New
#1
Interesting but his comment about Admin accounts is strange. He wrote
“Second, run Windows as a standard user, not as an administrator. (MacOS and Linux users already do this.) Running as a standard user may eliminate 90% of threats.”
Since even Admin user accounts are initially logged in using Standard level user tokens rather than Admin level user tokens, how can it make any difference? Surely his comment only applies to network admin accounts as they can routinely be set up to run with their Admin tokens.
MS removed their warnings about running in Admin accounts in June 2013.
Denis
Running as Standard user is way safer than running as admin with UAC at max.
Obviously, it is not for everyone, it would drive me nuts to use SUA, I prefer admin.
WD is actually doing pretty good, for the first time in forever.
http://chart.av-comparatives.org/chart1.php
Impressive M$ results which I believe would not have included the latest updated version as in Build 1703.
Have been using Bitdefender free which have also found impressive, and will continue to use until M$ have properly sorted out the bugs in its latest Build 1703 version of Defender Security Center.
I am a bit disappointed though, MS has promised to include ATP on all Windows version since CU.
I have noticed some ATP keys only on Pro, but not sure, if it works. I have no idea, how to test it.
Windows Defender Advanced Threat Protection for Windows 10 in the Creators Update. - YouTube
We all know this but how many do?
I don't. I know I should but I don't.
I think I might see if I can do a poll here just out of curiosity. Perhaps it would be interesting.
What would be a good list of responses?
- I normally run as Standard User
- I normally run as Admin because that was the default.
- It is my PC so I run as Admin and turned off UAC.
- It is my PC so I run as the built in Administrator as I liked XP.
- I don't understand the question
Because, by default, it is trivial to elevate a job and bypass UAC.
If you are running as a standard user you can't.
UAC Bypass Using eventvwr.exe and Registry Hijacking | enigma0x3This particular technique can be remediated or fixed by setting the UAC level to “Always Notify” or by removing the current user from the Local Administrators group.
Indeed, but I do not think, you will get many, if any, SUA users here, for the record:
For daily use, do you prefer to run as Administrator or Standard user? | Wilders Security Forums
Maybe simplify it a bit (shorten), like:
What kind of user account do you use?
- Standard User
- Default Admin
- Admin with UAC set to Never Notify
- Admin with UAC off (via GPO/registry)
- Built in Administrator
- No idea
By the way, since CU, store apps work with UAC really disabled.
Run Windows Store Apps With UAC Disabled in Windows 10 - Winaero