Page 1 of 2 12 LastLast
Results 1 to 16 of 22

Thread: Security Benefit of Standard User Account with UAC

  1. #1
    jim
    jim is offline
    HEXUS.clueless jim's Avatar
    Join Date
    Sep 2008
    Location
    Location: Location:
    Posts
    11,457
    Thanks
    613
    Thanked
    1,645 times in 1,307 posts
    • jim's system
      • Motherboard:
      • Asus Maximus IV Gene-Z
      • CPU:
      • i5 2500K @ 4.5GHz
      • Memory:
      • 8GB Corsair Vengeance LP
      • Storage:
      • 1TB Sandisk SSD
      • Graphics card(s):
      • ASUS GTX 970
      • PSU:
      • Corsair AX650
      • Case:
      • Silverstone Fortress FT03
      • Operating System:
      • 8.1 Pro
      • Monitor(s):
      • Dell S2716DG
      • Internet:
      • 10 Mbps ADSL

    Security Benefit of Standard User Account with UAC

    When I got my Windows 7 machine, first thing I did was stick an Admin account on there with a long password, and gave myself a standard user account with a slightly simpler password.

    So whenever I want to do something that requires UAC elevation, like clicking the start button or making some toast, I have to type my Admin password into the UAC prompt. Which is a bit of a pain in the arse.

    A couple of days back, I had some buggy software that needed Admin rights, but if I ran it as an Admin it defaulted to the Admin user share and therefore wouldn't patch my specific database, so I put myself as an Admin temporarily. Forgetting to put it back, I've only just realised how much more seamless everything is. Instead of stopping every 10 minutes to type in the password, I just click continue. The prompts still appear, they just don't require the password.

    So what security benefit does the standard/admin mix setup actually provide?

  2. #2
    Splash
    Guest

    Re: Security Benefit of Standard User Account with UAC

    Would you want your standard users to be able to just click continue?

  3. #3
    jim
    jim is offline
    HEXUS.clueless jim's Avatar
    Join Date
    Sep 2008
    Location
    Location: Location:
    Posts
    11,457
    Thanks
    613
    Thanked
    1,645 times in 1,307 posts
    • jim's system
      • Motherboard:
      • Asus Maximus IV Gene-Z
      • CPU:
      • i5 2500K @ 4.5GHz
      • Memory:
      • 8GB Corsair Vengeance LP
      • Storage:
      • 1TB Sandisk SSD
      • Graphics card(s):
      • ASUS GTX 970
      • PSU:
      • Corsair AX650
      • Case:
      • Silverstone Fortress FT03
      • Operating System:
      • 8.1 Pro
      • Monitor(s):
      • Dell S2716DG
      • Internet:
      • 10 Mbps ADSL

    Re: Security Benefit of Standard User Account with UAC

    It's only me and my girlfriend, so that's not a big deal.

    If I had a kid, or let my mum onto my network , then I'd be right along with you but nobody else ever touches these machines. And they couldn't login anyway, guest account is disabled and everything is passworded.

    I just started thinking earlier on that I'm not sure what benefit it actually provides - just have this ingrained idea that it's how you're "meant" to do things. The only thing I thought of was VNC-style remote desktop hacks - presumably a passworded UAC would provide a bit more of a restriction to activities of that ilk?

  4. #4
    Splash
    Guest

    Re: Security Benefit of Standard User Account with UAC

    I guess it depends on how often you're seeing the UAC prompts. If it's so often that it's an actual nuisance I'd be tempted to question why you're seeing the prompts...

    If I'm running software that's so badly written that it requires local admin rights (and believe me, I've seen my share!) then I'd be seriously questioning how vital that software was. I can honestly say that beyond setting up and installing new stuff (which I would expect to see a UAC prompt for) I very rarely see any popups. And I'm a tinkerer, so I'd expect that I'm seeing more than Joe Public.


    EDIT: The danger with UAC, as with anything else that pops up asking for confirmation before implementing an action is that people get blasé about it. A company that I used to work with had a desktop tech who selected an OU in AD rather than a user account and pressed "delete". As soon as he saw the "are you sure" prompt he immediately clicked yes. You don't want to be that guy.

  5. #5
    Not a good person scaryjim's Avatar
    Join Date
    Jan 2009
    Location
    Gateshead
    Posts
    15,196
    Thanks
    1,231
    Thanked
    2,291 times in 1,874 posts
    • scaryjim's system
      • Motherboard:
      • Dell Inspiron
      • CPU:
      • Core i5 8250U
      • Memory:
      • 2x 4GB DDR4 2666
      • Storage:
      • 128GB M.2 SSD + 1TB HDD
      • Graphics card(s):
      • Radeon R5 230
      • PSU:
      • Battery/Dell brick
      • Case:
      • Dell Inspiron 5570
      • Operating System:
      • Windows 10
      • Monitor(s):
      • 15" 1080p laptop panel

    Re: Security Benefit of Standard User Account with UAC

    Quote Originally Posted by snootyjim View Post
    ... just have this ingrained idea that it's how you're "meant" to do things. ...
    In the bad old days, when either you were an admin and so were all your programs, or you weren't, that was the way to do things, as it prevented malicious attackers gaining admin-level privs to your system. As I understand UAC, the whole point is that even admin-level accounts run in a reduced privs mode until they need admin privs to do something, mitigating some of the dangers from malicious software.

    One option, since you're on Windows 7, is to turn the UAC prompting down a little. Vista only gave you "on" or "off" options, while 7 gives you several levels to choose from: perhaps you just have a particularly high level set?

    That said, my kids have a standard account on our HTPC, and the only time they ever come and get me to type in an admin password is when they download a new game from BigFish. And I run Server 2k8 at work and only ever see UAC prompts when I'm deliberately performing administrative tasks. So I'd echo Splash in questioning why you're seeing so many UAC prompts...

  6. #6
    jim
    jim is offline
    HEXUS.clueless jim's Avatar
    Join Date
    Sep 2008
    Location
    Location: Location:
    Posts
    11,457
    Thanks
    613
    Thanked
    1,645 times in 1,307 posts
    • jim's system
      • Motherboard:
      • Asus Maximus IV Gene-Z
      • CPU:
      • i5 2500K @ 4.5GHz
      • Memory:
      • 8GB Corsair Vengeance LP
      • Storage:
      • 1TB Sandisk SSD
      • Graphics card(s):
      • ASUS GTX 970
      • PSU:
      • Corsair AX650
      • Case:
      • Silverstone Fortress FT03
      • Operating System:
      • 8.1 Pro
      • Monitor(s):
      • Dell S2716DG
      • Internet:
      • 10 Mbps ADSL

    Re: Security Benefit of Standard User Account with UAC

    I would say that 90% of the prompts come from writing to the C:\ directory, which I seem to do fairly regularly. Usually it's for installing game mods, fan-made patches, or editing files directly within the file structure to either change graphical settings or alter the way the game works.

    And then certain programs, like I just installed MediaMonkey recently, which requires it to be started in administrator mode in order to install add-ons. I presume that's a case of C:\ access again.

    Maybe I'm overblowing a bit, but it feels like I have to do it fairly regularly.

  7. #7
    Lovely chap dangel's Avatar
    Join Date
    Aug 2005
    Location
    Cambridge, UK
    Posts
    8,398
    Thanks
    412
    Thanked
    459 times in 334 posts
    • dangel's system
      • Motherboard:
      • See My Sig
      • CPU:
      • See My Sig
      • Memory:
      • See My Sig
      • Storage:
      • See My Sig
      • Graphics card(s):
      • See My Sig
      • PSU:
      • See My Sig
      • Case:
      • See My Sig
      • Operating System:
      • Windows 10
      • Monitor(s):
      • See My Sig
      • Internet:
      • 60mbit Sky LLU

    Re: Security Benefit of Standard User Account with UAC

    Quote Originally Posted by snootyjim View Post
    I just started thinking earlier on that I'm not sure what benefit it actually provides - just have this ingrained idea that it's how you're "meant" to do things. The only thing I thought of was VNC-style remote desktop hacks - presumably a passworded UAC would provide a bit more of a restriction to activities of that ilk?
    Nope, most remote solutions allow you to configure them so you can remotely press the UAC dialogs just like any other
    Crosshair VIII Hero (WIFI), 3900x, 32GB DDR4, Many SSDs, EVGA FTW3 3090, Ethoo 719


  8. #8
    The late but legendary peterb - Onward and Upward peterb's Avatar
    Join Date
    Aug 2005
    Location
    Looking down & checking on swearing
    Posts
    19,378
    Thanks
    2,892
    Thanked
    3,403 times in 2,693 posts

    Re: Security Benefit of Standard User Account with UAC

    It is good practice to only use admin priveliges when necessary. If you download malicious software as an admin, that software potentially executes with admin priveliges - with all that that implies. But the advice given by other posters (who have more Win7 experience than I do) is good and worth looking at.

    If there are only two of you using the machine and you are prepared to accept the risks involved, then running as admin all the time is fine - but not something I would do.

    (What would be useful would be to escalate priveliges for a pre-set period of time - ideally user configuarable) so you enter the password once and then don't need to for - say- 15 minutes while you do admin type tasks)
    Last edited by peterb; 20-04-2010 at 09:51 AM.
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

  9. #9
    jim
    jim is offline
    HEXUS.clueless jim's Avatar
    Join Date
    Sep 2008
    Location
    Location: Location:
    Posts
    11,457
    Thanks
    613
    Thanked
    1,645 times in 1,307 posts
    • jim's system
      • Motherboard:
      • Asus Maximus IV Gene-Z
      • CPU:
      • i5 2500K @ 4.5GHz
      • Memory:
      • 8GB Corsair Vengeance LP
      • Storage:
      • 1TB Sandisk SSD
      • Graphics card(s):
      • ASUS GTX 970
      • PSU:
      • Corsair AX650
      • Case:
      • Silverstone Fortress FT03
      • Operating System:
      • 8.1 Pro
      • Monitor(s):
      • Dell S2716DG
      • Internet:
      • 10 Mbps ADSL

    Re: Security Benefit of Standard User Account with UAC

    Quote Originally Posted by dangel View Post
    Nope, most remote solutions allow you to configure them so you can remotely press the UAC dialogs just like any other
    Sorry, you've lost me a bit there? What I was saying is that presumably if somebody hacks into your PC and gains remote access, if they don't know the admin password they won't be able to run activities that require UAC elevation?

    Judging by what you've said, that's roughly right then - if you're logged in as an admin, somebody who's hacked in and has remote access can just click the continue button? I had in my head that UAC wasn't meant to appear remotely, but having said that, Alt-Ctrl-Del was meant to prove you were at your workstation...

    Quote Originally Posted by peterb View Post
    It is good practice to only use admin priveliges when necessary. If you download malicious software as an admin, that software potentially executes with admin priveliges - with all that that implies. But the advice given by other posters (who have more Win7 experience than I do) is good and worth looking at.
    See as far as I can gather, if an application requires admin privileges, it will ask you for those rights via UAC whether you're logged in as an admin or not. The only difference is that one requires a password, the other requires you to click continue. I might be wrong, but if that's right then it doesn't seem a particularly big difference - the remote access scenario is the only one I can think of where it makes a difference at the moment.

  10. #10
    Lovely chap dangel's Avatar
    Join Date
    Aug 2005
    Location
    Cambridge, UK
    Posts
    8,398
    Thanks
    412
    Thanked
    459 times in 334 posts
    • dangel's system
      • Motherboard:
      • See My Sig
      • CPU:
      • See My Sig
      • Memory:
      • See My Sig
      • Storage:
      • See My Sig
      • Graphics card(s):
      • See My Sig
      • PSU:
      • See My Sig
      • Case:
      • See My Sig
      • Operating System:
      • Windows 10
      • Monitor(s):
      • See My Sig
      • Internet:
      • 60mbit Sky LLU

    Re: Security Benefit of Standard User Account with UAC

    Quote Originally Posted by snootyjim View Post
    Sorry, you've lost me a bit there? What I was saying is that presumably if somebody hacks into your PC and gains remote access, if they don't know the admin password they won't be able to run activities that require UAC elevation?
    Correct, but that's assuming the physical access wouldn't allow them to deduce that anyway - better to assume your highly secure remote control solution would keep them at bay in the first place NT passwords can be hacked - I do it all the time for people who forget them..

    Quote Originally Posted by snootyjim View Post
    Judging by what you've said, that's roughly right then - if you're logged in as an admin, somebody who's hacked in and has remote access can just click the continue button? I had in my head that UAC wasn't meant to appear remotely, but having said that, Alt-Ctrl-Del was meant to prove you were at your workstation...
    If you've configured your remote control solution to allow access to the secure desktop then yes that'd be true. I have a build machine here that i do that with but it's on a ring fenced network and setup only to allow local-based connections. Nothings 100% n'all that but reasonable precautions etc. E.g. By default my build machine running UtlraVNC wouldn't let me see the Windows Logon screen - this had to be manually configured to allow it. Of course that still means a remote login has to have a domain account/pw to login/unlock the PC.
    Crosshair VIII Hero (WIFI), 3900x, 32GB DDR4, Many SSDs, EVGA FTW3 3090, Ethoo 719


  11. #11
    Late Night Ninja! CrazyMonkey's Avatar
    Join Date
    Oct 2006
    Location
    Bristol
    Posts
    1,510
    Thanks
    29
    Thanked
    44 times in 43 posts
    • CrazyMonkey's system
      • Motherboard:
      • Asus M4N98TD Evo
      • CPU:
      • Phenom II X6 1055T @ 4.1ghz
      • Memory:
      • 8GB DDR3 Dominator @ 1700mhz
      • Storage:
      • 120GB OCZ Vertex 2E - 1TB Hitatchi
      • Graphics card(s):
      • 2x 460 1GB
      • PSU:
      • 850W
      • Case:
      • Silverstone Fortress FT02R-WRI Ltd.Edition
      • Operating System:
      • Win 7, XP, Server2008 RC1, Gentoo
      • Monitor(s):
      • 24" Acer LED - 22" Belinea - 19" Samsung - 19" IIyama
      • Internet:
      • 50 MB Virgin Media Cable

    Re: Security Benefit of Standard User Account with UAC

    I immediately disable UAC, i find it more a nuisance than anything worthwhile.

    Seeing as UAC can be bypassed i believe that largely negates it's use. Most public crypters now circumvent UAC so now even old malware can not only be masked from detection but also bypass UAC.

    I believe it has its uses for kids and the like but when you are very tech savvy i dont think their is any point, atleast in my mind.

  12. #12
    Lovely chap dangel's Avatar
    Join Date
    Aug 2005
    Location
    Cambridge, UK
    Posts
    8,398
    Thanks
    412
    Thanked
    459 times in 334 posts
    • dangel's system
      • Motherboard:
      • See My Sig
      • CPU:
      • See My Sig
      • Memory:
      • See My Sig
      • Storage:
      • See My Sig
      • Graphics card(s):
      • See My Sig
      • PSU:
      • See My Sig
      • Case:
      • See My Sig
      • Operating System:
      • Windows 10
      • Monitor(s):
      • See My Sig
      • Internet:
      • 60mbit Sky LLU

    Re: Security Benefit of Standard User Account with UAC

    Quote Originally Posted by CrazyMonkey View Post
    I immediately disable UAC, i find it more a nuisance than anything worthwhile.

    Seeing as UAC can be bypassed i believe that largely negates it's use. Most public crypters now circumvent UAC so now even old malware can not only be masked from detection but also bypass UAC.

    I believe it has its uses for kids and the like but when you are very tech savvy i dont think their is any point, atleast in my mind.
    Oh, where to begin?

    Ok, first off - please fill me in on how a 'public crypter' circumvents UAC? How is this 'masking' done? How does it 'bypass' it? Really - i'm interested, and don't hold back i'm tech savvy too. We'll set the bar as a non-admin account running with UAC at default level in W7, all admin accounts are passworded.

    Disabling it arbitrarily on the basis it 'might' be circumvented smacks of the kind of thinking we get from those who think virus checkers are also a bad idea (and why not, because they 'can' be circumvented, and they 'might' not work), or worse by those who don't really understand how something works and yet disable it
    Last edited by dangel; 20-04-2010 at 04:03 PM.
    Crosshair VIII Hero (WIFI), 3900x, 32GB DDR4, Many SSDs, EVGA FTW3 3090, Ethoo 719


  13. #13
    Ex-MSFT Paul Adams's Avatar
    Join Date
    Jul 2003
    Location
    %systemroot%
    Posts
    1,926
    Thanks
    29
    Thanked
    77 times in 59 posts
    • Paul Adams's system
      • Motherboard:
      • Asus Maximus VIII
      • CPU:
      • Intel Core i7-6700K
      • Memory:
      • 16GB
      • Storage:
      • 2x250GB SSD / 500GB SSD / 2TB HDD
      • Graphics card(s):
      • nVidia GeForce GTX1080
      • Operating System:
      • Windows 10 x64 Pro
      • Monitor(s):
      • Philips 40" 4K
      • Internet:
      • 500Mbps fiber

    Re: Security Benefit of Standard User Account with UAC

    UAC is a "user awareness" feature rather than a security feature - to make you aware that a process is trying to initiate an action considered "administrative".

    Without UAC, a standard user gets access denied and an administrator gets no warning or error - so it can be argued that UAC has most benefit for admins more than standard users.

    UAC uses split tokens to allow administrators to use their standard token for normal program use, but they can launch a process elevated with one OK press to use their admin token in the same session.

    However, if UAC were to be disabled/bypassed by something then the real security is provided by not being an administrator running that "something".


    I run as a standard user with UAC left at its default level - the most frequent "unexpected" UAC prompts I get are from Steam games running for the first time that fire off DirectX installations.

    Other prompts I get tend to be predictable - installing software, changing items in the Public user profile, clicking a Control Panel icon with the yellow & blue shield, launching FRAPS or Asus notification area tools, etc.


    The only environments I tend to disable UAC and be logged in as an admin are isolated virtual machine environments I set up for testing, setting up repros & debugging - I would never recommend this for personal or regular use in a corporate environment.
    Last edited by Paul Adams; 21-04-2010 at 06:09 AM.
    ~ I have CDO. It's like OCD except the letters are in alphabetical order, as they should be. ~
    PC: Win10 x64 | Asus Maximus VIII | Core i7-6700K | 16GB DDR3 | 2x250GB SSD | 500GB SSD | 2TB SATA-300 | GeForce GTX1080
    Camera: Canon 60D | Sigma 10-20/4.0-5.6 | Canon 100/2.8 | Tamron 18-270/3.5-6.3

  14. #14
    Senior Member
    Join Date
    Mar 2005
    Posts
    4,935
    Thanks
    171
    Thanked
    384 times in 311 posts
    • badass's system
      • Motherboard:
      • ASUS P8Z77-m pro
      • CPU:
      • Core i5 3570K
      • Memory:
      • 32GB
      • Storage:
      • 1TB Samsung 850 EVO, 2TB WD Green
      • Graphics card(s):
      • Radeon RX 580
      • PSU:
      • Corsair HX520W
      • Case:
      • Silverstone SG02-F
      • Operating System:
      • Windows 10 X64
      • Monitor(s):
      • Del U2311, LG226WTQ
      • Internet:
      • 80/20 FTTC

    Re: Security Benefit of Standard User Account with UAC

    Quote Originally Posted by dangel View Post
    passwords can be hacked - I do it all the time for people who forget them..
    If the NTLM hashes are created, you can rip through the passwords at a pretty high rate due to the way the hashes are created. Have you tried password cracking with the NTLM hashes disabled?
    Just curious as I'd imagine it's still pretty quick for simple passwords
    "In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."

  15. #15
    Late Night Ninja! CrazyMonkey's Avatar
    Join Date
    Oct 2006
    Location
    Bristol
    Posts
    1,510
    Thanks
    29
    Thanked
    44 times in 43 posts
    • CrazyMonkey's system
      • Motherboard:
      • Asus M4N98TD Evo
      • CPU:
      • Phenom II X6 1055T @ 4.1ghz
      • Memory:
      • 8GB DDR3 Dominator @ 1700mhz
      • Storage:
      • 120GB OCZ Vertex 2E - 1TB Hitatchi
      • Graphics card(s):
      • 2x 460 1GB
      • PSU:
      • 850W
      • Case:
      • Silverstone Fortress FT02R-WRI Ltd.Edition
      • Operating System:
      • Win 7, XP, Server2008 RC1, Gentoo
      • Monitor(s):
      • 24" Acer LED - 22" Belinea - 19" Samsung - 19" IIyama
      • Internet:
      • 50 MB Virgin Media Cable

    Re: Security Benefit of Standard User Account with UAC

    Quote Originally Posted by dangel View Post
    Oh, where to begin?

    Ok, first off - please fill me in on how a 'public crypter' circumvents UAC? How is this 'masking' done? How does it 'bypass' it? Really - i'm interested, and don't hold back i'm tech savvy too. We'll set the bar as a non-admin account running with UAC at default level in W7, all admin accounts are passworded.
    Perhaps you forget that nothing is secure, nothing foolproof - UAC & DEP obey these rules.

    First off, do you know what i mean by a crypter? If you did you should know what i mean by masking against detection, essentially i just mean bypassing detection, becoming undetected as ultimately the malware underneath is the same in the operation it caries out (obfuscating the original program by means of encryption, entry point alteration, changing signature detected bytes are a few examples of avoiding detection). However this is a different discussion to the topic at hand.

    Check the forum in my sig (registration may have gone private), some public crypters there offer UAC circumvention and most if not all private ones have it as standard.

    For instance on 32Bit system you could use a RunPE (like t0fx's on the forum) and inject your file into a system process like "svchost.exe", however these RunPE's do not work on 64bit.

    I know back in vista you could drop your file to user/temp, write that to HKCU startup (Software\Microsoft\Windows\CurrentVersion\Run\) and then create/call the key via RegWrite.

    The easiest way would be to use something that already has the highest level of execution privileges (svchost) for example.

    Bypassing is a bit of a lose term here, more like dodging it but still.

    I found a VB6 routine that successfully bypasses it, it's by "smokin" created recently if you wish to compile and test it yourself. Im not sure exactly how it does it as there are too many encryption routines in it. I wont post the source directly here, but if u wish to have it i can pm you it. Posting malware is surely prohibited.

    So before you insinuate that i 'dont really understand', simply googling reveals discussions on various techniques.

    A quick google links to results of a 10 sample malware test (primarily against the ability to run under windows 7) have a read if you like. http://blogs.zdnet.com/security/?p=4...=trunk;content

    Oh and i dont believe virus scanners are a bad idea, (hell im hoping to work for an anti-virus company in the near future) but i do believe they should not by any means whatsoever be relied upon.

    I have more information on the subject and malware in general, feel free to pm.
    Last edited by CrazyMonkey; 21-04-2010 at 01:13 AM.

  16. #16
    Splash
    Guest

    Re: Security Benefit of Standard User Account with UAC

    I hate to use analogies, but this calls for one I'm afraid.

    So - Fort Knox is pretty secure, right? In that case it's probably not worth them employing a guy at the gates to check ID as people come and go, as it's simply more hassle for the genuine visitors and he could probably be bought by a criminal with the right connections.

    UAC is a small part of a layered security model - each layer no matter how thin makes it more difficult for the system in question to be compromised. Given how rarely UAC fires when people are following guidelines (not writing to system directories, not running software that requires admin privileges etc) I think it's well worth having turned on and anyone on respected techical forums such as these where Joe Public often looks for advice who is advocating removing a layer needs to seriously think about their audience.

    For sure, debate it's merits but a blanket "just switch it of, it's rubbish" is dangerous in my opinion.

Page 1 of 2 12 LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Windows - a brief guide inside
    By Paul Adams in forum Software
    Replies: 31
    Last Post: 23-06-2007, 03:14 PM
  2. Firefox suffers first 'extremely critical' security hole
    By XA04 in forum General Discussion
    Replies: 18
    Last Post: 12-05-2005, 12:13 PM
  3. Have you done all of your windows updates ?
    By Moby-Dick in forum General Discussion
    Replies: 33
    Last Post: 05-05-2004, 01:23 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •