying, so Microsoft has added UAC's level setting function in Win7, which corresponds to 4 levels:

Default level (2 level) ):

At the default level, the user is only prompted when the application tries to change the computer settings, and the user does not prompt for changes to the Windows settings. At the same time, the secure desktop will be enabled in this mode to prevent system settings from being bypassed by UAC. It can be seen that the default level can not interfere with the normal operation of the user, and can effectively prevent the malicious program from modifying the system settings without the user's knowledge. This level setting can be used by normal users.

Levels slightly lower than the default level (Level 1):

A slightly different from the default level is that the level will not enable Secure Desktop, which means that it is possible to bypass UAC changes. The situation of the system settings. However, in general, if you want to start some programs and you need to modify the system, you can run it directly without any security problems. However, if the user does not run any program but pops up a prompt window, it is possible that the malicious program is trying to modify the system settings, and the selection should be decisive. This level is for users with a certain system experience.

Lowest Level (Level 0):

The lowest level is to turn off UAC (it must be restarted to take effect). At this level, if you are logged in as an administrator, all operations will run directly without any notification, including changes to the system by the virus or Trojan. At this level, viruses or Trojans can connect to other computers on the network or even communicate with computers on the Internet. It can be seen that if UAC is completely turned off and logged in as an administrator, system security will be seriously degraded. In addition, if you log in as a standard user, installing, upgrading, or modifying and setting up the system will be rejected directly without popping up any prompts, and the user can only do so with administrator privileges. It can be seen that UAC is completely turned off and logged in as a standard user. Various operations and settings are also very inconvenient, so it is recommended not to select this level.

Highest level (level 3):

Under the advanced level, “always notify ” (ie fully open), under which users install applications and upgrade software If the application changes the operating system under any circumstances, changes the Windows settings, etc., a prompt window will pop up (and the secure desktop is enabled) to request user confirmation. This shows that this level is the safest level, but it is also the most “trouble” level. It is suitable for multiple users sharing a single computer, restricting other standard users, and prohibiting them from changing system settings at will.

But UAC is very useful for UAC. Although people who install software often are annoying, the role of UAC is not to be underestimated. I have to admit that Microsoft's concept of operating system is very advanced, so I often come up with some great but embarrassing things, just like VISTA, when people started accepting Win7 today, then go back to see Vista. I am more and more aware that VISTA is actually a very good operating system, but it is just a bad time.

Through the above detailed introduction of UAC in Win7 system, I believe that everyone should have a more comprehensive understanding of what UAC is and the role of UAC.

Copyright © Windows knowledge All Rights Reserved