How to automatically deny UAC elevation requests in Windows 10

To install an application in Windows 10, high-level standard credential users are requested. With some adjustments, you can change that behavior to deny such requests.

  istock-479209068.jpg

Image: anyaberkut, Getty Images / iStockphoto

For a standard Microsoft Windows 10 user, any attempt to run or install an application that requires elevated or administrative privileges will be followed by a Notice of Access Control of user (UAC) of the system. The user must enter the appropriate credentials to continue. This security procedure plays a vital role in protecting Windows 10 PCs from malware and other harmful applications.

With an edition or two of some very specific configuration configurations, you can change the normal request behavior in Windows 10 to automatically deny the UAC elevation request of standard level users. Modifying this behavior can be useful in network environments (commercial or personal) where standard users cannot install unauthorized applications, ever.

This tutorial shows you how to edit the configuration settings in Windows 10 using the Local Policy Editor and Registry Editor to automatically deny UAC elevation requests from users with standard-level credentials.

SEE: Windows update May 10, 2019: 10 notable new features (free PDF) (TechRepublic)

How to automatically deny UAC elevation requests with the editor of Policies

If your PC is running Windows 10 Pro, the most effective way to change the behavior of UAC is with the Local Group Policy Editor. Type "edit group policy" in the search box on your Windows 10 desktop and click or tap the appropriate item in the results list.

Navigate to this folder, shown in Figure A :

Computer Configuration / Windows Configuration / Security Configuration / Local Policies / Security Options

  a-change-uac -win10.jpg

Figure A

In the window on the right, scroll down until you reach a configuration with this label:

User account control: Behavior of the elevation request for standard users

Double-click to open the policy screen as shown in Figure B . Click the drop-down menu to change the settings to automatically deny an elevated UAC request. Click OK to apply the change.

  b-change-uac-win10.jpg "data-original =" https://tr1.cbsistatic.com/hub/i/r/2019/08/05/7e2cff7a-a590-4baf-9098-6a7f7ef4251c/ resize / 770x / 558b85a32cd95f909b43b4cb583ef010 / b-change-uac-win10.jpg

Figure B

If at any time you want to return to the default behavior, reopen the configuration with the Local Group Policy Editor.

How to automatically deny UAC elevation requests with registration edition

Disclaimer: Editing the Windows registry file is a serious task. A corrupt Windows Registry file could cause your computer to not work, requiring a reinstallation of the Windows 10 operating system and possible data loss. Make a backup copy of the Windows 10 log file and create a valid restore point before continuing.

To change the UAC request behavior for non-Pro versions of Windows 10, you must edit the Windows registry file. Type "regedit" in the desktop search box and click or tap the appropriate result from the list.

Navigate to this key in the registry editor, as shown in Figure C :

HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Policies System

  c-change-uac -win10 .jpg "data-original =" https://tr2.cbsistatic.com/hub/i/r/2019/08/05/f828fe71-3936-4706-9c40-6798fd12c8ac/resize/770x/530e341f8ed739feedefe8227983e288/c- change- uac-win10.jpg

Figure C

Find the key labeled ConsentPromptBehaviorUser and double-click to reveal the configuration screen shown in Figure D .

  d-change-uac-win10.jpg "data-original =" https://tr3.cbsistatic.com/hub/i/r/2019/08/05/4a663468-6c30-4b37-8468-d12fea18b6e0/ resize / 770x / a13003b69130c97efd94043f9fc06c0b / d-change-uac-win10.jpg

Figure D

The value can be set to 0, 1 or 3. Unfortunately, the editor does not indicate what setting each number represents. These are the available options:

0 – Automatically deny elevation requests

1 – Request credentials on the secure desktop

3 – Request credentials (default)

Change the value to zero and then click Click OK to confirm your choice Exit the registry editor application to complete the process.

Now, when a user with standard-level credentials tries to install an application or perform some other activity that requires high credentials, he will be automatically denied without asking.

See also

For More Updates Check out Blog, Windows Softwares Drivers, Antivirus, Ms Office, Graphic Design Don’t Forget to Look Our Facebook Page Get Into Pc like us & follow on Twitter- @getinpc

Please Note: This content is provided and hosted by a 3rd party server. Sometimes these servers may include advertisements. igetintopc.com does not host or upload this material and is not responsible for the content.