User Account Control What is it and how does it work?

You want to know a method of User account control on your Windows, we invite you to read the following article and learn about What is it about? How does it work? and How to configure it from the comfort of your home? without the need to seek help from third parties, fast, simple and very safe.

User-Account-Control-What-It-Is-And-How-It-Works-1

User account control allows an application not to modify the configuration of your computer.

User Account Control: What do you mean?

It is also called User Account Control (UAC), which deals with the security control that a computer has to warn or prevent any modification in the configuration of your computer by an application, without being authorized.

This option is preconfigured to notify the user when an application wishes to make modifications or changes to the configuration of the equipment, which is why messages are seen that come out of nowhere when entering a specific Web page or application.

This application allows you to completely eliminate messages or notices that usually annoy after a while, as well as offers the possibility of increasing security levels and receiving more messages, because we are talking about a tool that seeks a way to help the computer to avoid being contaminated by malware, being able to maintain its control in the changes that are going to be made.

It has four different levels of security, from the first that offers the possibility of having this function turned off to the fourth, through the third, which is the configuration that the factory equipment brings and that helps users to keep up to date with the changes or modifications made by the equipment.

How does User Account Control work?

Each of the security levels has different restrictive characteristics, so its operation is extremely simple. You only have to enter the configuration option of the User account control and move the bar to the level of security you want, according to the characteristics of the level.

  • Fourth level (Always notify me): This option is designed to notify the user of the programs that you have in Windows that try to install or make changes to the computer without the corresponding permission. You also have the ability to be notified when configuration changes are made or other tasks are modified.
  • Third level (Notify only when an application tries to make changes on the computer): This level of security is that it brings the system by default, notifying only when a Windows program tries to make changes or install applications without the corresponding permission. However, this level does not give notice of the changes in the configuration, but it will be able to freeze other activities until it responds to the request of the emergency window.
  • Second level (Notify only when the application tries to make changes to the computer without dimming the desktop): It is very similar to the previous level, since it will notify you when the program tries to install or make other modifications to the Windows configuration, but without warning when the user makes these modifications and the tasks do not freeze, allowing you to continue working without notice.
  • First level (Without any notification): This is undoubtedly the least recommended option that exists, since the system will not warn of any violation or change that happens on the computer by an application or by the user.

By observing each of the levels, we can realize that the configuration that the computer brings is the ideal one, needing the fourth level only when constantly installing applications or visiting unknown Web pages, however, it will also depend on how much you are. willing to have control of changes to your computer and if you want it to notify you or not.

In both cases, the Windows notice does not offer the possibility of continuing to work until the user attends and decides on the information that is being provided. This is because the window is usually in the foreground and will be seen on the entire screen without the opportunity to minimize it.

User-Account-Control-What-It-Is-And-How-It-Works-2

The user account control levels offer the possibility of configuring it according to the needs of each person.

When do the messages appear?

The messages usually appear when the application requires an update, installation of new software or affects the account of another user, showing a UAC indicator which shows a permission. If the person refuses to accept it, the authorization will not be carried out.

If, on the contrary, the person authorizes, the application can make the changes and administrative permissions that it needs to run. However, a fact that we must take into account is that the permission will only be given until the application stops running or the user closes it.

Some of the changes that the Windows administrator usually asks for permission depend on How is the Windows administrator configured? User account control in the computer? being able to activate any of the following actions:

  • Have the administrator run an application.
  • Install ActiveX controls in Internet Explorer.
  • Modifications to files in Windows folders, system settings or Program Files.
  • Configuration of security or parental controls.
  • Modifying the configuration of the User account control.
  • Install / uninstall of applications and drivers.
  • Modification of the system date and time.
  • Observe or modify the files and folders of another user.
  • Restoring documents or protected system files.
  • Add or delete user accounts.
  • Run the Tasks program.
  • Model Windows update based on user needs.
  • Modify the type of account for each person.
  • Vary the Firewall settings of the operating system.

Steps to configure User Account Control settings

  1. Open the initial order menu and enter UAC in the search engine.
  2. Click on the Change User Account Control settings option.
  3. You can see that on the left side you will find a bar to configure the level of protection and on the right side, a bar that will show the type of configuration that you will obtain.
  4. After selecting the level you want, click on accept.
  5. Restart your computer.
We invite you to learn more about Magnetic tape of the Microinformatics Team, its capacity, types, details and much more information on the subject.

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Actualidad Blog
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.