Udostępnij za pośrednictwem


The Windows Vista Security Model

Windows Vista introduces a new security model for user accounts. This model is designed to provide a more secure and trustworthy environment.

Like Windows XP, Windows Vista has standard user accounts and administrator accounts. However, these two account types are implemented and used in a more secure way. On Windows XP, if you ran under an administrative account, you had administrative privileges at all times. If you ran under a standard account, you did not have administrative privileges. The only way for a standard user to gain administrative privileges was to use the Run As command and select an administrator account.

On Windows XP, many users would run as administrator at all times, even when they performed routine, non-administrative tasks that did not require administrative privileges. The result was a vulnerability that could be exploited by malicious software.

The Windows Vista security model does not grant administrative privileges at all times. Even administrators run under standard privileges when they perform non-administrative tasks that do not require elevated privileges. The result is greater security because users are no longer running with unnecessary privileges that can be maliciously exploited. This feature is known as User Access Control, or UAC.

By default, Windows Vista runs in Admin Approval Mode. In Admin Approval Mode, the UAC dialog box appears every time that you try to perform an action that requires administrator privileges, whether you are running as a standard user or an administrator. If you are running as a standard user, the UAC dialog box prompts you to enter an Administrator account name and password, which are required to continue. If you are running as an administrator, the UAC dialog box asks you to confirm that you want to perform the procedure using you current administrator credentials. It also gives you the option of entering a new administrator account and password to continue using.

For more information about the Windows Vista Security Model, see:

See Also

Tasks

How to: Set Up Remote Debugging