Frustrating Privileges

MS Windows Local Security Settings

MS Windows Local Security Settings

Options:

Copy the selected HTML code below,
and paste it into your own web page:

Getting confused and frustrated with the Windows Vista Privileges? I discovered that (I think) you need to reboot after you change your security policy. You set your security policy in Administrative Tools:Local Security Policy, and my administrative-mode settings are like this:
Accounts: Administrator account status	Enabled
Accounts: Guest account status	Enabled
Accounts: Limit local account use of blank passwords to console logon only	Enabled
Accounts: Rename administrator account	Administrator
Accounts: Rename guest account	Guest
System objects: Require case insensitivity for non-Windows subsystems	Enabled
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)	Enabled
System settings: Optional subsystems	Posix
System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies	Disabled
User Account Control: Admin Approval Mode for the Built-in Administrator account	Not Defined
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode	Prompt for consent
User Account Control: Behavior of the elevation prompt for standard users	Prompt for credentials
User Account Control: Detect application installations and prompt for elevation	Enabled
User Account Control: Only elevate executables that are signed and validated	Disabled
User Account Control: Run all administrators in Admin Approval Mode	Enabled
User Account Control: Switch to the secure desktop when prompting for elevation	Enabled
If you disable prompting for elevation, you will not get prompted, but yo will not get elevated privileges either!


Comments

It's quiet in here...Add your comment