SlideShare uma empresa Scribd logo
1 de 7
User Account Control
By W.Solomon
Why its Important
 UAC will
prompt for
confirmation
 Limits the risk
of Malware
Example of
UAC
Task that trigger an UAC
 Running a task as
administrator
 Installing active x
controls
 Changing an users
account type
Features
Secure
Desktop
mode
Credential
prompt
Elevation
prompt
Secure Desktop Mode
Different Elevations
Bibliography
 Microsoft.com
 Cyber net news http://cybernetnews.com/vista-uac-secure-desktop-explained/
 http://www.microsoft.com/windows/windows-vista/features/user-account-control.aspx
 Wikipedia
 # "The Windows Vista and Windows Server 2008 Developer Story: Windows Vista
Application Development Requirements for User Account Control (UAC)". The Windows
Vista and Windows Server 2008 Developer Story Series. Microsoft. April 2007.
http://msdn2.microsoft.com/en-us/library/aa905330.aspx. Retrieved 2007-10-08.
 # ^ "Understanding and Working in Protected Mode Internet Explorer". Microsoft. January
2006. http://msdn2.microsoft.com/en-us/library/bb250462.aspx. Retrieved 2007-12-08.
 # ^ a b c Kerr, Kenny (September 29, 2006). "Windows Vista for Developers – Part 4 –
User Account Control". http://weblogs.asp.net/kennykerr/archive/2006/09/
 # ^ "User Account Control Overview". TechNet. Microsoft. http://technet.microsoft.com/en-
us/windowsvista/aa906021.aspx.
 # ^ "User Account Control Prompts on the Secure Desktop". UAC Blog. MSDN Blogs.
2006-05-03. http://blogs.msdn.com/uac/archive/2006/05/03/589561.aspx. Retrieved 2007-
02-25.

Mais conteúdo relacionado

Mais procurados

OWASP Serbia - A6 security misconfiguration
OWASP Serbia - A6 security misconfigurationOWASP Serbia - A6 security misconfiguration
OWASP Serbia - A6 security misconfiguration
Nikola Milosevic
 

Mais procurados (20)

Linux systems - Linux Commands and Shell Scripting
Linux systems - Linux Commands and Shell ScriptingLinux systems - Linux Commands and Shell Scripting
Linux systems - Linux Commands and Shell Scripting
 
Shell scripting
Shell scriptingShell scripting
Shell scripting
 
Introduction to Linux
Introduction to Linux Introduction to Linux
Introduction to Linux
 
Ansible, best practices
Ansible, best practicesAnsible, best practices
Ansible, best practices
 
NFS(Network File System)
NFS(Network File System)NFS(Network File System)
NFS(Network File System)
 
LINE's Private Cloud - Meet Cloud Native World
LINE's Private Cloud - Meet Cloud Native WorldLINE's Private Cloud - Meet Cloud Native World
LINE's Private Cloud - Meet Cloud Native World
 
Linux file system
Linux file systemLinux file system
Linux file system
 
Security Vulnerabilities
Security VulnerabilitiesSecurity Vulnerabilities
Security Vulnerabilities
 
An Introduction to Windows PowerShell
An Introduction to Windows PowerShellAn Introduction to Windows PowerShell
An Introduction to Windows PowerShell
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Basic 50 linus command
Basic 50 linus commandBasic 50 linus command
Basic 50 linus command
 
Users and groups in Linux
Users and groups in LinuxUsers and groups in Linux
Users and groups in Linux
 
Ansible
AnsibleAnsible
Ansible
 
OWASP Serbia - A6 security misconfiguration
OWASP Serbia - A6 security misconfigurationOWASP Serbia - A6 security misconfiguration
OWASP Serbia - A6 security misconfiguration
 
User Administration in Linux
User Administration in LinuxUser Administration in Linux
User Administration in Linux
 
Users and groups
Users and groupsUsers and groups
Users and groups
 
Asp.net control
Asp.net controlAsp.net control
Asp.net control
 
Best practices for ansible
Best practices for ansibleBest practices for ansible
Best practices for ansible
 
Powershell training material
Powershell training materialPowershell training material
Powershell training material
 
Shell Scripting in Linux
Shell Scripting in LinuxShell Scripting in Linux
Shell Scripting in Linux
 

Destaque

Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone ppt
Laxman Puri
 
Windows 8 vs windows 7 ppt
Windows 8 vs windows 7 pptWindows 8 vs windows 7 ppt
Windows 8 vs windows 7 ppt
Diya Mirza
 
Remote access service
Remote access serviceRemote access service
Remote access service
Apoorw Pandey
 

Destaque (17)

Windows 10 – 8 Tips & Tricks
Windows 10 – 8 Tips & TricksWindows 10 – 8 Tips & Tricks
Windows 10 – 8 Tips & Tricks
 
Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10Eight Hot New Features of Windows 10
Eight Hot New Features of Windows 10
 
Remote management, LDP SoftServe
Remote management, LDP SoftServeRemote management, LDP SoftServe
Remote management, LDP SoftServe
 
Difference between windows 7 and windows 8 and windows 8 features
 Difference between windows 7 and windows 8 and windows 8 features Difference between windows 7 and windows 8 and windows 8 features
Difference between windows 7 and windows 8 and windows 8 features
 
windows7 vs windows8 ppt
windows7 vs windows8 ppt windows7 vs windows8 ppt
windows7 vs windows8 ppt
 
Remote access connection
Remote access connection Remote access connection
Remote access connection
 
Remote Access
Remote AccessRemote Access
Remote Access
 
Remote Login
Remote LoginRemote Login
Remote Login
 
Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone ppt
 
Windows 10: The Top Features!
Windows 10: The Top Features!Windows 10: The Top Features!
Windows 10: The Top Features!
 
Windows 8 vs windows 7 ppt
Windows 8 vs windows 7 pptWindows 8 vs windows 7 ppt
Windows 8 vs windows 7 ppt
 
Windows 7 Security
Windows 7 SecurityWindows 7 Security
Windows 7 Security
 
Window 10 ppt
Window 10 pptWindow 10 ppt
Window 10 ppt
 
Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8
 
Remote access service
Remote access serviceRemote access service
Remote access service
 
Evolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsEvolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systems
 
What's New in Windows 10
What's New in Windows 10What's New in Windows 10
What's New in Windows 10
 

Semelhante a User Account Control Prensentation2

Integrating Security Roles into Microsoft Silverlight Applications
Integrating Security Roles into Microsoft Silverlight ApplicationsIntegrating Security Roles into Microsoft Silverlight Applications
Integrating Security Roles into Microsoft Silverlight Applications
Dan Wahlin
 
02 asp.net session02
02 asp.net session0202 asp.net session02
02 asp.net session02
Mani Chaubey
 
08 asp.net session11
08 asp.net session1108 asp.net session11
08 asp.net session11
Niit Care
 
ASP.Net Presentation Part3
ASP.Net Presentation Part3ASP.Net Presentation Part3
ASP.Net Presentation Part3
Neeraj Mathur
 

Semelhante a User Account Control Prensentation2 (20)

Openstack Icehouse IaaS Presentation
Openstack Icehouse  IaaS PresentationOpenstack Icehouse  IaaS Presentation
Openstack Icehouse IaaS Presentation
 
Integrating Security Roles into Microsoft Silverlight Applications
Integrating Security Roles into Microsoft Silverlight ApplicationsIntegrating Security Roles into Microsoft Silverlight Applications
Integrating Security Roles into Microsoft Silverlight Applications
 
02 asp.net session02
02 asp.net session0202 asp.net session02
02 asp.net session02
 
The complete ASP.NET (IIS) Tutorial with code example in power point slide show
The complete ASP.NET (IIS) Tutorial with code example in power point slide showThe complete ASP.NET (IIS) Tutorial with code example in power point slide show
The complete ASP.NET (IIS) Tutorial with code example in power point slide show
 
Wcl310 Raiders of the Elevated Token
Wcl310 Raiders of the Elevated TokenWcl310 Raiders of the Elevated Token
Wcl310 Raiders of the Elevated Token
 
08 asp.net session11
08 asp.net session1108 asp.net session11
08 asp.net session11
 
Parallelminds.asp.net with sp
Parallelminds.asp.net with spParallelminds.asp.net with sp
Parallelminds.asp.net with sp
 
Embedding custom ActiveX controls into SAP GUI
Embedding custom ActiveX controls into SAP GUIEmbedding custom ActiveX controls into SAP GUI
Embedding custom ActiveX controls into SAP GUI
 
ASP.Net Presentation Part3
ASP.Net Presentation Part3ASP.Net Presentation Part3
ASP.Net Presentation Part3
 
Security Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren ShahSecurity Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren Shah
 
SynapseIndia dotnet website security development
SynapseIndia  dotnet website security developmentSynapseIndia  dotnet website security development
SynapseIndia dotnet website security development
 
WinAppDriver - Windows Store Apps Test Automation
WinAppDriver - Windows Store Apps Test AutomationWinAppDriver - Windows Store Apps Test Automation
WinAppDriver - Windows Store Apps Test Automation
 
Critical Analysis of SW Development tool/methodology
Critical Analysis of SW Development tool/methodologyCritical Analysis of SW Development tool/methodology
Critical Analysis of SW Development tool/methodology
 
10215 A 08
10215 A 0810215 A 08
10215 A 08
 
ASP.NET Lecture 5
ASP.NET Lecture 5ASP.NET Lecture 5
ASP.NET Lecture 5
 
ASP.NET OVERVIEW
ASP.NET OVERVIEWASP.NET OVERVIEW
ASP.NET OVERVIEW
 
Windows 7 Application Compatibility
Windows 7 Application CompatibilityWindows 7 Application Compatibility
Windows 7 Application Compatibility
 
ASP.NET Lecture 2
ASP.NET Lecture 2ASP.NET Lecture 2
ASP.NET Lecture 2
 
Microsoft az-303 Dumps
Microsoft az-303 DumpsMicrosoft az-303 Dumps
Microsoft az-303 Dumps
 
Behind the Code 'September 2022 // by Exness
Behind the Code 'September 2022 // by ExnessBehind the Code 'September 2022 // by Exness
Behind the Code 'September 2022 // by Exness
 

User Account Control Prensentation2

  • 2. Why its Important  UAC will prompt for confirmation  Limits the risk of Malware Example of UAC
  • 3. Task that trigger an UAC  Running a task as administrator  Installing active x controls  Changing an users account type
  • 7. Bibliography  Microsoft.com  Cyber net news http://cybernetnews.com/vista-uac-secure-desktop-explained/  http://www.microsoft.com/windows/windows-vista/features/user-account-control.aspx  Wikipedia  # "The Windows Vista and Windows Server 2008 Developer Story: Windows Vista Application Development Requirements for User Account Control (UAC)". The Windows Vista and Windows Server 2008 Developer Story Series. Microsoft. April 2007. http://msdn2.microsoft.com/en-us/library/aa905330.aspx. Retrieved 2007-10-08.  # ^ "Understanding and Working in Protected Mode Internet Explorer". Microsoft. January 2006. http://msdn2.microsoft.com/en-us/library/bb250462.aspx. Retrieved 2007-12-08.  # ^ a b c Kerr, Kenny (September 29, 2006). "Windows Vista for Developers – Part 4 – User Account Control". http://weblogs.asp.net/kennykerr/archive/2006/09/  # ^ "User Account Control Overview". TechNet. Microsoft. http://technet.microsoft.com/en- us/windowsvista/aa906021.aspx.  # ^ "User Account Control Prompts on the Secure Desktop". UAC Blog. MSDN Blogs. 2006-05-03. http://blogs.msdn.com/uac/archive/2006/05/03/589561.aspx. Retrieved 2007- 02-25.