Fully disable User Access Control (UAC) via Group Policy (GPO)
This is usually achieved through Active Directory policies. Most documents and guides will tell you that you just need to turn off three policies in Windows 2008, under Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Security Options:
- User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode (set to Elevate without prompting)
- User Account Control: Detect application installations and prompt for elevation (set to Disabled)
- User Account Control: Run all administrators in Admin Approval Mode (set to Disabled)
Unfortunately, this will bring that lovely UAC slider all the way down, but will still results in a weird behaviour where local administrators have most rights but not all of them. The typical test I perform is to open a regular Command Prompt and try to navigate to C:\Windows\SysWOW64\Config – if I get an Access Denied message, then UAC is still lurking in the shadows.
The extra kick we need is, from my tests, this:
- User Account Control: Only elevate UIAccess applications that are installed in secure locations (set to Disabled)