[SOLVED] Fully disable User Access Control (UAC) via Group Policy (GPO)

http://blog.pythonaro.com/2013/05/fully-disable-user-access-control-uac.html

 

Fully disable User Access Control (UAC) via Group Policy (GPO)

I’m sure Windows’ User Access Control is a wonderful idea and dramatically improved security levels of this once-beleaugured operating system. Unfortunately, most COM/DCOM-based software was written before 2007 and simply doesn’t like it (cough*Oracle EPM Financial Management*cough); 6 years later, we’re still forced to disable it in many cases.

This is usually achieved through Active Directory policies. Most documents and guides will tell you that you just need to turn off three policies in Windows 2008, under Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Security Options:

  • User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode (set to Elevate without prompting)
  • User Account Control: Detect application installations and prompt for elevation (set to Disabled)
  • User Account Control: Run all administrators in Admin Approval Mode (set to Disabled)

Unfortunately, this will bring that lovely UAC slider all the way down, but will still results in a weird behaviour where local administrators have most rights but not all of them. The typical test I perform is to open a regular Command Prompt and try to navigate to C:\Windows\SysWOW64\Config – if I get an Access Denied message, then UAC is still lurking in the shadows.

The extra kick we need is, from my tests, this:

  • User Account Control: Only elevate UIAccess applications that are installed in secure locations (set to Disabled)
As explained on the technet site, this policy refuses to elevate applications that don’t live in “secure locations” (i.e. %windir% or Program Files). It makes sense that such a policy would affect third-party software dropping executables in their own home folders (cough*lots of Java stuff*cough), but why cmd.exe? No idea, but there you are. For all intents and purposes, UAC is completely turned off only when all these four policies are disabled; miss one of them, and things will get weird.
I wish Microsoft had just given us a big button that said Behave like Windows 2003, but I guess it wouldn’t have sold new manuals and certification lessons.
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s