Microsoft: The Why of UAC (User Account Control)

User Account Control

We promised that this blog would provide a view of Engineering Windows 7 and that means that we would cover the full range of topics—from performance to user interface, technical and non-technical topics, and of course easy topics and controversial topics. This post is about User Account Control. Our author is Ben Fathi, vice president for core OS development. UAC is a feature that crosses many aspects of the Windows architecture—security, accounts, user interface, design, and so on—we had several other members of the team contribute to the post.
We continue to value the discussion that the posts seem to inspire—we are betting (not literally of course) that this post will bring out comments from even the most reserved of our readers. Let’s keep the comments constructive and on-topic for this one.
FWIW, the blogs.msdn.com server employs some throttles on comments that aim to reduce spam. We don’t control this and have all the “unmoderated” options checked. I can’t publish the spam protection rules since that sort of defeats the purpose (and I don’t know them). However, I apologize if your comment doesn’t make it through. --Steven
User Account Control (UAC) is, arguably, one of the most controversial features in Windows Vista. Why did Microsoft add all those popups to Windows? Does it actually improve security? Doesn’t everyone just click “continue”? Has anyone in Redmond heard the feedback on users and reviewers? Has anyone seen a tv commercial about this feature?
In the course of working on Windows 7 we have taken a hard look at UAC – examining customer feedback, volumes of data, the software ecosystem, and Windows itself. Let’s start by looking at why UAC came to be and our approach in Vista.

The Why of UAC

Technical details aside, UAC is really about informing you before any “system-level” change is made to your computer, thus enabling you to be in control of your system. An “unwanted change” can be malicious, such as a virus turning off the firewall or a rootkit stealthily taking over the machine. However an “unwanted change” can also be actions from people who have limited privileges, such as a child trying to bypass Parental Controls on the family computer or an employee installing prohibited software on a work computer. Windows NT has always supported multiple user account types – one of which is the “standard user,” which does not have the administrative privileges necessary to make changes like these. Enterprises can (and commonly do) supply most employees with a standard user account while providing a few IT pros administrative privileges. A standard user can’t make system level changes, even accidentally, by going to a malicious website or installing the wrong program. Controlling the changes most people can make to the computer reduces help desk calls and the overall Total Cost of Ownership (TCO) to the company. At home, a parent can create a standard user account for the children and use Parental Controls to protect them.
However, outside the enterprise and the Parental Controls case, most machines (75%) have a single account with full admin privileges. This is partly due to the first user account defaulting to administrator, since an administrator on the machine is required, and partly due to the fact that people want and expect to be in control of their computer. Since most users have an Administrator account, this has historically created an environment where most applications, as well as some Windows components, always assumed they could make system-level changes to the system. Software written this way would not work for standard users, such as the enterprise user and parental control cases mentioned above. Additionally, giving every application full access to the computer left the door open for damaging changes to the system, either intentionally (by malware) or unintentionally (by poorly written software.)



Figure 1. Percentage of machines (server excluded) with one or more user accounts from January 2008 to June 2008.
User Account Control was implemented in Vista to address two key issues: one, incompatibility of software across user types and two, the lack of user knowledge of system-level changes. We expanded the account types by adding the Protected Admin (PA), which became the default type for the first account on the system. When a PA user logs into the system, she is given two security tokens – one identical to the Standard User token that is sufficient for most basic privileges and a second with full Administrator privileges. Standard users receive only the basic token, but can bring in an Administrator token from another account if needed.
When the system detects that the user wants to perform an operation which requires administrative privileges, the display is switched to “secure desktop” mode, and the user is presented with a prompt asking for approval. The reason the display is transitioned to “secure desktop” is to avoid malicious software attacks that attempt to get you to click yes to the UAC prompt by mimicking the UAC interface (spoofing the UI.) They are not able to do this when the desktop is in its “secure” state. Protected Admin users are thus informed of any system changes, and only need to click yes to approve the action. A standard user sees a similar dialog, but one that enables her to enter Administrative credentials (via password, smart card PIN, fingerprint, etc) from another account to bring in the Administrator privileges needed to complete the action. In the case of a home system utilizing Parental Controls, the parent would enter his or her login name and password to install the software, thus enabling the parent to be in control of software added to the system or changes made to the system. In the enterprise case, the IT administrator can control the prompts through group policy such that the standard user just gets a message informing her that she cannot change system state.

What we have learned so far

We are always trying to improve Windows, especially in the areas that affect our customers the most. This section will look at the data around the ecosystem, Windows, and end-users—recognizing that the data itself does not tell the story of annoyance or frustration that many reading this post might feel.
UAC has had a significant impact on the software ecosystem, Vista users, and Windows itself. As mentioned in previous posts, there are ways for our customers to voluntarily and anonymously send us data on how they use our features (Customer Experience Improvement Program, Windows Feedback Panel, user surveys, user in field testing, blog posts, and in house usability testing). The data and feedback we collect help inform and prioritize the decisions we make about our feature designs. From this data, we’ve learned a lot about UAC’s impact.

Impact on the software ecosystem

UAC has resulted in a radical reduction in the number of applications that unnecessarily require admin privileges, which is something we think improves the overall quality of software and reduces the risks inherent in software on a machine which requires full administrative access to the system.
In the first several months after Vista was available for use, people were experiencing a UAC prompt in 50% of their “sessions” - a session is everything that happens from logon to logoff or within 24 hours. Furthermore, there were 775,312 unique applications (note: this shows the volume of unique software that Windows supports!) producing prompts (note that installers and the application itself are not counted as the same program.) This seems large, and it is since much of the software ecosystem unnecessarily required admin privileges to run. As the ecosystem has updated their software, far fewer applications are requiring admin privileges. Customer Experience Improvement Program data from August 2008 indicates the number of applications and tasks generating a prompt has declined from 775,312 to 168,149.



Figure 2. Number of unique applications and tasks creating UAC prompts.
This reduction means more programs work well for Standard Users without prompting every time they run or accidentally changing an administrative or system setting. In addition, we also expect that as people use their machines longer they are installing new software or configuring Windows settings less frequently, which results in fewer prompts, or conversely when a machine is new that is when there is unusually high activity with respect to administrative needs. Customer Experience Improvement Program data indicates that the number of sessions with one or more UAC prompts has declined from 50% to 33% of sessions with Vista SP1.


Figure 3. Percentage of sessions with prompts over time.


Impact on Windows

An immediate result of UAC was the increase in engineering quality of Windows. There are now far fewer Windows components with full access to the system. Additionally, all the components that still need to access the full system must ask the user for permission to do so. We know from our data that Windows itself accounts for about 40% of all UAC prompts. This is even more dramatic when you look at the most frequent prompts: Windows components accounted for 17 of the top 50 UAC prompts in Vista and 29 of the top 50 in Vista SP1. Some targeted improvements in Vista SP1 reduced Windows prompts from frequently used components such as the copy engine, but clearly we have more we can (and will) do. The ecosystem also worked hard to reduce their prompts, thus the number of Windows components on the top 50 list increased. Windows has more of an opportunity to make deeper architectural changes in Windows 7, so you can expect fewer prompts from Windows components. Reducing prompts in the software ecosystem and in Windows is a win-win proposition. It enables people to feel confident they have a greater choice of software that does not make potentially destabilizing changes to the system, and it enables people to more readily identify critical prompts, thus providing a more confident sense of control.
One important area of feedback we’ve heard a lot about is the number of prompts encountered during a download from Internet Explorer. This is a specific example of a more common situation - where an application’s security dialogs overlap with User Account Control. Since XP Service Pack 2, IE has used a security dialog to warn users before running programs from the internet. In Vista, this often results in a double prompt – IE’s security dialog, followed immediately by a UAC dialog. This is an area that should be properly addressed.


Figure 4. Number of Microsoft prompters in the top 50 over time.


Impact on Customers

One extra click to do normal things like open the device manager, install software, or turn off your firewall is sometimes confusing and frustrating for our users. Here is a representative sample of the feedback we’ve received from the Windows Feedback Panel:

  • “I do not like to be continuously asked if I want to do what I just told the computer to do.”
  • “I feel like I am asked by Vista to approve every little thing that I do on my PC and I find it very aggravating.”
  • “The constant asking for input to make any changes is annoying. But it is good that it makes kids ask me for password for stuff they are trying to change.”
  • “Please work on simplifying the User Account control.....highly perplexing and bothersome at times”
We understand adding an extra click can be annoying, especially for users who are highly knowledgeable about what is happening with their system (or for people just trying to get work done). However, for most users, the potential benefit is that UAC forces malware or poorly written software to show itself and get your approval before it can potentially harm the system.
Does this make the system more secure? If every user of Windows were an expert that understands the cause/effect of all operations, the UAC prompt would make perfect sense and nothing malicious would slip through. The reality is that some people don’t read the prompts, and thus gain no benefit from them (and are just annoyed). In Vista, some power users have chosen to disable UAC – a setting that is admittedly hard to find. We don’t recommend you do this, but we understand you find value in the ability to turn UAC off. For the rest of you who try to figure out what is going on by reading the UAC prompt , there is the potential for a definite security benefit if you take the time to analyze each prompt and decide if it’s something you want to happen. However, we haven’t made things easy on you - the dialogs in Vista aren’t easy to decipher and are often not memorable. In one lab study we conducted, only 13% of participants could provide specific details about why they were seeing a UAC dialog in Vista. Some didn’t remember they had seen a dialog at all when asked about it. Additionally, we are seeing consumer administrators approving 89% of prompts in Vista and 91% in SP1. We are obviously concerned users are responding out of habit due to the large number of prompts rather than focusing on the critical prompts and making confident decisions. Many would say this is entirely predictable.



Figure 5. Percentage of prompts over time per prompt type.



Figure 6. Percentage of UAC prompts allowed over time.


Looking ahead…

Now that we have the data and feedback, we can look ahead at how UAC will evolve—we continue to feel the goal we have for UAC is a good one and so it is our job to find a solution that does not abandon this goal. UAC was created with the intention of putting you in control of your system, reducing cost of ownership over time, and improving the software ecosystem. What we’ve learned is that we only got part of the way there in Vista and some folks think we accomplished the opposite.
Based on what we’ve learned from our data and feedback we need to address several key issues in Windows 7:

  • Reduce unnecessary or duplicated prompts in Windows and the ecosystem, such that critical prompts can be more easily identified.
  • Enable our customers to be more confident that they are in control of their systems.
  • Make prompts informative such that people can make more confident choices.
  • Provide better and more obvious control over the mechanism.
The benefits UAC has provided to the ecosystem and Windows are clear; we need to continue that work. By successfully enabling standard users UAC has achieved its goal of giving IT administrators and parents greater control to lock down their systems for certain users. As shown in our data above, we’ve seen the number of external applications and Windows components that unnecessarily require Admin privileges dramatically drop. This also has the direct benefit of reducing the total amount of prompts users see, a common complaint we hear frequently. Moving forward we will look at the scenarios we think are most important for our users so we can ensure none of these scenarios include prompts that can be avoided. Additionally, we will look at “top prompters” and continue to engage with third-party software vendors and internal Microsoft teams to further reduce unnecessary prompts.
More importantly, as we evolve UAC for Windows 7 we will address the customer feedback and satisfaction issues with the prompts themselves. We’ve heard loud and clear that you are frustrated. You find the prompts too frequent, annoying, and confusing. We still want to provide you control over what changes can happen to your system, but we want to provide you a better overall experience. We believe this can be achieved by focusing on two key principles. 1) Broaden the control you have over the UAC notifications. We will continue to give you control over the changes made to your system, but in Windows 7, we will also provide options such that when you use the system as an administrator you can determine the range of notifications that you receive. 2) Provide additional and more relevant information in the user interface. We will improve the dialog UI so that you can better understand and make more informed choices. We’ve already run new design concepts based on this principle through our in-house usability testing and we’ve seen very positive results. 83% of participants could provide specific details about why they were seeing the dialog. Participants preferred the new concepts because they are “simple”, “highlight verified publishers,” “provide the file origin,” and “ask a meaningful question.”
In summary, yes, we’ve heard the responses to the UAC feature – both positive and negative. We plan to continue to build on the benefits UAC provides as an agent for standard user, making systems more secure. In doing so, we will also address the overwhelming feedback that the user experience must improve.

Ben Fathi

Source: Engineering Windows 7 : User Account Control
 
The only way you are going to get Malware is if you install software from an untrusted source.

As for Software Companies "bundleing" stuff. This is most commonly done with Google Toolbar, MSN toolbar, etc and on every one of these items there is a checkbox to indicate that you don't want it.

The lesson is pay attention to your installer programs and don't just click next-next-next-etc...

However, my intitial point is, one warning before doing anything is sufficient. We don't need the multiple warnings and escalations that the UAC requires.

You are right of course. The UAC IS ANNOYING. But it serves a purpose that many users would be foolish to ignore. Unfortunately most users of Vista are not too good at knowing what they are installing. For those who wish to live on the edge, I agree, turn it off. If you are a bit more cautious, you know, the sort of person who locks their house when they go out, leave it on.
 

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics Card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Keyboard
    Microsoft
    Mouse
    Targus
    Internet Speed
    1500kbs
    Other Info
    Self built.
The only way you are going to get Malware is if you install software from an untrusted source.

As for Software Companies "bundleing" stuff. This is most commonly done with Google Toolbar, MSN toolbar, etc and on every one of these items there is a checkbox to indicate that you don't want it.

The lesson is pay attention to your installer programs and don't just click next-next-next-etc...

However, my intitial point is, one warning before doing anything is sufficient. We don't need the multiple warnings and escalations that the UAC requires.

ROTF - apparently you've been living in a cave for the last 5 years or you'd know about the SQL server poisoning and malicious advertising that drops malware installers on your system - *without* you installing a thing.

If you get hit with a malicious banner ad, for example, that installs 1 legitimate piece of software that you need as an update (say, Adobe Flash) and then installs 9 pieces of Malware, and you accepted the first instance only, and according to your model, the other 9 get accepted because you accepted the first one - well, buddy, have fun with cleaning that off your system

That is the *exact* reason why UAC is a repeat offender. One time, 2 times, etc., is never going to be *enough* warnings - because as soon as it is documented that UAC prompts only X amount of times, sure enough the Malware authors will write malware that gives you X number of legitimate installs.
 

My Computers

System One System Two

  • Operating System
    Windows 10 Pro X64 Insider Preview (Skip Ahead) latest build
    Manufacturer/Model
    The Beast Model V (homebrew)
    CPU
    Intel Core i7 965 EE @ 3.6 GHz
    Motherboard
    eVGA X58 Classified 3 (141-GT-E770-A1)
    Memory
    3 * Mushkin 998981 Redline Enhanced triple channel DDR3 4 GB CL7 DDR3 1600 MHz (PC3-12800)
    Graphics Card(s)
    eVGA GeForce GTX 970 SSC ACX 2.0 (04G-P4-3979-KB)
    Sound Card
    Realtek HD Audio (onboard)
    Monitor(s) Displays
    2 * Lenovo LT2323pwA Widescreeen
    Screen Resolution
    2 * 1920 x 1080
    Hard Drives
    SanDisk Ultra SDSSDHII-960G-G25 960 GB SATA III SSD (System)
    Crucial MX100 CT256MX100SSD1 256GB SATA III SSD (User Tree)
    2 * Seagate Barracuda 7200.12 ST31000528AS 1TB 7200 RPM SATA II Mech. HD
    Seagate ST1500DL001-9VT15L Barracuda 7200.12 1.5 TB S
    PSU
    Thermaltake Black Widow TX TR2 850W 80+ Bronze Semi-Mod ATX
    Case
    ThermalTake Level 10 GT (Black)
    Cooling
    Corsair H100 (CPU, dual 140 mm fans on radiator) + Air (2 *
    Keyboard
    Logitech G15 (gen 2)
    Mouse
    Logitech MX Master (shared)
    Internet Speed
    AT&T Lightspeed Gigabit duplex
  • Operating System
    Sabayon Linux (current, weekly updates, 5.1.x kernel)
    Manufacturer/Model
    Lenovo ThinkPad E545
    CPU
    AMD A6-5350M APU
    Motherboard
    Lenovo
    Memory
    8 GB
    Graphics card(s)
    Radeon HD (Embedded)
    Sound Card
    Conextant 20671 SmartAudio HD
    Monitor(s) Displays
    Lenovo 15" Matte
    Screen Resolution
    1680 * 1050
    Hard Drives
    INTEL Cherryvill 520 Series SSDSC2CW180A 180 GB SSD
    PSU
    Lenovo
    Case
    Lenovo
    Cooling
    Lenovo
    Mouse
    Logitech MX Master (shared) | Synaptics TouchPad
    Keyboard
    Lenovo
    Internet Speed
    AT&T LightSpeed Gigabit Duplex
If you get hit with a malicious banner ad, for example, that installs 1 legitimate piece of software that you need as an update (say, Adobe Flash) and then installs 9 pieces of Malware, and you accepted the first instance only, and according to your model, the other 9 get accepted because you accepted the first one - well, buddy, have fun with cleaning that off your system

If you are clicking on banner ads to download Flash, then you deserve whatever is installed on you system.

I would never download anything from a banner ad. I only get my software for the legitimate creator of the software. If I want to update my Flash, I will go to Adobe.

Anyway, we are getting away from my original point. I am not trying to convince any not to use the UAC. If you like the annoying multiple popups asking you the same question over and over, then by all means use it.

I for one have never used it and I could not tell you the last time I had a virus, trojan horse, or any other piece of mailware on my system.

I live just fine without the UAC and if I choose to upgrade to Windows 7 I will immediately turn it off there as well.
 

My Computer

System One

  • Manufacturer/Model
    Gateway
    CPU
    Intel Pentium 2 Core Duo 2GHZ
    Memory
    4 GB
    Graphics Card(s)
    ATI Radeon Mobile X1400
    Hard Drives
    WD 500GB
No, no clicks required. Read up on it - it was completely drive by - you visit a page, the banner loads and poof! it drops a Trojan downloader or backdoor downloader.

I do understand the difference between *clicking* on a banner and a drive by.
 

My Computers

System One System Two

  • Operating System
    Windows 10 Pro X64 Insider Preview (Skip Ahead) latest build
    Manufacturer/Model
    The Beast Model V (homebrew)
    CPU
    Intel Core i7 965 EE @ 3.6 GHz
    Motherboard
    eVGA X58 Classified 3 (141-GT-E770-A1)
    Memory
    3 * Mushkin 998981 Redline Enhanced triple channel DDR3 4 GB CL7 DDR3 1600 MHz (PC3-12800)
    Graphics Card(s)
    eVGA GeForce GTX 970 SSC ACX 2.0 (04G-P4-3979-KB)
    Sound Card
    Realtek HD Audio (onboard)
    Monitor(s) Displays
    2 * Lenovo LT2323pwA Widescreeen
    Screen Resolution
    2 * 1920 x 1080
    Hard Drives
    SanDisk Ultra SDSSDHII-960G-G25 960 GB SATA III SSD (System)
    Crucial MX100 CT256MX100SSD1 256GB SATA III SSD (User Tree)
    2 * Seagate Barracuda 7200.12 ST31000528AS 1TB 7200 RPM SATA II Mech. HD
    Seagate ST1500DL001-9VT15L Barracuda 7200.12 1.5 TB S
    PSU
    Thermaltake Black Widow TX TR2 850W 80+ Bronze Semi-Mod ATX
    Case
    ThermalTake Level 10 GT (Black)
    Cooling
    Corsair H100 (CPU, dual 140 mm fans on radiator) + Air (2 *
    Keyboard
    Logitech G15 (gen 2)
    Mouse
    Logitech MX Master (shared)
    Internet Speed
    AT&T Lightspeed Gigabit duplex
  • Operating System
    Sabayon Linux (current, weekly updates, 5.1.x kernel)
    Manufacturer/Model
    Lenovo ThinkPad E545
    CPU
    AMD A6-5350M APU
    Motherboard
    Lenovo
    Memory
    8 GB
    Graphics card(s)
    Radeon HD (Embedded)
    Sound Card
    Conextant 20671 SmartAudio HD
    Monitor(s) Displays
    Lenovo 15" Matte
    Screen Resolution
    1680 * 1050
    Hard Drives
    INTEL Cherryvill 520 Series SSDSC2CW180A 180 GB SSD
    PSU
    Lenovo
    Case
    Lenovo
    Cooling
    Lenovo
    Mouse
    Logitech MX Master (shared) | Synaptics TouchPad
    Keyboard
    Lenovo
    Internet Speed
    AT&T LightSpeed Gigabit Duplex
You web browser should catch that kind of attack or your Virus Detector.

Anyway, I guess I've learned not to offer my opinion here.

Am I sure I want to do that? ---- Yes.
Am I really sure I want to do that? --- Yes
Wait, I have to be an Administrator to do that (even though I am already one) --- OK
Are you still sure you want to do that? --- Yes, Just freakin' do it!
 

My Computer

System One

  • Manufacturer/Model
    Gateway
    CPU
    Intel Pentium 2 Core Duo 2GHZ
    Memory
    4 GB
    Graphics Card(s)
    ATI Radeon Mobile X1400
    Hard Drives
    WD 500GB
You web browser should catch that kind of attack or your Virus Detector.

Anyway, I guess I've learned not to offer my opinion here.

Am I sure I want to do that? ---- Yes.
Am I really sure I want to do that? --- Yes
Wait, I have to be an Administrator to do that (even though I am already one) --- OK
Are you still sure you want to do that? --- Yes, Just freakin' do it!
To the above poster....

Right click application>Run as administrator. This should fix your problem.
What I would like to know is this. Why would your internet browser stop viruses or malware, when a browser is just a way to search for files and foulders on a larger file system? This is seperate from running processes, or threads.
 

My Computer

System One

  • Manufacturer/Model
    Dell 1535 Studio
Why should I have to right click and run as Admin when I am already an Admin??? That is insane!

As for your question, you browswer asks you if you are sure you want to intall activeX items (at least IE does). All I am saying is that your browser can easily detect if something is about to be installed on your system as the result of a banner ad (something you did not click on) and warn you.

Basically I am saying this. The OS (or the browser, whichever) can detect if something is being installed as a result of it being clicked on or if it was not clicked on. Only warn me if an item is being installed as a result of something I have not clicked on.

If I click install, then I know what I am doing and don't bother warning me. If I did not click on anything and something wants to just install on it's own, then warn me.

Or better yet, let my virus software take care of warning. The OS should not care what is going on. If I am stupid enough to not use a virus detector or not keep it updated, then that is my fault.
 

My Computer

System One

  • Manufacturer/Model
    Gateway
    CPU
    Intel Pentium 2 Core Duo 2GHZ
    Memory
    4 GB
    Graphics Card(s)
    ATI Radeon Mobile X1400
    Hard Drives
    WD 500GB
Perhaps, but not everything that is being installed is a result of what you are doing on your computer. That is why the UAC was put into place.
 

My Computer

System One

  • Manufacturer/Model
    Dell 1535 Studio
Perhaps, but not everything that is being installed is a result of what you are doing on your computer. That is why the UAC was put into place.

That is my point. If I am the one doing it, then I don't need warned.

If it is being done by someone else (without me clicking on anything), then I need warned.
 

My Computer

System One

  • Manufacturer/Model
    Gateway
    CPU
    Intel Pentium 2 Core Duo 2GHZ
    Memory
    4 GB
    Graphics Card(s)
    ATI Radeon Mobile X1400
    Hard Drives
    WD 500GB
Exactly- last I checked UAC does not include facial recognition software to know you are doing this. A click could just as well be accidental. A click could just as well be a hijacking - a click could just as well be conducted remotely.

The *funny* thing is that I have never seen it ask 3 times ever - it asks for elevation, and if it is something that requires even higher elevation it says so and allows to to click OK or cancel. End of story.

Try going into *nix and modifying files in protected directories - same deal. Try access server shares on a corporate network that you don't have access to - same deal.

The number of people out there that *don't* know what they are doing when the click on something far outweigh the number of us who do. Therefore, it is in M$ best interest as a commercial company with capital profits in mind to do something about it.
 

My Computers

System One System Two

  • Operating System
    Windows 10 Pro X64 Insider Preview (Skip Ahead) latest build
    Manufacturer/Model
    The Beast Model V (homebrew)
    CPU
    Intel Core i7 965 EE @ 3.6 GHz
    Motherboard
    eVGA X58 Classified 3 (141-GT-E770-A1)
    Memory
    3 * Mushkin 998981 Redline Enhanced triple channel DDR3 4 GB CL7 DDR3 1600 MHz (PC3-12800)
    Graphics Card(s)
    eVGA GeForce GTX 970 SSC ACX 2.0 (04G-P4-3979-KB)
    Sound Card
    Realtek HD Audio (onboard)
    Monitor(s) Displays
    2 * Lenovo LT2323pwA Widescreeen
    Screen Resolution
    2 * 1920 x 1080
    Hard Drives
    SanDisk Ultra SDSSDHII-960G-G25 960 GB SATA III SSD (System)
    Crucial MX100 CT256MX100SSD1 256GB SATA III SSD (User Tree)
    2 * Seagate Barracuda 7200.12 ST31000528AS 1TB 7200 RPM SATA II Mech. HD
    Seagate ST1500DL001-9VT15L Barracuda 7200.12 1.5 TB S
    PSU
    Thermaltake Black Widow TX TR2 850W 80+ Bronze Semi-Mod ATX
    Case
    ThermalTake Level 10 GT (Black)
    Cooling
    Corsair H100 (CPU, dual 140 mm fans on radiator) + Air (2 *
    Keyboard
    Logitech G15 (gen 2)
    Mouse
    Logitech MX Master (shared)
    Internet Speed
    AT&T Lightspeed Gigabit duplex
  • Operating System
    Sabayon Linux (current, weekly updates, 5.1.x kernel)
    Manufacturer/Model
    Lenovo ThinkPad E545
    CPU
    AMD A6-5350M APU
    Motherboard
    Lenovo
    Memory
    8 GB
    Graphics card(s)
    Radeon HD (Embedded)
    Sound Card
    Conextant 20671 SmartAudio HD
    Monitor(s) Displays
    Lenovo 15" Matte
    Screen Resolution
    1680 * 1050
    Hard Drives
    INTEL Cherryvill 520 Series SSDSC2CW180A 180 GB SSD
    PSU
    Lenovo
    Case
    Lenovo
    Cooling
    Lenovo
    Mouse
    Logitech MX Master (shared) | Synaptics TouchPad
    Keyboard
    Lenovo
    Internet Speed
    AT&T LightSpeed Gigabit Duplex
Whatever, use it if you want. I still maintain my position that it is overkill and a pain.

As an Admin, I should NEVER have to elevate myself to anything. I am already an Admin.
 

My Computer

System One

  • Manufacturer/Model
    Gateway
    CPU
    Intel Pentium 2 Core Duo 2GHZ
    Memory
    4 GB
    Graphics Card(s)
    ATI Radeon Mobile X1400
    Hard Drives
    WD 500GB
The problem here is that you think Admin is the pinnacle of the set of privileges.

It isn't. Older networks had privilege levels higher than 'admin' - in fact, Vista does the same thing. Take a look at the privilege level of TrustedInstaller....

And, if you want to be an admin with unlimited privileges, you could always go back to using Win98, Win 3.1 or even better, MS-DOS - there was even less restriction then.

The machine has no method for ascertaining that you do in fact know what you are doing - and I guarantee every single *admin* out there at one time or another has done something irreversible that they wish they could in fact reverse.

But the beauty of it all? You call it overkill - and yet for people just like you, M$ made sure it could be disabled. And yet you keep complaining about it. If it were there and you could not circumvent it, you'd have a right to complain. Since it is circumventable, there really is no basis for complaining. As soon as you log in you can turn it off and that will be the end of it.

A statement of it being overkill I would have let go as an opinion. A repeated *complaint* about it is not an opinion but whining. It probably takes you less clicks to disable UAC than it does to keep clicking those "3" or "4" times when it asks you over and over again to allow something to install, or delete, or whatever it is that you're doing to get those responses.

By the same token, ask DMEX here how many antimalware programs he runs on his Vista box. I'd say ask me but my company forces me to use SEP in order to VPN to their machines at night. Other than that, I help test MBAM for fun and keep WinPatrol around because I paid for a license. On Windows 7, which I am in right now, I have nothing than what comes with it - nothing.
 

My Computers

System One System Two

  • Operating System
    Windows 10 Pro X64 Insider Preview (Skip Ahead) latest build
    Manufacturer/Model
    The Beast Model V (homebrew)
    CPU
    Intel Core i7 965 EE @ 3.6 GHz
    Motherboard
    eVGA X58 Classified 3 (141-GT-E770-A1)
    Memory
    3 * Mushkin 998981 Redline Enhanced triple channel DDR3 4 GB CL7 DDR3 1600 MHz (PC3-12800)
    Graphics Card(s)
    eVGA GeForce GTX 970 SSC ACX 2.0 (04G-P4-3979-KB)
    Sound Card
    Realtek HD Audio (onboard)
    Monitor(s) Displays
    2 * Lenovo LT2323pwA Widescreeen
    Screen Resolution
    2 * 1920 x 1080
    Hard Drives
    SanDisk Ultra SDSSDHII-960G-G25 960 GB SATA III SSD (System)
    Crucial MX100 CT256MX100SSD1 256GB SATA III SSD (User Tree)
    2 * Seagate Barracuda 7200.12 ST31000528AS 1TB 7200 RPM SATA II Mech. HD
    Seagate ST1500DL001-9VT15L Barracuda 7200.12 1.5 TB S
    PSU
    Thermaltake Black Widow TX TR2 850W 80+ Bronze Semi-Mod ATX
    Case
    ThermalTake Level 10 GT (Black)
    Cooling
    Corsair H100 (CPU, dual 140 mm fans on radiator) + Air (2 *
    Keyboard
    Logitech G15 (gen 2)
    Mouse
    Logitech MX Master (shared)
    Internet Speed
    AT&T Lightspeed Gigabit duplex
  • Operating System
    Sabayon Linux (current, weekly updates, 5.1.x kernel)
    Manufacturer/Model
    Lenovo ThinkPad E545
    CPU
    AMD A6-5350M APU
    Motherboard
    Lenovo
    Memory
    8 GB
    Graphics card(s)
    Radeon HD (Embedded)
    Sound Card
    Conextant 20671 SmartAudio HD
    Monitor(s) Displays
    Lenovo 15" Matte
    Screen Resolution
    1680 * 1050
    Hard Drives
    INTEL Cherryvill 520 Series SSDSC2CW180A 180 GB SSD
    PSU
    Lenovo
    Case
    Lenovo
    Cooling
    Lenovo
    Mouse
    Logitech MX Master (shared) | Synaptics TouchPad
    Keyboard
    Lenovo
    Internet Speed
    AT&T LightSpeed Gigabit Duplex
Whatever, use it if you want. I still maintain my position that it is overkill and a pain.

As an Admin, I should NEVER have to elevate myself to anything. I am already an Admin.

Does the computer actually know it's you then and not someone else, I think it's a good idea.

I'm nowhere near being technically minded but I know enough to not just install things willy-nilly and I have protection installed but it doesn't mean that I may, by accident, click on something I shouldn't, so having that box pop up and ask me if I did actually mean to do it is a good thing it makes me look and check out just what I clicked. ;)

It doesn't take that long to just click yes I wanted to do it and just get on with things, or are you in so much of a hurry in trying to wish your life away that you don't have time for that. :huh:

I know it can be turned off and that's OK for those with more experience than me but to me it's another layer of defence in protecting my machine. :)
 

My Computer

System One

  • Operating System
    Windows 10 Home
    Manufacturer/Model
    HP Envy x360 Convertible 15-bq0xx
    CPU
    AMD A9 Stoney Ridge Technology
    Motherboard
    HP 8312 (Socket FP4)
    Memory
    8.00GB Dual-Channel Unknown (?-0-0-0)
    Graphics Card(s)
    Generic PnP Monitor (1920x1080@60Hz) 512MB ATI AMD Radeon R5
    Sound Card
    AMD High Definition Audio Device Realtek High Definition Aud
    Monitor(s) Displays
    Generic PnP Monitor on AMD Radeon R5 Graphics
    Screen Resolution
    1920 x 1080
    Hard Drives
    119GB SanDisk SD8SN8U-128G-1006 (SSD)
    931GB Hitachi HGST HTS721010A9E630 (SATA
    Keyboard
    Standard PS/2 Keyboard
    Mouse
    Microsoft Optical Wheel Mouse
    Internet Speed
    62.86Mbps down 18.19Mbps up
    Other Info
    EPSON78D0CF (XP-332 335 Series) (Default Printer)
The problem here is that you think Admin is the pinnacle of the set of privileges.

It isn't. Older networks had privilege levels higher than 'admin' - in fact, Vista does the same thing. Take a look at the privilege level of TrustedInstaller....

And, if you want to be an admin with unlimited privileges, you could always go back to using Win98, Win 3.1 or even better, MS-DOS - there was even less restriction then.

The why does it ways that I have to be an Admin to do something? Why do I have to eleveate myself to Admin just run certain items. If I look at my user Settings it says that my level is Administrator already. If I have to be a level above Administrator then I should be running as that level. If there is a "Super User Level", then prompt should say: "You have to be a Super User to do this" or "Run as Super User."

A statement of it being overkill I would have let go as an opinion. A repeated *complaint* about it is not an opinion but whining.

I am not whining, I am simply defending my position that the UAC is poorly designed and is many cases completely unnecessary.

Let's make this easy. Let's do a survey?

Who likes it?
Who disables it immediately?

I will bet that I am in the majority on this.
 

My Computer

System One

  • Manufacturer/Model
    Gateway
    CPU
    Intel Pentium 2 Core Duo 2GHZ
    Memory
    4 GB
    Graphics Card(s)
    ATI Radeon Mobile X1400
    Hard Drives
    WD 500GB
Sir, I believe that you would be incorrect. The level of people who allow the UAC to run far outweighs the people who do not allow it to run. Infact, I believe you still run the tool that you claim to dispise. As a higher level user who physicaly removes the virus on my computer myself.It is important to have knowledge of what program I do not want to run. The UAC allows me to get names and file paths for programs I do not want on my machine and remove them myself. No virus software needed.
 

My Computer

System One

  • Manufacturer/Model
    Dell 1535 Studio
Sir, I believe that you would be incorrect. The level of people who allow the UAC to run far outweighs the people who do not allow it to run. Infact, I believe you still run the tool that you claim to dispise. As a higher level user who physicaly removes the virus on my computer myself.It is important to have knowledge of what program I do not want to run. The UAC allows me to get names and file paths for programs I do not want on my machine and remove them myself. No virus software needed.

I don't run it. The very first thing I did was turn it off.

If Microsoft actively instructed people how to turn it off I would be a years pay that the vast majority of users would do it.
 

My Computer

System One

  • Manufacturer/Model
    Gateway
    CPU
    Intel Pentium 2 Core Duo 2GHZ
    Memory
    4 GB
    Graphics Card(s)
    ATI Radeon Mobile X1400
    Hard Drives
    WD 500GB
The problem here is that you think Admin is the pinnacle of the set of privileges.

It isn't. Older networks had privilege levels higher than 'admin' - in fact, Vista does the same thing. Take a look at the privilege level of TrustedInstaller....

And, if you want to be an admin with unlimited privileges, you could always go back to using Win98, Win 3.1 or even better, MS-DOS - there was even less restriction then.

The why does it ways that I have to be an Admin to do something? Why do I have to eleveate myself to Admin just run certain items. If I look at my user Settings it says that my level is Administrator already. If I have to be a level above Administrator then I should be running as that level. If there is a "Super User Level", then prompt should say: "You have to be a Super User to do this" or "Run as Super User."

A statement of it being overkill I would have let go as an opinion. A repeated *complaint* about it is not an opinion but whining.

I am not whining, I am simply defending my position that the UAC is poorly designed and is many cases completely unnecessary.

Let's make this easy. Let's do a survey?

Who likes it?
Who disables it immediately?

I will bet that I am in the majority on this.

Why? Because the vast majority of users don't know a *thing* about user permissions, file and folder ownership and how to restrict access to their OS so as to protect themselves. Don't believe me? Go do some reading on the statistics of the number of machines out there in the real world that are silently a part of a botnet. I guarantee it is going to be an eye opener.

Also, I will agree with you on the point that the wording is pretty harsh - using the exact same verbiage to say a user is an administrator but that his actions require administrative privileges is confusing - but, again, this is because of the missteps with XP - otherwise, if every user out there had been used to installing, configuring and *administering* a domain controller machine, or other such mission critical server, there would be a lot less headaches when transitioning to Vista. XP took the NT kernel, and gave it to the end user - who knows next to *nothing* about how to administer his own files, let alone files in a multi-user environment.

Finally, I'll take you up on that survey - in fact, watch for it in the next 15 minutes - and we'll see who is in the majority and who is not. As for making it easy to disabled, well, it *is* pretty easy to disable it - and just as easy (if not easier) in Windows 7 as well. But, (and here is the kicker) _ run without UAC and you'll be finding fast that you'll need all sorts of layered protection in Vista that you currently don't need.

Another thing - programs were not meant to write configuration files to the program directory - any app that was used in a multi-user environment was already configured to save configurations to the users' folders - which, coincidentally, don't have the same restrictions as, say, Program Files. Now, with XP, a lot of program developers, and especially those that were new, saw that they could indeed write the configuration files right to the same folder - or else in areas of the registry that were normally considered protected. All of a sudden Vista came along and those same programs started throwing up exceptions left and right. Go figure.


Sir, I believe that you would be incorrect. The level of people who allow the UAC to run far outweighs the people who do not allow it to run. Infact, I believe you still run the tool that you claim to dispise. As a higher level user who physicaly removes the virus on my computer myself.It is important to have knowledge of what program I do not want to run. The UAC allows me to get names and file paths for programs I do not want on my machine and remove them myself. No virus software needed.

I don't run it. The very first thing I did was turn it off.

If Microsoft actively instructed people how to turn it off I would be a years pay that the vast majority of users would do it.

You still run it unless you also take ownership of the entire HD as well - even without UAC you'll get prompts whenever you try to write to areas of the HD that are protected by *ownership*. In fact, if you were not using it you'd have already turned it off and this rant would not exist....

I turned it off after 2 days of annoying the hell out of me. Even now each time my computer restarts the system says uac is turned off, like it's a problem. Turning it off has not been "the end of it". I agree with RBonser. I have other programs running that protect me less intrusively than UAC.

In my circle "Are you sure? Are you really sure? Are you really sure you're really sure?" is a standard dig at Vista.

To suggest RBonser is whining is merely insulting. To suggest he go back to 98 equally so. Even UAC cannot stop people from ever making a bad move or becoming blase about clicking "yes, I'm sure" because if you don't know, you don't know, no matter what UAC asks. Life is risk. You can never eliminate it entirely.

You can think it is insulting all you want - the fact of the matter remains that the general population cannot protect itself from the criminal enterprises out there in the real world. Complain all you want - UAC is a breath of fresh air in the woeful tragedy that has become that connected world of PCs running Windows XP.

Granted UAC is not a panacea - nothing is, other than never using a computer for anything in the first place. However, with XP there is *no* warning - nothing to indicate that what is about to happen may be potentially dangerous. I cannot *count* the number of times I have worked through with someone who has a virus on their computer and the first words out of their mouth are "Well, it never said anything was wrong - how was I supposed to know?"

The fact of the matter is that UAC was not put in there to annoy expert users like us - it was put there to *protect* novice users who don't know any better. I am in the midst of cleaning off a whole slew of viruses triggered from a drive by install of Anti Spyware 2008 on an XP machine - thus far I have 13 unique infections, 700+ files infected, and I have spent the last 4 hours on the machine, 2 of those being just performing scans. This person had an AV solution that *was* up to date, but it was not resident was they were using a free version. This person also had a hosts file, and SpyBot, and Ad-aware (free version again) - and yet managed to get infected this badly. And this person does not look at any pornographic sites at all, nor does she use any sort of file sharing / P2P app. That type of behavior is *atypical* - and yet she is looking at a machine full of malware.

UAC, with it's preventive measures, and the use of different ownership and privilege levels, in Vista, make a lot of difference. And that is the heart of the matter.

I still say - if you don't like it, turn it off. If you continue to gripe about it, go out and download a Linux distribution (and watch your face when you try to wrap your head around sudo) or else go out and but XP and format and install. Or Windows 98. Or MS-DOS 6.2. You won't ever be bothered by UAC and permissions and privileges again if you choose the XP / 98 / DOS route. You *will* when you go Linux. Or Mac OS X. Or FreeBSD, or Solaris, or any other *modern* (as in contemporary) OS.

EDIT - Added the following:

See Poll: http://www.vistax64.com/general-discussion/199212-uac-do-you-love-hate-deal.html
 
Last edited:

My Computers

System One System Two

  • Operating System
    Windows 10 Pro X64 Insider Preview (Skip Ahead) latest build
    Manufacturer/Model
    The Beast Model V (homebrew)
    CPU
    Intel Core i7 965 EE @ 3.6 GHz
    Motherboard
    eVGA X58 Classified 3 (141-GT-E770-A1)
    Memory
    3 * Mushkin 998981 Redline Enhanced triple channel DDR3 4 GB CL7 DDR3 1600 MHz (PC3-12800)
    Graphics Card(s)
    eVGA GeForce GTX 970 SSC ACX 2.0 (04G-P4-3979-KB)
    Sound Card
    Realtek HD Audio (onboard)
    Monitor(s) Displays
    2 * Lenovo LT2323pwA Widescreeen
    Screen Resolution
    2 * 1920 x 1080
    Hard Drives
    SanDisk Ultra SDSSDHII-960G-G25 960 GB SATA III SSD (System)
    Crucial MX100 CT256MX100SSD1 256GB SATA III SSD (User Tree)
    2 * Seagate Barracuda 7200.12 ST31000528AS 1TB 7200 RPM SATA II Mech. HD
    Seagate ST1500DL001-9VT15L Barracuda 7200.12 1.5 TB S
    PSU
    Thermaltake Black Widow TX TR2 850W 80+ Bronze Semi-Mod ATX
    Case
    ThermalTake Level 10 GT (Black)
    Cooling
    Corsair H100 (CPU, dual 140 mm fans on radiator) + Air (2 *
    Keyboard
    Logitech G15 (gen 2)
    Mouse
    Logitech MX Master (shared)
    Internet Speed
    AT&T Lightspeed Gigabit duplex
  • Operating System
    Sabayon Linux (current, weekly updates, 5.1.x kernel)
    Manufacturer/Model
    Lenovo ThinkPad E545
    CPU
    AMD A6-5350M APU
    Motherboard
    Lenovo
    Memory
    8 GB
    Graphics card(s)
    Radeon HD (Embedded)
    Sound Card
    Conextant 20671 SmartAudio HD
    Monitor(s) Displays
    Lenovo 15" Matte
    Screen Resolution
    1680 * 1050
    Hard Drives
    INTEL Cherryvill 520 Series SSDSC2CW180A 180 GB SSD
    PSU
    Lenovo
    Case
    Lenovo
    Cooling
    Lenovo
    Mouse
    Logitech MX Master (shared) | Synaptics TouchPad
    Keyboard
    Lenovo
    Internet Speed
    AT&T LightSpeed Gigabit Duplex
Making a separate post here for the following reason - those that use UAC outnumber those that disable it 3:1, thus far into the poll.

Now, let's see if there is a flood of users joining just to vote on this topic all of a sudden :p
 

My Computers

System One System Two

  • Operating System
    Windows 10 Pro X64 Insider Preview (Skip Ahead) latest build
    Manufacturer/Model
    The Beast Model V (homebrew)
    CPU
    Intel Core i7 965 EE @ 3.6 GHz
    Motherboard
    eVGA X58 Classified 3 (141-GT-E770-A1)
    Memory
    3 * Mushkin 998981 Redline Enhanced triple channel DDR3 4 GB CL7 DDR3 1600 MHz (PC3-12800)
    Graphics Card(s)
    eVGA GeForce GTX 970 SSC ACX 2.0 (04G-P4-3979-KB)
    Sound Card
    Realtek HD Audio (onboard)
    Monitor(s) Displays
    2 * Lenovo LT2323pwA Widescreeen
    Screen Resolution
    2 * 1920 x 1080
    Hard Drives
    SanDisk Ultra SDSSDHII-960G-G25 960 GB SATA III SSD (System)
    Crucial MX100 CT256MX100SSD1 256GB SATA III SSD (User Tree)
    2 * Seagate Barracuda 7200.12 ST31000528AS 1TB 7200 RPM SATA II Mech. HD
    Seagate ST1500DL001-9VT15L Barracuda 7200.12 1.5 TB S
    PSU
    Thermaltake Black Widow TX TR2 850W 80+ Bronze Semi-Mod ATX
    Case
    ThermalTake Level 10 GT (Black)
    Cooling
    Corsair H100 (CPU, dual 140 mm fans on radiator) + Air (2 *
    Keyboard
    Logitech G15 (gen 2)
    Mouse
    Logitech MX Master (shared)
    Internet Speed
    AT&T Lightspeed Gigabit duplex
  • Operating System
    Sabayon Linux (current, weekly updates, 5.1.x kernel)
    Manufacturer/Model
    Lenovo ThinkPad E545
    CPU
    AMD A6-5350M APU
    Motherboard
    Lenovo
    Memory
    8 GB
    Graphics card(s)
    Radeon HD (Embedded)
    Sound Card
    Conextant 20671 SmartAudio HD
    Monitor(s) Displays
    Lenovo 15" Matte
    Screen Resolution
    1680 * 1050
    Hard Drives
    INTEL Cherryvill 520 Series SSDSC2CW180A 180 GB SSD
    PSU
    Lenovo
    Case
    Lenovo
    Cooling
    Lenovo
    Mouse
    Logitech MX Master (shared) | Synaptics TouchPad
    Keyboard
    Lenovo
    Internet Speed
    AT&T LightSpeed Gigabit Duplex
In order for your poll to at all an acurate test (as I stated in my earlier post), you would first have to move it to a site that the normal Vista User would go to. This site is not it. This site is where Users looking for help with something may find a search engine. Heck I have used Vista since it came out but just found this site not that long ago.

Also, again, Microsoft would have to actively start advertising how to turn off the UAC (which you know they won't do).

Once the everyday Vista User is educated on how to turn off the annoying, unnecessary, repetitive prompts and your poll was moved to a site everyone would venture to, your numbers would look very different.
 

My Computer

System One

  • Manufacturer/Model
    Gateway
    CPU
    Intel Pentium 2 Core Duo 2GHZ
    Memory
    4 GB
    Graphics Card(s)
    ATI Radeon Mobile X1400
    Hard Drives
    WD 500GB
Back
Top