{"id":1205,"date":"2009-02-05T21:33:02","date_gmt":"2009-02-05T20:33:02","guid":{"rendered":"http:\/\/www.itwriting.com\/blog\/1205-windows-security-and-the-uac-debate-microsoft-misses-the-point.html"},"modified":"2009-02-05T21:33:02","modified_gmt":"2009-02-05T20:33:02","slug":"windows-security-and-the-uac-debate-microsoft-misses-the-point","status":"publish","type":"post","link":"https:\/\/www.itwriting.com\/blog\/1205-windows-security-and-the-uac-debate-microsoft-misses-the-point.html","title":{"rendered":"Windows security and the UAC debate: Microsoft misses the point"},"content":{"rendered":"<p>Poor old Microsoft. When User Account Control was introduced in Windows Vista the crowd said it was too intrusive, broke applications, and not really more secure \u2013 partly because of the \u201cOK\u201d twitch reflex users may suffer from. In Windows 7 UAC is toned-down by default, and easy to control via an easy-to-find slider. Now the crowd is saying that Microsoft has gone too far, making Windows 7 less secure than Vista. The catalyst for this new wave of protest was <a href=\"http:\/\/www.istartedsomething.com\/20090130\/uac-security-flaw-windows-7-beta-proof\/\" target=\"_blank\">Long Zheng\u2019s<\/a> observation that with the new default setting a malicious script could actually turn off UAC completely without raising a prompt.<\/p>\n<p>Microsoft\u2019s Jon DeVaan <a href=\"http:\/\/blogs.msdn.com\/e7\/archive\/2009\/02\/05\/update-on-uac.aspx\" target=\"_blank\">responds<\/a> with a lengthy piece that somewhat misses the point. Zheng argues that Microsoft should make the UAC setting a special one that would:<\/p>\n<blockquote>\n<p>force a UAC prompt in <a href=\"http:\/\/blogs.msdn.com\/uac\/archive\/2006\/05\/03\/589561.aspx\">Secure Desktop mode<\/a> whenever UAC is changed, regardless of its current state<\/p>\n<\/blockquote>\n<p>DeVaan doesn\u2019t respond directly to this suggestion which seems a minor change that would barely impact usability.<\/p>\n<p>DeVaan also says:<\/p>\n<blockquote>\n<p>There has been no report of a way for malware to make it onto a PC without consent. All of the feedback so far concerns the behavior of UAC once malware has found its way onto the PC and is running.<\/p>\n<\/blockquote>\n<p>It\u2019s an important point; though I wonder how DeVaan has missed the <a href=\"http:\/\/www.theregister.co.uk\/2009\/01\/20\/win7_autoplay_weakness\/\" target=\"_blank\">problems<\/a> with <a href=\"http:\/\/www.us-cert.gov\/cas\/techalerts\/TA09-020A.html\" target=\"_blank\">autorun<\/a> that can pretty much install malware without consent.<\/p>\n<p>I am not one of those journalists whom Zheng lambasts:<\/p>\n<blockquote>\n<p>This is dedicated to every ignorant \u201ctech journalist\u201d who cried wolf about UAC in Windows Vista.<\/p>\n<\/blockquote>\n<p>Rather, I\u2019ve been an advocate for UAC since pre-release days; see for example my post <a href=\"http:\/\/www.itwriting.com\/blog\/6-if-microsoft-doesnt-use-uac-why-should-anyone-else.html\">If Microsoft doesn\u2019t use UAC, why should anyone else?<\/a> which I later discovered upset some folk. One reason is that I see its real intent, best articulated by Mark Russinovitch, <a href=\"http:\/\/technet.microsoft.com\/en-us\/magazine\/2007.06.uac.aspx\" target=\"_blank\">who writes<\/a>:<\/p>\n<blockquote>\n<p>UAC\u2019s various changes and technologies will result in a major shift in the Windows usage model. With Windows Vista, Windows users can for the first time perform most daily tasks and run most software using standard user rights, and many corporations can now deploy standard user accounts.<\/p>\n<\/blockquote>\n<p>and <a href=\"http:\/\/blogs.msdn.com\/crispincowan\/archive\/2008\/04\/28\/uac-desert-topping-or-floor-wax.aspx\" target=\"_blank\">Microsoft\u2019s Crispin Cowan<\/a>:<\/p>\n<blockquote>\n<p>Making it possible for everyone to run as Standard User is the real long term security value<\/p>\n<\/blockquote>\n<p>In other words, UAC is a transitional tool, which aims to bring Windows closer to the Unix model where users do not normally run with local admin rights and data is cleanly separated from executables.<\/p>\n<p>The real breakthrough will come when Microsoft configures Windows so that by default non-expert home and SME users end up running as standard users. Experts and system admins can make their own decisions.<\/p>\n<p>In the meantime, I don\u2019t see any harm in implementing the change Zheng is asking for, and I\u2019d like to see Microsoft fix the autoplay problem; I believe users now understand that there is a trade-off between security and convenience, though they become irritated when they get the inconvenience without the security.<\/p>\n<p><strong>Update<\/strong>: Microsoft <a href=\"http:\/\/blogs.msdn.com\/e7\/archive\/2009\/02\/05\/uac-feedback-and-follow-up.aspx\" target=\"_blank\">now says<\/a> it will fix Windows 7 so that the UAC settings are better protected.<\/p>\n<div class=\"wlWriterEditableSmartContent\" id=\"scid:0767317B-992E-4b12-91E0-4F059A8CECA8:a3eaf75d-dada-4741-bc54-3948a229727e\" style=\"padding-right: 0px; display: inline; padding-left: 0px; float: none; padding-bottom: 0px; margin: 0px; padding-top: 0px\">Technorati tags: <a href=\"http:\/\/technorati.com\/tags\/windows+7+sdk\" rel=\"tag\">windows 7 sdk<\/a>, <a href=\"http:\/\/technorati.com\/tags\/uac\" rel=\"tag\">uac<\/a>, <a href=\"http:\/\/technorati.com\/tags\/security\" rel=\"tag\">security<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Poor old Microsoft. When User Account Control was introduced in Windows Vista the crowd said it was too intrusive, broke applications, and not really more secure \u2013 partly because of the \u201cOK\u201d twitch reflex users may suffer from. In Windows 7 UAC is toned-down by default, and easy to control via an easy-to-find slider. Now &hellip; <a href=\"https:\/\/www.itwriting.com\/blog\/1205-windows-security-and-the-uac-debate-microsoft-misses-the-point.html\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Windows security and the UAC debate: Microsoft misses the point<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55,75,80,93,98],"tags":[],"class_list":["post-1205","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","category-software-development","category-vista","category-windows-7"],"_links":{"self":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/1205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/comments?post=1205"}],"version-history":[{"count":0,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/1205\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/media?parent=1205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/categories?post=1205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/tags?post=1205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}