Share this page : facebooktwitterlinkedinmailfacebooktwitterlinkedinmail

Use Group policy and UAC can give some kind of restriction on the users. we can find them under: computer configuration>windows settings>security settings>Local Policy>security options

Scroll down, you can find 10 item start with “User Account Control:”

Some item is so confusing, here is one example:

User Account Control: Detect application installations and prompt for elevation EnableInstallerDetection Enabled (default for home)

Disabled (default for enterprise)

User Account Control: Only elevate executables that are signed and validated ValidateAdminCodeSignatures Disabled

 

Before we configure these two, let’s have a look at the difference between the signed and validated installation program:

If I log in the system with standard user, the unsigned and invalidated program will have a little shield on the right bottom of the icon. the signed one does not have it and the system will never ask you for password to elevate permission.

restricted

If I switch to a admin user, the shields all gone.norestriction

The first oneļ¼š UAC will ask you to provide admin password when you try to install software which is unsigned and invalidated.

Second one: if you choose Disable, means elevate all executable files for “not signed or validated”.

 

if you choose enable, and try to install a third-party software which is not signed or validated by microsft, it will pop up this

deny_installationI reckon it will just deny it without even bother to elevate it.

It is really similar to this option “User Account Control: Behavior of the elevation prompt for standard users” changed to “Automatically deny elevation requests” but different error message.

denyAccess

For more , check here.