Well, that's simply not true. Whilst it's possible that some inept poor programming from a large software providers Work Experience initiative might simply have fudged desktop UAC interaction (I'm looking at you MSI), it's perfectly possible to have software work without causing UAC to intervene. Whether you'd want to or not is dependent on your risk appetite. Do you trust what the software is doing, are you limiting it to run, rather than patch / update, etc.
OP, you can use Application Control Policies on your system (running Pro or higher) or craftily set the service as an allowed log on type. The service spawns the executable administratively so would bypass UAC.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.