Running as a standard user is just too annoying

Soldato
Joined
18 Oct 2002
Posts
4,773
Location
Kent
I ran Vista for about a year as an administrator for simple reason that i only created one user when i installed it and didn't know any better. After installing Windows7 i started reading a bunch of threads on the forums, particularly ones by firewizard. He seems adamant that you should always run as a standard user with UAC enabled for security reasons.

I decided to do just that but i'm finding it unbearably annoying having to type in my admin password when i do just about anything. I also need UAC disabled as two of my most frequently used program require it to be off in order to run properly.

My question is basically this; is there a way to make running as standard user less irritating and if i do decided to use an admin account with UAC disabled just how wide open to attack am I?

Thanks.
 
Ultimately if you're a responisble user, don't let idiots on your PC and have AV with Malware/spyware protection on you're unlilkely to have any problem especially if you're router has NAT.

Problems tend to be people related rather than PC once you've got these in place. Just run the occassional sweep with AV and a malware/spyware detection program like malwarebytes and Adaware and you'll most likely be fine.

I had UAC off on my Vista laptop since release, had the same with my Server2008 install for over a year. Never had a problem.

If you use torrent/dodgy sites, I'd recommend doing so only under an account with UAC turned on though, just my paranoia though!
 
I always run as admin with all the irritating security prompts including UAC switched off. Can't be bothered with Windows nannying me about running perfectly legitimate programs.
 
You can turn down the notifications in the User Account section. I've just turned them right down so I don't get any notifications.
 
Sigh. :(

It appears I will need to re-write most of this post again. As I was adding some additional information, I lost my Internet connection and as I reconnected and refreshed the page, the vast majority of my post had disappeared. I'm not quite sure why that has happened. I must have accidentally removed some of the information I had written along with saving my post.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

I ran Vista for about a year as an administrator for simple reason that i only created one user when i installed it and didn't know any better. After installing Windows7 i started reading a bunch of threads on the forums, particularly ones by firewizard. He seems adamant that you should always run as a standard user with UAC enabled for security reasons.

The only way to be truly secure is to run as a standard user but then switch to a dedicated administrator account for any administrative operations. However, the vast majority of users would consider this a major inconvenience. The first time they switch to an administrator account because they need to do something which requires administrator rights, they simply wouldn't want to switch back and they would just end up staying in the administrator account. The elevation dialogues feature of User Account Control is there to counter this problem.

When the user is running in a standard user account, whenever they need to do an administrative based operation, they will receive an Over The Shoulder (OTS) elevation dialogue which will ask them to enter the credentials of the administrator account to continue with that given administrative task. Apart from being able to conveniently access administrator rights from a standard user account due to the User Account Control elevation dialogues, standard users are roughly the same in Windows Vista and Windows 7 compared to previous version of Windows.

What has changed though is the administrators account. The default administrator account and any administrator accounts created thereafter from the User Accounts section in the Control Panel is a Protected Administrator (PA). When the user logs into a Protected Administrator account, they are given two identities, one with standard user rights and the other with administrator rights. The standard user identity is used by default. When the user needs to do something which requires administrator rights, they will receive the consent elevation dialogue which they would simply need to accept to carry out the administrative operation.

Since the default account in Windows Vista and Windows 7 is a Protected Administrator, Independent Software Vendors (ISVs) must now assume that everyone will be running with standard user rights. This then forces them to start writing their applications so they work correctly in a standard user environment:

Mark Russinovich said:
The PA account was designed to encourage developers to write their applications to require only standard user rights while enabling as many applications that share state between administrative components and standard user components to continue working. By default, the first account on a Windows Vista or Windows 7 system, which was a full administrator account on previous versions of Windows, is a PA account. Any programs a PA user executes are run with standard-user rights unless the user explicitly elevates the application, which grants the application administrative rights. Elevation prompts are triggered by user activities such as installing applications and changing system settings. These elevation prompts are the most visible UAC technology, manifesting as a switch to a screen with an allow/cancel dialog and grayed snapshot of the desktop as the background.

*Snip*

When UAC is enabled, all user accounts—including administrative accounts—run with standard user rights. This means that application developers must consider the fact that their software won't have administrative rights by default. This should remind them to design their application to work with standard user rights. If the application or parts of its functionality require administrative rights, it can leverage the elevation mechanism to enable the user to unlock that functionality. Generally, application developers need to make only minor changes to their applications to work well with standard user rights. As the E7 blog post on UAC shows, UAC is successfully changing the way developers write software.

Inside Windows 7 User Account Control

Whilst running in a Protected Administrator account is securer than running as a full blown administrator, the security benefits are simply a side effect of its primary purpose which has been stated above and it's still recommended to run in a standard user account.

When you elevate, either from a Protected Administrator or from a standard user account, you are opening up a security hole. Malware which has infected your account could then be able to potentially gain administrator rights due to the opportunities which are presented:

Mark Russinovich said:
Elevations and Security Boundaries:

It’s important to be aware that UAC elevations are conveniences and not security boundaries. A security boundary requires that security policy dictates what can pass through the boundary. User accounts are an example of a security boundary in Windows because one user can’t access the data belonging to another user without having that user’s permission.

Because elevations aren’t security boundaries, there’s no guarantee that malware running on a system with standard user rights can’t compromise an elevated process to gain administrative rights. For example, elevation dialogs only identify the executable that will be elevated; they say nothing about what it will do when it executes. The executable will process command-line arguments, load DLLs, open data files, and communicate with other processes. Any of those operations could conceivably allow malware to compromise the elevated process and thus gain administrative rights.

Inside Windows Vista User Account Control

This is why the elevations are not for security, but convenience. Without being able to conveniently access administrator rights, no one would run as a standard user or the best part of one and Independent Software Developers would continue to write their applications assuming everyone has administrator rights:
 
Continuation......

Running as an administrator with User Account Control enabled is still better than running as an administrator with User Account Control disabled obviously. However, it just isn't as secure as running as a true standard user.

The final step down would be to run in Administrator Approval Mode as above but set the User Account Control setting too - Notify me only when programs try to make changes to my computer (do not dim my desktop):

  • Don't notify me when I make changes to Windows settings
This has the same effect as the User Account Control setting directly above. However, for any Windows executables which are not automatically elevated and any third-party applications that request administrator rights, the consent elevation dialogue will not be on the secure desktop.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

I decided to do just that but i'm finding it unbearably annoying having to type in my admin password when i do just about anything. I also need UAC disabled as two of my most frequently used program require it to be off in order to run properly.

May I ask which programs won't function correctly with User Account Control enabled?

My question is basically this; is there a way to make running as standard user less irritating

If you are finding running in a standard user account too inconvenient, then run in a Protected Administrator account and run in Administrator Approval Mode. However, this isn't as secure as running in a standard user account obviously but certainly better than running as an administrator with User Account Control disabled.

and if i do decided to use an admin account with UAC disabled just how wide open to attack am I?

Least Privilege Access is a very important security concept. You should only give software the minimum amount of rights they need to be able to do the job they were designed for correctly. Processes running at a lower privileged level can cause a lot less damage if they are either compromised or buggy than if they were running at a higher privileged level. By giving software more privileges than they need, you are opening up an unnecessary security hole. I have written a post here in the recent Windows 7 UAC thread which you may be interested in. I have linked to a few articles in that post too which are worth reading.

I always run as admin with all the irritating security prompts including UAC switched off. Can't be bothered with Windows nannying me about running perfectly legitimate programs.

It doesn't matter if the applications you run are legitimate or not, if they have been written to request administrator rights when they are run, then you're going to receive a User Account Control elevation dialogue. If an application is requesting administrator rights when there is absolutely no reason for that particular application to do so and will run correctly with standard user rights, you will need to go to the developer of that particular application and say to them to start writing their applications correctly.
 
I too have kept them on in W7, it really doesn't apply too much in everyday use to really care about them too much.

A little piece of mind, having said that, the one time I need to keep clicking YES and/or entering a password will be the day I disable it all :D
 
Having come from XP using a Standard User account at home and work, I find doing the same in W7 is a breeze, not very many UAC prompts and few apps that require to be run as an Admin.
At the end of the day it is down to user preferance or lazyness, but Im with Firewizard, Standard users accounts for day to day running :)
 
My Win7 Pro work laptop has a fingerprint reader. I set up the local administrator account with my fingerprint and now, whenever I need to elevate (which is not that often really) I just swipe my finger at the UAC prompt - don't even have to click OK as it continues once it has authenticated.

It's quicker than typing in my long-ish password so if you have the hardware - do it!
 
The problem is the OP is running as a standard user not an admin, so if he has to elevate via UAC he has to input a password. For myself I run as an admin user with UAC enabled so I simply press Yes to the elevation prompt when it appears :)

It doesn't bother me too much right now really, so I leave it on.
 
Since I got my new PC last December with Vista x64 as the operating system, the first thing I did was enable the hidden 'true' administrator account in order to bypass the annoying UAC prompts that seemed to ask for confirmation on everything I did twice on my old PC (which had XP and Vista dual-booting). I've kept this same account when I upgraded to 7 Home Premium last week.

My PC is connected to a router with a firewall and the Windows Firewall is also enabled. I also have anti-malware/spyware software installed as well as Microsoft's own Security Essentials and I don't typically visit 'dodgy' websites anyway so I'm very unlikely to pick up viruses or trojans. That's not to say I haven't had any but they've been few and far between and always picked up by the software.

I'm the only user on my PC too. Windows XP doesn't have UAC and it is the most widely used Microsoft operating system so while it is nice to have an extra level of security I don't believe it is entirely necessary as long as you're sensible and take precautions as I have.
 
I always run as admin with all the irritating security prompts including UAC switched off. Can't be bothered with Windows nannying me about running perfectly legitimate programs.

How do I switch that off? It does my head in
 
Windows XP doesn't have UAC and it is the most widely used Microsoft operating system so while it is nice to have an extra level of security I don't believe it is entirely necessary as long as you're sensible and take precautions as I have.

Windows XP has suffered on the security front because many people run as administrator. Microsoft knew this and is why they went to so much effort to implement the new security model, and if you look at the malware stats it seems to have worked.

It shouldn't be looked at as an "extra" level of security - it is the most basic and common across all operating systems.
 
it's microsoft's fault way for making us the way we are. :p

it's going to take awhile to wean us off our admin accounts. having said that, i'm using UAC and not using the "real" admin account in 7. that's a small step in the right direction.
 
Back
Top Bottom