Windows UAC Security

The cluster focuses on discussions about Windows User Account Control (UAC), its role in preventing apps from elevating privileges without user consent, known bypasses, effectiveness as a security boundary, and comparisons to other OS like macOS.

➡️ Stable 0.6x Security
2,894
Comments
20
Years Active
5
Top Authors
#2931
Topic ID

Activity Over Time

2007
3
2008
9
2009
20
2010
45
2011
60
2012
88
2013
98
2014
74
2015
147
2016
190
2017
229
2018
132
2019
270
2020
202
2021
248
2022
250
2023
239
2024
323
2025
243
2026
28

Keywords

e.g AppLocker OK UIPI UI F8 BTW XP i.e microsoft.com windows user user account admin administrator account vista security privileges access

Sample Comments

Vanit Sep 15, 2021 View on HN

Isn't this a security hole if an app can change Windows behaviour without prompts?

gruez Dec 28, 2023 View on HN

It does, it's called secure desktop.https://en.wikipedia.org/wiki/User_Account_Control#Features

nhamausi Sep 12, 2016 View on HN

Is this only on Mac, what about Windows (bypassing UAC?)

saw-lau Mar 8, 2011 View on HN

In XP, all bets are off, as the vast majority of users run with local admin rights.For Vista and 7, I believe that the much-hated-by-numpties User Account Control should prevent this from happening, as it opens a virtual screen or something to give access to the 'OK/Cancel' dialog.From UAC on Wikipedia: 'User Account Control asks for credentials in a Secure Desktop mode, where the entire screen is temporarily dimmed, Windows Aero disabled, and only the authorization window at full b

pjmlp Feb 3, 2019 View on HN

Because it would work like permissions on Android or Windows UAC, regular users would just turn everything on anyway.

babypuncher Dec 10, 2021 View on HN

Windows absolutely does unless you turn User Account Control off. This has been part of the operating system since Vista.

iancarroll Oct 27, 2019 View on HN

How does Windows get it right? Windows has User Account Control for UI apps, which is a “security” feature that they refuse to fix bypasses in.

lostmsu Jun 18, 2019 View on HN

Probably because this is not a security issue, as you have to be an administrator on the machine to be able to do that.

marssaxman Nov 6, 2016 View on HN

I have very limited experience with Windows and don't claim to know much of anything about its security. I was referring to the User Account Control system introduced in Windows 7. Whatever might be happening underneath, the system appears to end up doing the same thing: the user operates in a reduced-privileges mode until specifically authorizing a local, temporary elevation.

tinus_hn Jul 27, 2022 View on HN

Sorry, the argument is:> Windows doesn’t allow you to do that by default unless you’re an admin.The refutation is that by default users are an admin. So no, they’re not protected against persistent threats like UEFI malware.