Nuisance or Necessity? UAC and VMS

Author: Sarit Williams, Published on May 27, 2013

User Access Control (aka UAC) is Windows' attempt at thinking for and proactively protecting users. However, this can become a nuisance and a time hog when this feature works against you, especially when installing VMS software. Network administrators and IT departments are notorious for locking down an environment making it difficult to do your job. In this note, we explain why UAC is implemented, how it impacts VMS and what to do about it.

Background of UAC

**** ****** ********* ** ***** ******** ******* ********* ** * ****** ** Windows ********* ******* ** ****** ******* **** **; ** *** initially ********** ** ***** (*** *** **** **** ** ******?) and *** ** ***** ** ******* *, *, *** ****** 2008. **** ******* ** ****** ** ** ******* *** ******** non-administrators **** ********** *** ******** ** ****** *** ******* ** the ** **** *** ********** *** ********. ** ** *******, UAC ***** ** *********** *** ******* ************** ** **** **** their ******* *** ****** ****** *** *** ********** *****, ******* messenger, ***.

UAC's ****** ** *****

*** *** “*******” ** *** ********* ****** ***** ** ****** an **/*** ****** **** ****** ** ******** ******* ** ***********. **** ** ********* ******* ****, ** ****** ************ ******* ***** ********* ** ***** **** ***** ** *** registry ** *** *********** ********* ******** ** **** ** ******* as ** ********* ******* ***** * ******.

**** ********** *** ********, *** ******** ****** ** **********, ****** the *** ****** *** ********* ***** ************* ***** ** ***** installer. *** ****** ** **** *** ******** ****** ******* ***** user ******** ******** (**** ** ****** ********, **** *****, **** Interface **************, ***) ** *** ******** ** *** *******.

**** ** *** ** ******** ******** ** *** *** ****** the ************ ** *** *** ******** ******. ** ***** *** software ******** *** *** *********** ***** ** ** ***** ** the ******** ****** ************ *** **** **** **** *********** ** do ****. *** ****** ****.

*******, **** ******** **** ** *******, **** ** ******** ***** *** motion ***** *** ****** ** *** ********. **** **** *** require ***, *** **** **** ******** ************* ***** *********** (********* provided ** **** ** *** *****).

*** *** ******

** *** *** ******** ************ ** ********* ******* ******* *** UAC ******* ***-** ******** ****** *** ************ ******* **** ******. Messages **** “****** ** ***** *****.***” ** ********* ******* ** an ********** *** ********* ** *** **** ** ***** *** files ******. ************, *** ***-*** **** ***** *** **** *** ability **  ****, ******, ** *** *****, *** **** ** these ******* *** ***********. **** ****** ****** *** ***** ** skip ********* ***** **** ***** ********* ******* *** ******** ** not ********.

*** *** ******

** ****** ********, ** *** **** *** **** **** **** time ***** *** ****** ** ******** ***** ***** ******** (*** example, * **** ** *******) *** *******. **** ** ******* indication **** *** ** ** ** *** **** ****** ** to *** ******* ** *** ** ************* ******* ** ***** for *** **** ** ******* ** ** ***** ** ******** access ** ****** *** ********.

What ** **

***** ********* *** ******* **** *** *******:

  • *** *** ******* *************: **** **** **** ** ***** ***** password **** **** *** **** ** ******* *** ********* *** software.
  • *** **** ******* ************* ** **** *** *** ** ****** give *** ** ************* ***** ****** ** ***** ***** *** can **** *** *** ********.

****'* *** ** **** *** ***:

  • *** ** ** * ***** ************* ****.
  • ** *** ****** *****, **** ***.
  • ****** *** “****** **** ******* ******* ********”
  • ***** *** ****** **** ****** ****** ** ***** ******
  • ***** **
  • ******* *** ******* *** ******* ** **** ******

**** ***** ***** ** ** ******:

**********

** * *********, ** ** *********** **** *** ** *********** turned *** ********** ***** ** ********* *** ************ ******* **** when *** *** ***** * ***** ************* **** *****. ********** the *** ******* ******** *********** **** ****** *** ******** ****** the ********* ******** **** **  ***** ****** ******** *** **** ensure *** ******** ********* ** ********. ******, **** *** *** software ** *********, ** *** *** ********, **** **** ** re-enable **.

 

Comments (3)

VMS and other programs should not store settings in the registry. Setting should be stored in the database (which may be shared among multiple servers, multiple users, multiple clients, etc.).

Thanks Michael, valid point indeed. It is not uncommon to have a VMS store user settings in the registry. One possible reasoning is that storing in the database would cause the end user's client application to lose all favorite settings in case of a database failure or maybe a sub LAN connection loss to the database server itself.

Moreover, general settings for the (thick) client application such as data connection string to the database and VMS server must be stored in the registry. Creating a VMS with this architecture in mind allows the client to operate with minimal feature loss in some cases. Keep in mind though that this is certainly not the best design and probably a good indicator the software was created using an older technology or developer skill. For example, if using .config or XML settings file it would reduce the registry dependency which is also a huge security issue if not done properly.

As for VMS software storing data, that's a different issue than what UAC is trying to address. VMS clients and potentially server software will need to store data in the registry, like window sizes, user settings, etc.. If your VMS triggers UAC during normal use, it is poorly written software. Windows added UAC as a major security measure against malicious software altering Windows settings without permission. This includes trojans, worms, and viruses. Turning off UAC is a bad practice. If you disable it, you hamstring an important tool in the fight against these security threats. Be sure it is enabled. Even during installation, if you have to turn it off, that's a red flag. Make sure you use the context menu option of Run As Administrator when installing software. It will elevate your privileges to install the software. Keep in mind that UAC is a clone of the Unix su command, and imitates that function. It took Microsoft until Vista to realize how important it is to not run everything as administrator all the time.
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

The Fastest Growing Video Surveillance Sales Organization Ever - Verkada on Apr 17, 2019
Verkada has the fastest growing video surveillance sales organization ever. In less than 2 years, they already have more salespeople in the US...
Dahua Repositionable IR Multi-Imager Camera Tested on Apr 16, 2019
Dahua has released their first repositionable multi-imager camera, the Multi-Flex 4x2MP, claiming integrated IR, true WDR, and flexible...
Axis Supports HD Analog on Apr 15, 2019
In 2017, Axis declared 'Everything is IP': Now, in 2019, Axis has released support for HD analog, with their new encoders.  Why the change?...
ISC West 2019 Report on Apr 12, 2019
The IPVM team has finished at the Sands looking at what companies are offering and how they are changing their positioning. See below for 50+...
Pole Mount Camera Installation Guide on Apr 11, 2019
Poles are a popular but challenging choice for deploying surveillance cameras outdoors. Poles are indispensable for putting cameras at the right...
UK Installer CCTV Aware - Flat Pricing, No Salespeople on Apr 10, 2019
This is a different kind of company. They do flat pricing, they do not have any salespeople and 50% of their sales are sold and booked...
Spring 2019 50+ New Products Directory on Apr 08, 2019
We are compiling a list of new products for Spring 2019 and have over 50 already. Contrast to Fall 2018 New Products Directory and Spring 2018...
Spring 2019 IP Networking Course- Register Now on Apr 04, 2019
Register now for the Spring 2019 IP Networking course here. Just $299 for the course. This is the only networking course designed specifically...
Airship VMS Profile on Apr 03, 2019
Airship has been developing VMS software for over 10 years, however, with no outside investment, and minimal marketing, the company is not well...
Dahua Favorability Results 2019 on Apr 01, 2019
Dahua favorability declined, in IPVM's 2019 integrator favorability series, driven by their backdoors, resulting in mass hacking and US government...

Most Recent Industry Reports

The Fastest Growing Video Surveillance Sales Organization Ever - Verkada on Apr 17, 2019
Verkada has the fastest growing video surveillance sales organization ever. In less than 2 years, they already have more salespeople in the US...
Door Operators Access Control Tutorial on Apr 17, 2019
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Securadyne CEO: IPVM 'Entertaining For An Ignorant Few' on Apr 16, 2019
Securadyne's CEO Carey Boethel is unhappy with IPVM's report - Failed Integrator Rollup, Securadyne Sells to Guard Giant Allied. Indeed, he...
Dahua Repositionable IR Multi-Imager Camera Tested on Apr 16, 2019
Dahua has released their first repositionable multi-imager camera, the Multi-Flex 4x2MP, claiming integrated IR, true WDR, and flexible...
Strong ISC West 2019 For Manufacturers But Concerns For 2020 March Move on Apr 16, 2019
ISC West 2019 was strong for manufacturers, according to new IPVM survey results of 100+ manufacturers, consistent with 2018 results. However,...
Axis Supports HD Analog on Apr 15, 2019
In 2017, Axis declared 'Everything is IP': Now, in 2019, Axis has released support for HD analog, with their new encoders.  Why the change?...
Alarm.com Favorability Results 2019 on Apr 15, 2019
The once dot com startup has evolved to become a core provider for home security and is now expanding into commercial. In their first entry in...
UK Camera Commissioner Calls for Regulating Facial Recognition on Apr 15, 2019
IPVM interviewed Tony Porter, the UK’s surveillance camera commissioner after he recently called for regulations on facial recognition in the...
ISC West 2019 Report on Apr 12, 2019
The IPVM team has finished at the Sands looking at what companies are offering and how they are changing their positioning. See below for 50+...
Pole Mount Camera Installation Guide on Apr 11, 2019
Poles are a popular but challenging choice for deploying surveillance cameras outdoors. Poles are indispensable for putting cameras at the right...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact