User Account Control (UAC) is a windows seven feature designed to eliminate unauthorized change to the computer. UAC is used to fix issues surrounding application that required administrative privileges, which forces users to be configured as local administrators as it is designed to protect the registry and files of the operating system from viruses, malware and update computer protected areas.
By default, administrators in modern Windows versions do not have complete access to modify settings in the system and install applications a result when they try making critical changes in parameters, the computers desktop changes as it shows a prompt asking whether they are to proceed with the process (Culp, 2007). UAC eliminates all administrative powers until a task requests for them. It is done in a way that background software’s malware and viruses cannot modify the operating system using the credentials used to log in. UAC eliminates the possibility of changes in a computer system without the administrator’s permission (Nordström, 2012) .
Delegate your assignment to our experts and they will do the rest.
In addition, UAC allows the administrator to set levels of warnings whenever they are making changes to their computers. However, the way UAC functions in Windows 7 has made many administrators avoid using it, as it bears annoying pop-ups that are associated with it which have forced windows to come up with UAC slider which allows the administrator to control the level of UAC security and prompts that pop-up (Leonhard, 2009). The slider can manage application types that are likely to cause a prompt and evaluates the ones that are allowed to execute without a prompt.
UAC in windows seven is incredibly intrusive, as most administrators do not know how to change settings controlling it which makes it frustrating to control the number of alerts. Administrators are usually frustrated by its application in computer management as it is engages one mostly instead of helping. For instance, an application can be blocked but a process started by the software is flagged, this leads to unnecessary actions.
Reference
Culp, B. (2007). Windows Vista administration: The definitive guide . Sebastopol, Calif: O'Reilly.
Leonhard, W. (2009). Windows 7 all-in-one for dummies . Hoboken, N.J: Wiley.
Nordström, K. (2012). Microsoft forefront identity manager 2010 R2 handbook: A complete handbook on FIM 2010 R2 covering both identity and certificate management . Birmingham, UK: Packt Pub.