{"id":8851,"date":"2007-03-02T10:19:00","date_gmt":"1999-11-29T20:00:00","guid":{"rendered":"https:\/\/aidanfinn.com\/?p=8851"},"modified":"2007-03-02T10:19:00","modified_gmt":"1999-11-29T20:00:00","slug":"is-uac-a-security-technology","status":"publish","type":"post","link":"https:\/\/aidanfinn.com\/?p=8851","title":{"rendered":"Is UAC A Security Technology?"},"content":{"rendered":"<p>Jesper Johansson posted a <a href=\"http:\/\/msinfluentials.com\/blogs\/jesper\/archive\/2007\/03\/01\/confusion-about-vista-features-what-uac-really-is.aspx\" target=\"_blank\" rel=\"nofollow\">blog entry<\/a> discussing the debate about what UAC really is and if it works or not.\u00a0 Jasper is in a unique position to be able to comment on this because he is a former Microsoft employee and was a senior security expert with them.<\/p>\n<p>Long story short &#8230; UAC is not an anti malware defense.\u00a0 That&#8217;s what your anti malware products are intended to do.\u00a0 UAC is intended to allow people who need to log in as local administrators to run with reduced privs and then be prompted to OK a process that requires elevated rights.\u00a0 This can reduce the risk of malware executing, i.e. if something executes on your system and wants to use elevated rights then you are in a position to control that.\u00a0 But as Mark Russinovich pointed\u00a0out lately,\u00a0there are ways and means around this, i.e. there are no firewalls between processes running on the same system.\u00a0 Would you want them?\u00a0 Probably not &#8230; imagine that no process could integrate with any other process.<\/p>\n<p>Give it a read and follow the links that Jesper provides to make up your own mind.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jesper Johansson posted a blog entry discussing the debate about what UAC really is and if it works or not.\u00a0 Jasper is in a unique position to be able to comment on this because he is a former Microsoft employee and was a senior security expert with them. Long story short &#8230; UAC is not &hellip; <a href=\"https:\/\/aidanfinn.com\/?p=8851\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Is UAC A Security Technology?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8851","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"jetpack_featured_media_url":"","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/8851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8851"}],"version-history":[{"count":0,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/8851\/revisions"}],"wp:attachment":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}