androbourne
Honorable
People freaking out about UAC needs to chill.
First off if you are in a business environment. You don't use UAC to monitor app installations or changes on the OS. Real administrators used GPOs to lock down the systems.
I'm not saying it's completely useless. UAC just adds another "layer" of protection. How secure that is on the other hand, is another story. This game is about risk mitigation, any layers you add to that just helps with the mitigation.
Secondly for home use or even just general use. UAC has been hacked and bypassed so many times its a joke. If you really think you are protected with UAC on then you got another thing coming.
Same applies with local Windows Firewall. Again. while its another "layer of protection" it is not as secure as you think.
Just to give you an idea about UAC and that was just with 1 sec of googling. There are many more references for hacks and bypasses to UAC.
https://null-byte.wonderhowto.com/how-to/bypass-uac-using-dll-hijacking-0168600/
For my clients. I personally leave Windows Firewall and UAC on unless there are programs that conflict with it. Again. Mitigation is the name of the game. However, this is not the point I focus strongly on. You are much better off focusing on locking down WAN/LAN traffic and using a good firewall with good local protections, AVG, Malwarebytes, DNS protection tools. etc.... and training your clients on what and what not to open!
These tools will more often then not save your ass. Simply having UAC and Windows Firewall on isn't going to protect you from most the threats out there.
First off if you are in a business environment. You don't use UAC to monitor app installations or changes on the OS. Real administrators used GPOs to lock down the systems.
I'm not saying it's completely useless. UAC just adds another "layer" of protection. How secure that is on the other hand, is another story. This game is about risk mitigation, any layers you add to that just helps with the mitigation.
Secondly for home use or even just general use. UAC has been hacked and bypassed so many times its a joke. If you really think you are protected with UAC on then you got another thing coming.
Same applies with local Windows Firewall. Again. while its another "layer of protection" it is not as secure as you think.
Just to give you an idea about UAC and that was just with 1 sec of googling. There are many more references for hacks and bypasses to UAC.
https://null-byte.wonderhowto.com/how-to/bypass-uac-using-dll-hijacking-0168600/
For my clients. I personally leave Windows Firewall and UAC on unless there are programs that conflict with it. Again. Mitigation is the name of the game. However, this is not the point I focus strongly on. You are much better off focusing on locking down WAN/LAN traffic and using a good firewall with good local protections, AVG, Malwarebytes, DNS protection tools. etc.... and training your clients on what and what not to open!
These tools will more often then not save your ass. Simply having UAC and Windows Firewall on isn't going to protect you from most the threats out there.