I’ve noticed that there’s a certain small but vocal group of IT professionals out there that are still whining about UAC’s implementation despite all the incredible good it provides and all the evolutionary improvements made it.
To the few uneducated folks that are still complaining, "There’s too many prompts from UAC," I’ll take Vegas odds that you haven’t been consistently using Windows Vista with Service Pack 1 on your production machine have you?
Because if so, you’d notice that there are far fewer prompts now that in the RTM. And even if you have, by saying that you don’t like the security prompts and you want them removed "because end users won’t read them", you’re effectively absolving end users of their obligation to be responsible for company security. There is no substitution for end user accountability.
EVERY USER IS RESPONSIBLE FOR FOLLOWING GOOD SECURITY POLICY & PRACTICES.
HELLO? APPLICATION INTEGRATION WITH UAC IS EASY
And to the folks complaining, "There are too many applications that balk at UAC," yes, many applications do not adhere to good security practices and UAC catches them when they attempt to do things they shouldn’t. However, complaining about UAC is like complaining about your Mom when she tells you not to touch the stove because it may or may not be hot.
That being said, all applications can integrate with UAC. Again, for effect:
ALL APPLICATIONS CAN INTEGRATE SEAMLESSLY WITH U.A.C.
It just requires preparation to ‘bless’ the application using a technology like Privilege Manager from Beyond Trust. Privilege Manager ultimately eliminates all UAC authorization prompts for applications by providing seamless authorized access to just the specific higher level privileges that an application requires because it’s written with poor security practices. (For example, it may require the ability to automatically reboot the workstation) This is infinitely better than providing Local Administrator privileges. Most customers I work with have already downloaded the software and have been working with it.