SlideShare a Scribd company logo
1 of 41
Raiders of the Elevated Token: Understanding User Account Control and Session Isolation (repeats on May 19 at 1pm) Raymond P.L. Comvalius MCT, MVP Independent IT Infrastructure Specialist The Netherlands WCL310
Introducing Raymond Comvalius Independent Consultant, Trainer, and Author MVP: Expert Windows IT Pro Blog: www.xpworld.com Twitter: @xpworld Editor for bink.nu www.books4brains.com www.mvp-press.com
Agenda User Account Control What is UAC? Configuring User Account Control Integrity Levels File & Registry Virtualization How to Control Elevation Session 0 Isolation Service ID
Disabled by Default in Windows 7 and Vista The Administrator The account named ‘administrator’ An Administrator Your name with administrator privileges Protected Administrator AKA: ‘Administrator in Admin Approval Mode’ Standard User Your name without administrator privileges XP Default Windows 7 and Vista - Default Most Secure – Best Choice for IT Windows User Types
Standardizing the User Token Administrators Backup Operators Power Users Network Configuration Operators User-SID Local/Builtin Group SIDs Group Policy CreatorOwners Schema Admins Enterprise Admins Denied RODC Password Replication Group Domain Group SIDs Create a token object Act as part of the operating system  Take ownership of files and other objects  Load and unload device drivers Back up files and directories Restore files and directories Impersonate a client after authentication  Modify an object label Debug programs Mandatory Label Rights/Privileges
demo Examining the Access Token
Consent UI The ‘face’ of UAC Warns you for a User State change (AKA new token creation) Secure Desktop Screen mode like pressing Ctrl-Alt-Del Creates screenshot of the desktop (programs keep running in the background) Keeps scripts etc. from pressing keys or clicking the mouse
Configuring UAC in the Control Panel From the Control Panel Always notify Default Do not dim the display Never notify With Group Policy More granular controls
Configuring UAC in Group Policy Behaviour for Standard Users Deny Access Prompt for Credentials Admin Approval Mode for the built-in Administrator account For Administrators in Admin Approval Mode Prompt for Consent Prompt for Credentials Elevate without prompting Not same as disable UAC!
demo Configuring UAC
UIAccess Applications Software  alternatives for the mouse and keyboard For example Remote Assistance User Interface Accessibility integrity level Windows always checks signature on UIAccess Applications UIAccess applications must be installed in secure locations Optionally these applications can disable the secure desktop (used with Remote Assistance)
Remote Assistance and the Secure Desktop for non-administrative users
Integrity Levels Mandatory Access Control Levels are part of the ACLs and Tokens Lower level object has limited access to higher level objects Used to protect the OS and for Internet Explorer Protected Mode Medium (Default) System High Low IE Protected Mode Standard Users Administrators Services
Standardizing the User Token User-SID Local/Builtin Group SIDs Domain Group SIDs Integrity level: High (Elevated Token) Mandatory Label Integrity level: Medium Rights/Privileges
IE protected mode Only with User Account Control enabled iexplore.exe runs with Low Integrity Level User Interface Privilege Isolation (UIPI) Internet Explorer 9 Internet Explorer 8
IE Broker mechanism iexplore.exe Protected-mode Broker Object UI frame Command Bar Favorites Bar Medium Integrity Level Protected Mode = Off Low Integrity Level Protected Mode = On iexplore.exe (tab process n) iexplore.exe (tab process 1) Tab n Tab n Tab 1 Tab 1 Toolbar Extensions Toolbar Extensions Trusted Sites Internet/Intranet ActiveX Controls ActiveX Controls Browser Helper Objects Browser Helper Objects
demo Integrity Levels
File Virtualization File Virtualization is a compatibility feature The following folders and subfolders are virtualized: %WinDir%  rogram Files  rogram Files (x86) Virtual Store: %UserProfile%ppDataocalirtualStore Troubleshooting file virtualization Event Log: UAC-FileVirtualization Disabling file virtualization
Registry Virtualization Virtualizes most locations under HKLMoftware Keys that are not virtualized:	 HKLMoftwareicrosoftindows HKLMoftwareicrosoftindows NTbr />HKLMoftwarelasses Per user location: HKCUoftwarelassesirtualStore Flag on a registry key defines if it can be virtualized “Reg flags HKLMoftware” shows flags for HKLMoftware Registry Virtualization is NOT logged in the EventLog
demo File & Registry Virtualization
What defines a UAC state change Executables that are part of the Windows OS File Name Manifest Compatibility Settings Shims
UAC for the Windows OS Default no warning when elevating Windows OS programs Except for: CMD.exe Regedit.exe
What’s in a name? Evaluation of the file name determines need for elevation Setup Instal Update Disable this feature in Group Policy when needed
UAC and Manifests Configure the need for elevation per file: asInvoker highestAvailable requireAdministrator External or Internal Use mt.exe from the SDK to inject a manifest Use SigCheck.exe from SysInternals to view the manifest
demo File names and manifests
UAC and compatibility settings Configure the shortcut RequireAdministrator RunAsInvoker Create a Shim Need the Application Compatibility Toolkit  Compatibility Administrator Compatibility Modes Compatibility Fixes
demo Compatibility Settings
Does this look familiar?
Session 0 isolation Services run in session 0 Before Vista, session 0 belonged to the console Users logon to session 1 and higher If a service interacts in session 0 you see this message
demo Session 0 isolation
Why is this?
Services SID A service can be a security entity Windows uses TrustedInstaller  (Windows Installer Service) Only TrustedInstaller has Full Control access TrustedInstaller = “NT ServicerustedInstaller” TrustedInstaller installs: Windows Service Packs Hotfixes Operating System Upgrades Patches and installations by Windows Update
demo TrustedInstaller
Yes you can! User Account Control is no black magic UAC makes Internet Explorer a safer browser Analyze your applications Get to know the tools Whoami.exe icacls.exe SysInternals Application Compatibility Toolkit (ACT) Windows SDK
Related Content Required Slide Speakers, please list the Breakout Sessions, Interactive Discussions, Labs, Demo Stations and Certification Exam that relate to your session. Also indicate when they can find you staffing in the TLC. WCL312:  Sysinternals Primer:  Autoruns, Disk2vhd, ProcDump, BgInfo and AccessChk WCL402:  Troubleshooting Application Compatibility Issues with Windows 7 Find Me At The Springboard booth
Track Resources Don’t forget to visit the Cloud Power area within the TLC (Blue Section) to see product demos and speak with experts about the Server & Cloud Platform solutions that help drive your business forward. You can also find the latest information about our products at the following links: Cloud Power - http://www.microsoft.com/cloud/ Private Cloud - http://www.microsoft.com/privatecloud/ Windows Server - http://www.microsoft.com/windowsserver/ Windows Azure - http://www.microsoft.com/windowsazure/ Microsoft System Center - http://www.microsoft.com/systemcenter/ Microsoft Forefront - http://www.microsoft.com/forefront/
Resources Connect. Share. Discuss. http://northamerica.msteched.com Learning Sessions On-Demand & Community Microsoft Certification & Training Resources www.microsoft.com/teched www.microsoft.com/learning Resources for IT Professionals Resources for Developers http://microsoft.com/technet http://microsoft.com/msdn
Complete an evaluation on CommNet and enter to win!
Wcl310 Raiders of the Elevated Token
Wcl310 Raiders of the Elevated Token

More Related Content

What's hot

Whats New in OSSIM v2.3?
Whats New in OSSIM v2.3? Whats New in OSSIM v2.3?
Whats New in OSSIM v2.3? AlienVault
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUGDenis Gundarev
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentationpaddy249
 
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...Luis Benitez
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)ITCamp
 
Kasutajaõiguste ja seadmete haldus, monitooring ja kontroll
Kasutajaõiguste ja seadmete haldus, monitooring ja kontrollKasutajaõiguste ja seadmete haldus, monitooring ja kontroll
Kasutajaõiguste ja seadmete haldus, monitooring ja kontrollPrimend
 
cloud basics.
cloud basics.cloud basics.
cloud basics.Mercy joy
 
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAMHacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAMJerod Brennen
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application VirtualizationAmit Gatenyo
 
Desktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 PresentationDesktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 Presentationdesktopalert
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 
Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)Vinayak Hegde
 
Introduction to Android Development and Security
Introduction to Android Development and SecurityIntroduction to Android Development and Security
Introduction to Android Development and SecurityKelwin Yang
 
Bangalore IT Pro Full Day Event on Intune and SCCM
Bangalore IT Pro Full Day Event on Intune and SCCMBangalore IT Pro Full Day Event on Intune and SCCM
Bangalore IT Pro Full Day Event on Intune and SCCMAnoop Nair
 
2 modern desktop - windows deployment & servicing
2   modern desktop - windows deployment & servicing2   modern desktop - windows deployment & servicing
2 modern desktop - windows deployment & servicingAndrew Bettany
 

What's hot (16)

Whats New in OSSIM v2.3?
Whats New in OSSIM v2.3? Whats New in OSSIM v2.3?
Whats New in OSSIM v2.3?
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentation
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...
ID304 - Lotus® Connections 3.0 TDI, SSO, and User Life Cycle Management: What...
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
 
Kasutajaõiguste ja seadmete haldus, monitooring ja kontroll
Kasutajaõiguste ja seadmete haldus, monitooring ja kontrollKasutajaõiguste ja seadmete haldus, monitooring ja kontroll
Kasutajaõiguste ja seadmete haldus, monitooring ja kontroll
 
cloud basics.
cloud basics.cloud basics.
cloud basics.
 
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAMHacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAM
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 
Desktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 PresentationDesktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 Presentation
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)
 
Introduction to Android Development and Security
Introduction to Android Development and SecurityIntroduction to Android Development and Security
Introduction to Android Development and Security
 
Bangalore IT Pro Full Day Event on Intune and SCCM
Bangalore IT Pro Full Day Event on Intune and SCCMBangalore IT Pro Full Day Event on Intune and SCCM
Bangalore IT Pro Full Day Event on Intune and SCCM
 
2 modern desktop - windows deployment & servicing
2   modern desktop - windows deployment & servicing2   modern desktop - windows deployment & servicing
2 modern desktop - windows deployment & servicing
 

Similar to Wcl310 Raiders of the Elevated Token

Windows 7 Application Compatibility
Windows 7 Application CompatibilityWindows 7 Application Compatibility
Windows 7 Application Compatibilitymicham
 
3 App Compat Win7
3 App Compat Win73 App Compat Win7
3 App Compat Win7llangit
 
Addmi 02-addm overview
Addmi 02-addm overviewAddmi 02-addm overview
Addmi 02-addm overviewodanyboy
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10blusmurfydot1
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating SystemMeghaj Mallick
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administrationConcentrated Technology
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The CloudStephen Rose
 
Windows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, ToolsWindows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, ToolsRoel van Bueren
 
Addmi 03-addm prerequisites
Addmi 03-addm prerequisitesAddmi 03-addm prerequisites
Addmi 03-addm prerequisitesodanyboy
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docxeugeniadean34240
 
Lesson 2 - Understanding Operating System Configurations
Lesson 2 - Understanding Operating System ConfigurationsLesson 2 - Understanding Operating System Configurations
Lesson 2 - Understanding Operating System ConfigurationsGene Carboni
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device ControlHassaanSahloul
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsIvanti
 
Not a Security Boundary: Bypassing User Account Control
Not a Security Boundary: Bypassing User Account ControlNot a Security Boundary: Bypassing User Account Control
Not a Security Boundary: Bypassing User Account Controlenigma0x3
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 
The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!Cireson
 

Similar to Wcl310 Raiders of the Elevated Token (20)

Windows 7 Application Compatibility
Windows 7 Application CompatibilityWindows 7 Application Compatibility
Windows 7 Application Compatibility
 
3 App Compat Win7
3 App Compat Win73 App Compat Win7
3 App Compat Win7
 
Addmi 02-addm overview
Addmi 02-addm overviewAddmi 02-addm overview
Addmi 02-addm overview
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 
Best free tools for w d a
Best free tools for w d aBest free tools for w d a
Best free tools for w d a
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administration
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
 
Windows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, ToolsWindows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, Tools
 
Addmi 03-addm prerequisites
Addmi 03-addm prerequisitesAddmi 03-addm prerequisites
Addmi 03-addm prerequisites
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
 
Lesson 2 - Understanding Operating System Configurations
Lesson 2 - Understanding Operating System ConfigurationsLesson 2 - Understanding Operating System Configurations
Lesson 2 - Understanding Operating System Configurations
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
Not a Security Boundary: Bypassing User Account Control
Not a Security Boundary: Bypassing User Account ControlNot a Security Boundary: Bypassing User Account Control
Not a Security Boundary: Bypassing User Account Control
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!
 

Wcl310 Raiders of the Elevated Token

  • 1.
  • 2. Raiders of the Elevated Token: Understanding User Account Control and Session Isolation (repeats on May 19 at 1pm) Raymond P.L. Comvalius MCT, MVP Independent IT Infrastructure Specialist The Netherlands WCL310
  • 3. Introducing Raymond Comvalius Independent Consultant, Trainer, and Author MVP: Expert Windows IT Pro Blog: www.xpworld.com Twitter: @xpworld Editor for bink.nu www.books4brains.com www.mvp-press.com
  • 4. Agenda User Account Control What is UAC? Configuring User Account Control Integrity Levels File & Registry Virtualization How to Control Elevation Session 0 Isolation Service ID
  • 5. Disabled by Default in Windows 7 and Vista The Administrator The account named ‘administrator’ An Administrator Your name with administrator privileges Protected Administrator AKA: ‘Administrator in Admin Approval Mode’ Standard User Your name without administrator privileges XP Default Windows 7 and Vista - Default Most Secure – Best Choice for IT Windows User Types
  • 6. Standardizing the User Token Administrators Backup Operators Power Users Network Configuration Operators User-SID Local/Builtin Group SIDs Group Policy CreatorOwners Schema Admins Enterprise Admins Denied RODC Password Replication Group Domain Group SIDs Create a token object Act as part of the operating system Take ownership of files and other objects Load and unload device drivers Back up files and directories Restore files and directories Impersonate a client after authentication Modify an object label Debug programs Mandatory Label Rights/Privileges
  • 7. demo Examining the Access Token
  • 8. Consent UI The ‘face’ of UAC Warns you for a User State change (AKA new token creation) Secure Desktop Screen mode like pressing Ctrl-Alt-Del Creates screenshot of the desktop (programs keep running in the background) Keeps scripts etc. from pressing keys or clicking the mouse
  • 9. Configuring UAC in the Control Panel From the Control Panel Always notify Default Do not dim the display Never notify With Group Policy More granular controls
  • 10. Configuring UAC in Group Policy Behaviour for Standard Users Deny Access Prompt for Credentials Admin Approval Mode for the built-in Administrator account For Administrators in Admin Approval Mode Prompt for Consent Prompt for Credentials Elevate without prompting Not same as disable UAC!
  • 12. UIAccess Applications Software alternatives for the mouse and keyboard For example Remote Assistance User Interface Accessibility integrity level Windows always checks signature on UIAccess Applications UIAccess applications must be installed in secure locations Optionally these applications can disable the secure desktop (used with Remote Assistance)
  • 13. Remote Assistance and the Secure Desktop for non-administrative users
  • 14. Integrity Levels Mandatory Access Control Levels are part of the ACLs and Tokens Lower level object has limited access to higher level objects Used to protect the OS and for Internet Explorer Protected Mode Medium (Default) System High Low IE Protected Mode Standard Users Administrators Services
  • 15. Standardizing the User Token User-SID Local/Builtin Group SIDs Domain Group SIDs Integrity level: High (Elevated Token) Mandatory Label Integrity level: Medium Rights/Privileges
  • 16. IE protected mode Only with User Account Control enabled iexplore.exe runs with Low Integrity Level User Interface Privilege Isolation (UIPI) Internet Explorer 9 Internet Explorer 8
  • 17. IE Broker mechanism iexplore.exe Protected-mode Broker Object UI frame Command Bar Favorites Bar Medium Integrity Level Protected Mode = Off Low Integrity Level Protected Mode = On iexplore.exe (tab process n) iexplore.exe (tab process 1) Tab n Tab n Tab 1 Tab 1 Toolbar Extensions Toolbar Extensions Trusted Sites Internet/Intranet ActiveX Controls ActiveX Controls Browser Helper Objects Browser Helper Objects
  • 19. File Virtualization File Virtualization is a compatibility feature The following folders and subfolders are virtualized: %WinDir% rogram Files rogram Files (x86) Virtual Store: %UserProfile%ppDataocalirtualStore Troubleshooting file virtualization Event Log: UAC-FileVirtualization Disabling file virtualization
  • 20. Registry Virtualization Virtualizes most locations under HKLMoftware Keys that are not virtualized: HKLMoftwareicrosoftindows HKLMoftwareicrosoftindows NTbr />HKLMoftwarelasses Per user location: HKCUoftwarelassesirtualStore Flag on a registry key defines if it can be virtualized “Reg flags HKLMoftware” shows flags for HKLMoftware Registry Virtualization is NOT logged in the EventLog
  • 21. demo File & Registry Virtualization
  • 22. What defines a UAC state change Executables that are part of the Windows OS File Name Manifest Compatibility Settings Shims
  • 23. UAC for the Windows OS Default no warning when elevating Windows OS programs Except for: CMD.exe Regedit.exe
  • 24. What’s in a name? Evaluation of the file name determines need for elevation Setup Instal Update Disable this feature in Group Policy when needed
  • 25. UAC and Manifests Configure the need for elevation per file: asInvoker highestAvailable requireAdministrator External or Internal Use mt.exe from the SDK to inject a manifest Use SigCheck.exe from SysInternals to view the manifest
  • 26. demo File names and manifests
  • 27. UAC and compatibility settings Configure the shortcut RequireAdministrator RunAsInvoker Create a Shim Need the Application Compatibility Toolkit Compatibility Administrator Compatibility Modes Compatibility Fixes
  • 29. Does this look familiar?
  • 30. Session 0 isolation Services run in session 0 Before Vista, session 0 belonged to the console Users logon to session 1 and higher If a service interacts in session 0 you see this message
  • 31. demo Session 0 isolation
  • 33. Services SID A service can be a security entity Windows uses TrustedInstaller (Windows Installer Service) Only TrustedInstaller has Full Control access TrustedInstaller = “NT ServicerustedInstaller” TrustedInstaller installs: Windows Service Packs Hotfixes Operating System Upgrades Patches and installations by Windows Update
  • 35. Yes you can! User Account Control is no black magic UAC makes Internet Explorer a safer browser Analyze your applications Get to know the tools Whoami.exe icacls.exe SysInternals Application Compatibility Toolkit (ACT) Windows SDK
  • 36. Related Content Required Slide Speakers, please list the Breakout Sessions, Interactive Discussions, Labs, Demo Stations and Certification Exam that relate to your session. Also indicate when they can find you staffing in the TLC. WCL312: Sysinternals Primer: Autoruns, Disk2vhd, ProcDump, BgInfo and AccessChk WCL402: Troubleshooting Application Compatibility Issues with Windows 7 Find Me At The Springboard booth
  • 37. Track Resources Don’t forget to visit the Cloud Power area within the TLC (Blue Section) to see product demos and speak with experts about the Server & Cloud Platform solutions that help drive your business forward. You can also find the latest information about our products at the following links: Cloud Power - http://www.microsoft.com/cloud/ Private Cloud - http://www.microsoft.com/privatecloud/ Windows Server - http://www.microsoft.com/windowsserver/ Windows Azure - http://www.microsoft.com/windowsazure/ Microsoft System Center - http://www.microsoft.com/systemcenter/ Microsoft Forefront - http://www.microsoft.com/forefront/
  • 38. Resources Connect. Share. Discuss. http://northamerica.msteched.com Learning Sessions On-Demand & Community Microsoft Certification & Training Resources www.microsoft.com/teched www.microsoft.com/learning Resources for IT Professionals Resources for Developers http://microsoft.com/technet http://microsoft.com/msdn
  • 39. Complete an evaluation on CommNet and enter to win!

Editor's Notes

  1. Whoami /all
  2. Use the Control Panel to configure UACUAC Group Policy elevate without prompting
  3. Start Process Explorer and IE. Show both IE processes in process ExplorerRun Notepad with Low integrity Level: psexec –l notepad.exeShow the low integrity level directories: dir /ad *low
  4. Show file virtualization from CMD.exeShow UAC-FileVirtualization Event log
  5. Name ChangeCreate a manifestShow internal and external manifest
  6. Show internal and external manifestCreate a shim
  7. psexec –I 0 -d -s c:\\windows\\system32\\cmd.exe
  8. New for TechEd 2011, we will be working with Microsoft Tag (http://tag.microsoft.com/overview.aspx) to create unique Tags for every session at the event. Your session Tag will appear on both the room signage and at the end of your presentation. With your session Tag, attendees will be able to scan as they enter the room to retrieve session details, view speaker bios, and engage in discussions; or scan at the end of the presentation to evaluate your session and download materials. We’re excited to integrate Microsoft Tag across the My TechEd mobile experience this year.