NathanE said:
Anti-virus/malware run at administrator level so I'm not quite sure why you believe UAC hinders them from operating correctly.
First, you can operate anywhere outside system paths without UAC even blinking, which means that a program can install anything as long as it doesn't try to do it in Program Files or c:\Windows.
Second. Just to give you example of really simple 5 minute system kill - write an executable with interface that looks exactly like UAC, insisting for it to unzip to system path and bundle it with some downloadable program, screensaver, whatever, when user double clicks on their download they get a popup from original UAC asking for elevated rights, they click "Yes", a popup identical to UAC appears on the screen, but this time both "Continue" and "Cancel" buttons perform the same action - run a proggie to perform automatic confirmation to next few commands and turn UAC popups off in pretty much the same method as tweak-uac. From then on you can pretty much wipe boot files if that's your fancy and nothing will stop you, all you need is one single IL elevation just like you needed temp Joana in reception to be curious enough about "thebestgameintheoffice.exe to share company conctact list with you or send you a lot of "I love you" letters in OS's before.
"Run as" is not equivalent to anti virus or anti malware at any point or level, and the worst you can do is make your PR try and convince people it is.
Any system that relies on user clicking Yes and No buttons without understanding what they do is by nature not preventing anything. Just about any anti-virus manufacturer in the world shared their concern about Vista's UAC, and of course you can just presume they are trying to protect their share of business, but on the other hand..