"Alan" <firstname.lastname@example.org> wrote:
> Local Security Policy: Does anyone know what the first option, "Accounts:
> Administrator account status" does? Seems to have no effect on
> standalone/workgroup connected computer. Is it strictly a domain related
> Also I noticed if you disable UAC approval/prompting in the User Account
> Control: policies, you can get rid of all those approval/elevation prompts,
> let standard users install apps and such. But you also might be prevented
> from installing an app, even from an admin account, due to lack or
If you've changed the two "Behavior of the elevation prompt..."
policies in Local Security Policy, what you've done is change the
behavior of what UAC will do once a condition that requires elevation
is detected. (Which is not the same as "disable UAC" or "don't bother
If you've changed more than just the two "Behavior..." policies (e.g.
if you also turned off "Detect application installations and prompt
for elevation"), then you're in a state where UAC is still enabled,
but is not trying to elevate application installs that require
What exactly you've changed, and whether the particular application
install you've cited works correctly even with Vista and UAC in their
default enabled / prompting states, would impact whether what you're
currently seeing could be deemed "expected".