![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.109248 |
Kategorie: | Policy |
Titel: | Microsoft Windows: User Account Control: Switch to the secure desktop when prompting for elevation |
Zusammenfassung: | This policy setting determines whether the elevation request;prompts on the interactive user desktop or on the secure desktop.;;The secure desktop presents the logon UI and restricts functionality and access to the system until;the logon requirements are satisfied.;;The secure desktop's primary difference from the user desktop is that only trusted processes running;as SYSTEM are allowed to run here (that is, nothing is running at the user's privilege level). The;path to get to the secure desktop from the user desktop must also be trusted through the entire chain.;;(C) Microsoft Corporation 2017. |
Beschreibung: | Summary: This policy setting determines whether the elevation request prompts on the interactive user desktop or on the secure desktop. The secure desktop presents the logon UI and restricts functionality and access to the system until the logon requirements are satisfied. The secure desktop's primary difference from the user desktop is that only trusted processes running as SYSTEM are allowed to run here (that is, nothing is running at the user's privilege level). The path to get to the secure desktop from the user desktop must also be trusted through the entire chain. (C) Microsoft Corporation 2017. CVSS Score: 0.0 CVSS Vector: AV:L/AC:H/Au:S/C:N/I:N/A:N |
Copyright | Copyright (C) 2018 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |