/>
X

Symantec shows Microsoft how to do UAC

Security company Symantec has released a tool that helps to make Vista's UAC (User Account Control) feature clearer and less of a pain to use.
adrian-kingsley-hughes.jpg
Written by Adrian Kingsley-Hughes, Contributor on

Security company Symantec has released a tool that helps to make Vista's UAC (User Account Control) feature clearer and less of a pain to use.

Norton UAC Tool in action!

Norton UAC Tool (which, I will warn you right from the start is currently in beta) is a replacement to the UAC prompts that you normally see. It has two usability-related features to offer:

It offers a "Don't ask me again" feature so that the next time you carry out a certain action there's no UAC prompt displayed

It gives you more information about what's triggered a UAC prompt. Specifically:

  • Whether the app is digitally signed (and if so, who it is signed by)
  • Whether the component resides in a protected directory

 
Symantec shows Microsoft how to do UAC

 
Symantec shows Microsoft how to do UAC
 

 
Symantec shows Microsoft how to do UAC

 
Symantec shows Microsoft how to do UAC

Before installing this tool, read the Norton UAC Tool FAQcarefully, especially the following points:

Q: What does Norton Labs get out of my testing? A: DATA! Each time you see a prompt, the Norton Labs UAC Replacement sends meta information about what caused the prompt, and why, to our server. This data will be used, in aggregate, to help Norton Labs build a white list that can be shipped with the UAC replacement and LiveUpdated as needed.

Q: What do you mean by "meta information"? A: The meta information contains file name and file hashes for the EXE that caused the prompt and the EXE that is to be the recipient of the elevated privileges. In addition, the meta information contains file name and file hashes for DLLs that were active in either of the two EXEs, response information (what option did the user choose, how quickly, and did they choose "do not ask me again"), and date/time info.

Also be aware that since this is a beta product, it might introduce vulnerabilities to your system. With that in mind I'd keep this tool off critical systems (or systems connected to critical systems).

Still, it shows that the UAC mechanism can be improved upon, and that a few small tweaks can make the mechanism much more user-friendly.

Thoughts?

Related

McDonald's and Chick-fil-A both have a big problem. Only one has a solution
screen-shot-2022-06-28-at-6-24-27-pm.png

McDonald's and Chick-fil-A both have a big problem. Only one has a solution

Business
On July 12, we'll see the universe like never before
51656393132-ca88bc21e3-k

On July 12, we'll see the universe like never before

Space
Chick-fil-A has a problem that's out of control (and technology can't fix it)
screen-shot-2022-03-14-at-9-38-08-am.png

Chick-fil-A has a problem that's out of control (and technology can't fix it)

Enterprise Software