2 - Local Policies#
2.2#
2.2#
To establish the recommended configuration via GP, set the following UI path to No One
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Access Credential Manager as a trusted caller
2.2.2#
To establish the recommended configuration via GP, set the following UI path to Administrators, Remote Desktop Users
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Access this computer from the network
2.2.3#
To establish the recommended configuration via GP, set the following UI path to No One
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Act as part of the operating system
2.2.4#
To establish the recommended configuration via GP, set the following UI path to Administrators, LOCAL SERVICE, NETWORK SERVICE
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Adjust memory quotas for a process
2.2.5#
To establish the recommended configuration via GP, set the following UI path to Administrators, Users
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Allow log on locally
2.2.6#
To establish the recommended configuration via GP, set the following UI path to Administrators, Remote Desktop Users
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Allow log on through Remote Desktop Services
2.2.7#
To establish the recommended configuration via GP, set the following UI path to Administrators
. Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Back up files and directories
2.2.8#
To establish the recommended configuration via GP, set the following UI path to Administrators, LOCAL SERVICE
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Change the system time
2.2.9#
To establish the recommended configuration via GP, set the following UI path to Administrators, LOCAL SERVICE, Users
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Change the time zone
2.2.10#
To establish the recommended configuration via GP, set the following UI path to Administrators
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create a pagefile
2.2.11#
To establish the recommended configuration via GP, set the following UI path to No One
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create a token object
2.2.12#
To establish the recommended configuration via GP, set the following UI path to Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create global objects
2.2.13#
To establish the recommended configuration via GP, set the following UI path to No One
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create permanent shared objects
2.2.14#
To implement the recommended configuration state, configure the following UI path: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create symbolic links
2.2.15#
To establish the recommended configuration via GP, set the following UI path to Administrators
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Debug programs
2.2.16#
To establish the recommended configuration via GP, set the following UI path to include Guests, Local account
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny access to this computer from the network
2.2.17#
To establish the recommended configuration via GP, set the following UI path to include Guests
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on as a batch job
2.2.18#
To establish the recommended configuration via GP, set the following UI path to include Guests
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on as a service
2.2.19#
To establish the recommended configuration via GP, set the following UI path to include Guests
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on locally
2.2.20#
To establish the recommended configuration via GP, set the following UI path to include Guests, Local account
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on through Remote Desktop Services
2.2.21#
To establish the recommended configuration via GP, set the following UI path to No One
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Enable computer and user accounts to be trusted for delegation
2.2.22#
To establish the recommended configuration via GP, set the following UI path to Administrators
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Force shutdown from a remote system
2.2.23#
To establish the recommended configuration via GP, set the following UI path to LOCAL SERVICE, NETWORK SERVICE
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Generate security audits
2.2.24#
To establish the recommended configuration via GP, set the following UI path to Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Impersonate a client after authentication
2.2.25#
To establish the recommended configuration via GP, set the following UI path to Administrators, Window Manager\Window Manager Group
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Increase scheduling priority
2.2.26#
To establish the recommended configuration via GP, set the following UI path to Administrators
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Load and unload device drivers
2.2.27#
To establish the recommended configuration via GP, set the following UI path to No One
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Lock pages in memory
2.2.28#
To establish the recommended configuration via GP, set the following UI path to Administrators
: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Log on as a batch job
2.2.29#
To establish the recommended configuration via GP, set the following UI path: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Log on as a service
2.2.30#
To establish the recommended configuration via GP, set the following UI path to Administrators
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Manage auditing and security log
2.2.31#
To establish the recommended configuration via GP, set the following UI path to No One
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Modify an object label
2.2.32#
To establish the recommended configuration via GP, set the following UI path to Administrators
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Modify firmware environment values
2.2.33#
To establish the recommended configuration via GP, set the following UI path to Administrators
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Perform volume maintenance tasks
2.2.34#
To establish the recommended configuration via GP, set the following UI path to Administrators
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Profile single process
2.2.35#
To establish the recommended configuration via GP, set the following UI path to Administrators, NT SERVICE\WdiServiceHost
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Profile system performance
2.2.36#
To establish the recommended configuration via GP, set the following UI path to LOCAL SERVICE, NETWORK SERVICE
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Replace a process level token
2.2.37#
To establish the recommended configuration via GP, set the following UI path to Administrators
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Restore files and directories
2.2.38#
To establish the recommended configuration via GP, set the following UI path to Administrators, Users
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Shut down the system
2.2.39#
To establish the recommended configuration via GP, set the following UI path to Administrators
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Take ownership of files or other objects
2.3#
2.3#
To establish the recommended configuration via GP, set the following UI path to Disabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Administrator account status
2.3.1.2#
To establish the recommended configuration via GP, set the following UI path to Users can't add or log on with Microsoft accounts
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Block Microsoft accounts
2.3.1.3#
To establish the recommended configuration via GP, set the following UI path to Disabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Guest account status
2.3.1.4#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Limit local account use of blank passwords to console logon only
2.3.1.5#
To establish the recommended configuration via GP, configure the following UI path: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Rename administrator account
2.3.1.6#
To establish the recommended configuration via GP, configure the following UI path: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Rename guest account
2.3.2#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings
2.3.2.2#
To establish the recommended configuration via GP, set the following UI path to Disabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Audit: Shut down system immediately if unable to log security audits
2.3.4#
To establish the recommended configuration via GP, set the following UI path to Administrators and Interactive Users
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Devices: Allowed to format and eject removable media
2.3.4.2#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Devices: Prevent users from installing printer drivers
2.3.6#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Digitally encrypt or sign secure channel data (always)
2.3.6.2#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Digitally encrypt secure channel data (when possible)
2.3.6.3#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Digitally sign secure channel data (when possible)
2.3.6.4#
To establish the recommended configuration via GP, set the following UI path to Disabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Disable machine account password changes
2.3.6.5#
To establish the recommended configuration via GP, set the following UI path to 30 or fewer days, but not 0
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Maximum machine account password age
2.3.6.6#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Require strong (Windows 2000 or later) session key
2.3.7#
To establish the recommended configuration via GP, set the following UI path to Disabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Do not require CTRL+ALT+DEL
2.3.7.2#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Don't display last signed-in
Note: In older versions of Microsoft Windows, this setting was named Interactive logon: Do not display last user name, but it was renamed starting with Windows 10 Release 1703.
2.3.7.3#
To establish the recommended configuration via GP, set the following UI path to 10 or fewer invalid logon attempts, but not 0
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Machine account lockout threshold
2.3.7.4#
To establish the recommended configuration via GP, set the following UI path to 900 or fewer seconds, but not 0
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Machine inactivity limit
2.3.7.5#
To establish the recommended configuration via GP, configure the following UI path to a value that is consistent with the security and operational requirements of your organization: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Message text for users attempting to log on
2.3.7.6#
To establish the recommended configuration via GP, configure the following UI path to a value that is consistent with the security and operational requirements of your organization: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Message title for users attempting to log on
2.3.7.7#
To establish the recommended configuration via GP, set the following UI path to 4 or fewer logon(s)
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Number of previous logons to cache (in case domain controller is not available)
2.3.7.8#
To establish the recommended configuration via GP, set the following UI path to a value between 5 and 14 days
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Prompt user to change password before expiration
2.3.7.9#
To establish the recommended configuration via GP, set the following UI path to Lock Workstation
(or, if applicable for your environment, Force Logoff
or Disconnect if a Remote Desktop Services session
): Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Smart card removal behavior
2.3.8#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network client: Digitally sign communications (always)
2.3.8.2#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network client: Digitally sign communications (if server agrees)
2.3.8.3#
To establish the recommended configuration via GP, set the following UI path to Disabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network client: Send unencrypted password to third-party SMB servers
2.3.9#
To establish the recommended configuration via GP, set the following UI path to 15 or fewer minute(s)
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network server: Amount of idle time required before suspending session
2.3.9.2#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network server: Digitally sign communications (always)
2.3.9.3#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network server: Digitally sign communications (if client agrees)
2.3.9.4#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network server: Disconnect clients when logon hours expire
2.3.9.5#
To establish the recommended configuration via GP, set the following UI path to Accept if provided by client
(configuring to Required from client
also conforms to the benchmark): Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network server: Server SPN target name validation level
2.3.10#
To establish the recommended configuration via GP, set the following UI path to Disabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Allow anonymous SID/Name translation
2.3.10.2#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Do not allow anonymous enumeration of SAM accounts
2.3.10.3#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Do not allow anonymous enumeration of SAM accounts and shares
2.3.10.4#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Do not allow storage of passwords and credentials for network authentication
2.3.10.5#
To establish the recommended configuration via GP, set the following UI path to Disabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Let Everyone permissions apply to anonymous users
2.3.10.6#
To establish the recommended configuration via GP, set the following UI path to <blank>
(i.e. None): Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Named Pipes that can be accessed anonymously
2.3.10.7#
To establish the recommended configuration via GP, set the following UI path to: System\CurrentControlSet\Control\ProductOptions System\CurrentControlSet\Control\Server Applications SOFTWARE\Microsoft\Windows NT\CurrentVersion
Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Remotely accessible registry paths
2.3.10.8#
To establish the recommended configuration via GP, set the following UI path to: System\CurrentControlSet\Control\Print\Printers System\CurrentControlSet\Services\Eventlog SOFTWARE\Microsoft\OLAP Server SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows System\CurrentControlSet\Control\ContentIndex System\CurrentControlSet\Control\Terminal Server System\CurrentControlSet\Control\Terminal Server\UserConfig System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib System\CurrentControlSet\Services\SysmonLog
Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Remotely accessible registry paths and sub-paths
2.3.10.9#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Restrict anonymous access to Named Pipes and Shares
2.3.10.10#
To establish the recommended configuration via GP, set the following UI path to Administrators: Remote Access: Allow
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Restrict clients allowed to make remote calls to SAM
2.3.10.11#
To establish the recommended configuration via GP, set the following UI path to <blank>
(i.e. None): Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Shares that can be accessed anonymously
2.3.10.12#
To establish the recommended configuration via GP, set the following UI path to Classic - local users authenticate as themselves
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Sharing and security model for local accounts
2.3.11#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Allow Local System to use computer identity for NTLM
2.3.11.2#
To establish the recommended configuration via GP, set the following UI path to Disabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Allow LocalSystem NULL session fallback
2.3.11.3#
To establish the recommended configuration via GP, set the following UI path to Disabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network Security: Allow PKU2U authentication requests to this computer to use online identities
2.3.11.4#
To establish the recommended configuration via GP, set the following UI path to AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Configure encryption types allowed for Kerberos
2.3.11.5#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Do not store LAN Manager hash value on next password change
2.3.11.6#
To establish the recommended configuration via GP, set the following UI path to Enabled
. Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Force logoff when logon hours expire
2.3.11.7#
To establish the recommended configuration via GP, set the following UI path to: Send NTLMv2 response only. Refuse LM & NTLM
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network security: LAN Manager authentication level
2.3.11.8#
To establish the recommended configuration via GP, set the following UI path to Negotiate signing
(configuring to Require signing
also conforms to the benchmark): Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network security: LDAP client signing requirements
2.3.11.9#
To establish the recommended configuration via GP, set the following UI path to Require NTLMv2 session security, Require 128-bit encryption
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
2.3.11.10#
To establish the recommended configuration via GP, set the following UI path to Require NTLMv2 session security, Require 128-bit encryption
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
2.3.14#
To establish the recommended configuration via GP, set the following UI path to User is prompted when the key is first used
(configuring to User must enter a password each time they use a key
also conforms to the benchmark): Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\System cryptography: Force strong key protection for user keys stored on the computer
2.3.15#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\System objects: Require case insensitivity for non-Windows subsystems
2.3.15.2#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)
2.3.17#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Admin Approval Mode for the Built-in Administrator account
2.3.17.2#
To establish the recommended configuration via GP, set the following UI path to Prompt for consent on the secure desktop
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
2.3.17.3#
To establish the recommended configuration via GP, set the following UI path to Automatically deny elevation requests:
Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Behavior of the elevation prompt for standard users
2.3.17.4#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Detect application installations and prompt for elevation
2.3.17.5#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Only elevate UIAccess applications that are installed in secure locations
2.3.17.6#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Run all administrators in Admin Approval Mode
2.3.17.7#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Switch to the secure desktop when prompting for elevation
2.3.17.8#
To establish the recommended configuration via GP, set the following UI path to Enabled
: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Virtualize file and registry write failures to per-user locations