100% found this document useful (1 vote)
419 views2 pages

Enforce User Account Control

This document provides instructions for configuring user account control settings on a Windows server. It lists 10 specific UAC settings that should be configured, such as enabling admin approval mode for the built-in administrator account and switching to the secure desktop when prompting for elevation. The instructions specify that these settings should be configured by accessing the default domain policy in group policy management and editing the relevant security options policies.

Uploaded by

michael
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
419 views2 pages

Enforce User Account Control

This document provides instructions for configuring user account control settings on a Windows server. It lists 10 specific UAC settings that should be configured, such as enabling admin approval mode for the built-in administrator account and switching to the secure desktop when prompting for elevation. The instructions specify that these settings should be configured by accessing the default domain policy in group policy management and editing the relevant security options policies.

Uploaded by

michael
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

18/01/2024, 17:57 Check Answers

6.6.6 Enforce User Account Control

Lab Report
Time Spent: 18:58

Score: 10/10 (100%)

TASK SUMMARY

Required Actions

 Admin Approval mode for the built-in Administrator account: Enabled

 Allow UIAccess applications to prompt for elevation without using the secure desktop: Disabled

 Behavior of the elevation prompt for administrators in Admin Approval mode: Prompt for credentials

 Behavior of the elevation prompt for standard users: Automatically deny elevation requests

 Detect application installations and prompt for elevation: Enabled

 Only elevate UIAccess applications that are installed in secure locations: Enabled

 Only elevate executables that are signed and validated: Disabled

 Run all administrators in Admin Approval mode: Enabled

 Switch to the secure desktop when prompting for elevation: Enabled

 Virtualize file and registry write failures to per-user locations: Enabled

EXPLANATION

While completing this lab, use the following information when configuring the UAC settings.

User Account Control Setting

Admin Approval mode for the built-in Administrator account Enabled

Allow UIAccess applications to prompt for elevation without using the secure desktop Disabled

Behavior of the elevation prompt for administrators in Admin Approval mode Prompt for credentials

Behavior of the elevation prompt for standard users Automatically deny elevation requests

Detect application installations and prompt for elevation Enabled

Only elevate executables that are signed and validated Disabled

Only elevate UIAccess applications that are installed in secure locations Enabled

Run all administrators in Admin Approval mode Enabled

Switch to the secure desktop when prompting for elevation Enabled

Virtualize file and registry write failures to per-user locations Enabled

Complete this lab as follows:

1. Access the CorpDC server.


a. From Hyper-V Manager, select CORPSERVER.
b. Double-click CorpDC.
2. Access the CorpNet.local domain for Group Policy Management
a. From Server Manager, select Tools > Group Policy Management.
b. Maximize the window for easy viewing.
c. Expand Forest: CorpNet.local > Domains > CorpNet.local.
3. Configure the UAC settings.
a. Right-click Default Domain Policy and select Edit.
b. Maximize the window for easier viewing.

https://labsimapp.testout.com/v6_0_581/index.html/productviewer/1203/6.6.6/5c4e1d6d-4dd1-4024-ac88-34ea6ed1ae34/outline?nonce=R_IvSMEor8qKoW4st… 1/2
18/01/2024, 17:57 Check Answers
c. Under Computer Configuration, expand and select Policies > Windows Settings > Security Settings > Local Policies > Security
Options.
d. From the right pane, double-click the policy that you want to edit.
e. Select Define this policy setting.
f. Select Enable or Disable as necessary.
g. Edit the policy value as needed and then select OK.
h. Repeat steps 3d–3g for each remaining policy setting.

Copyright © 2024 TestOut Corp. Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved.

https://labsimapp.testout.com/v6_0_581/index.html/productviewer/1203/6.6.6/5c4e1d6d-4dd1-4024-ac88-34ea6ed1ae34/outline?nonce=R_IvSMEor8qKoW4st… 2/2

You might also like