How to Configure UAC
You can use Group Policy settings to configure UAC behavior on targeted computers. Additionally,
you can disable UAC by using Control Panel or Msconfig.exe or by editing registry
settings directly.
The sections that follow describe each of these techniques in more detail.
Incoming sections:
Group Policy Settings
Control Panel
Msconfig.exe
How to Configure Auditing for Privilege Elevation
Other UAC Event Logs
Best Practices for Using UAC
AppLocker
AppLocker Rule Types
Auditing AppLocker Rules
DLL Rules
Custom Error Messages
Using AppLocker with Windows PowerShell
Using Windows 7 Defender
Understanding Windows Defender
Automatic Scanning
Real-Time Protection
Windows Defender Alert Levels
Understanding Microsoft SpyNet and more
In this tutorial:
- Windows 7 Client Protection
- Understanding the Risk of Malware
- User Account Control in Windows 7
- UAC for Standard Users
- UAC for Administrators
- UAC User Interface
- Secure Desktop
- How Windows Determines Whether an Application Needs Administrative Privileges
- How to Control UAC Using Application Properties
- How UAC Examines the Application Manifest
- UAC Heuristics
- UAC Virtualization
- UAC and Startup Programs
- Compatibility Problems with UAC
- How to Configure UAC
- Group Policy Settings
- Control Panel
- Msconfig.exe
- How to Configure Auditing for Privilege Elevation
- Other UAC Event Logs
- Best Practices for Using UAC
- AppLocker
- AppLocker Rule Types
- Auditing AppLocker Rules
- DLL Rules
- Custom Error Messages
- Using AppLocker with Windows PowerShell
- Using Windows 7 Defender
- Understanding Windows Defender
- Automatic Scanning
- Real-Time Protection
- Windows Defender Alert Levels
- Understanding Microsoft SpyNet
- Configuring Windows Defender Group Policy
- Configuring Windows Defender on a Single Computer
- How to Determine Whether a Computer Is Infected with Spyware
- Best Practices for Using Windows Defender
- How to Troubleshoot Problems with Unwanted Software
- Network Access Protection
- Forefront