How to manage another account. Where are the system account settings? Single sign-on to Microsoft Internet services

In this article we will talk about the "User Account Control", which was based on the principle of the least privileged user. Compared to Windows Vista and Server 2008, there are several improvements in its functionality in Windows 7 and Server 2008 R 2. Also we will tell you in detail about the access tokens and the login process.

Most of the security problems in recent versions of Windows were caused by one main reason: most users started Windows with administrative privileges. Administrators can do anything with a computer running Windows: install programs, add devices, update drivers, install updates, change registry settings, run utilities, and create and modify user accounts. Despite the fact that it is very convenient, the presence of these rights gives rise to a huge problem: any spyware program that has embedded itself in the system can also work with administrator rights, and thus can cause enormous damage to both the computer itself and everything connected to it.

In Windows XP, they tried to solve this problem by creating second-level accounts, called limited users, that had only the most necessary permissions, but had a number of flaws. In Windows Vista again tried to fix this problem. This solution is called "User Account Control", which was based on the principle of the least privileged user.

The idea is to create an account level that would have no more rights than it needed. Under such accounts, it is impossible to make changes to the registry and perform other administrative tasks. User Account Control is used to notify a user before making changes that require administrative rights.

With the advent of UAC, the access control model has changed in such a way that it can help mitigate the effects of malware. When a user tries to start certain components of a system or service, the User Account Control dialog appears, which gives the user the right to choose whether to continue the action to obtain administrative privileges or not. If the user does not have administrator rights, then he should provide the administrator account information in the appropriate dialog in order to run the program he needs.

To use the UAC settings, only administrator approval is required; therefore, unauthorized applications cannot be installed without the explicit consent of the administrator. This article describes in detail the principle of the "User Account Control" in the Windows 7 operating system.

Compared to Windows Vista and Windows Server 2008, in Windows 7 and Windows Server 2008 R2 operating systems, the following improvements in user account control functionality appeared:

The number of tasks that a regular user can perform without an administrator asking for confirmation has increased;

A user with administrator rights is allowed to configure the UAC level from the Control Panel;

There are additional local security policy settings that allow local administrators to change the behavior of UAC messages for local administrators in administrator approval mode;

There are additional local security policy settings that allow local administrators to change the behavior of UAC messages for regular users.

Most users do not need such a high level of access to a computer and operating system. Most often, users are unaware that they are logged in as administrators when they check email, surf the web, or run software. Malware installed by the administrator can damage the system and affect all users. Due to the fact that UAC requires approval by the administrator of the installation, unauthorized applications will not be able to be installed automatically without the explicit consent of the system administrator.

Due to the fact that UAC allows users to run applications as regular users:

IT departments can be assured of the integrity of their environment, including system files, audit logs, and system settings;

Administrators no longer have to spend a lot of time determining permissions for tasks on individual computers;

Administrators are given more effective control over software licensing, as they can ensure that only authorized applications are installed. They no longer have to worry about possible threats from their networks due to unlicensed or malicious software.

UAC Specs

Access token. Access tokens contain login session security information that identifies the user, user groups, and privileges. The operating system uses an access token to control access to protected objects and controls the ability of the user to perform various system-related operations on the local computer. UAC access tokens are a special type of access tokens that define the minimum privileges required for operation — the default interactive access privileges for a Windows user on a system with UAC enabled. The second token, the full administrator access token, has the maximum privileges allowed for the administrator account. When a user logs in, an access token is created for that user. The access token contains information about the access level that is issued to the user, including security identifiers (SIDs).

Admin Approval Mode. Admin Approval Mode is a user account management configuration in which a combined access user token is created for the administrator. When an administrator logs on to a Windows computer, he is assigned two separate access tokens. If administrator approval mode is not used, the administrator receives only one access token, which gives him access to all Windows resources.

Request consent. The consent request is displayed when the user tries to complete a task that requires administrative rights. The user agrees or refuses by clicking on the "Yes" or "No" button.

Request credentials. A request for credentials is displayed to regular users when they are trying to complete a task that requires administrator access. The user must specify the name and password of the account that belongs to the local administrators group.

UAC working principle

User Account Control (UAC) helps prevent computer infection from malware, helping organizations to more effectively deploy desktop applications.

Using UAC, applications and tasks are always launched in a secure area from a non-administrator account, if the administrator grants rights for administrative access in the system.

The UAC control panel allows you to choose from four options:

Notify with every change made to the system: this behavior is present in Vista - the UAC dialog appears every time the user tries to make any change to the system (setting up Windows, installing applications, etc.);

Notify only when applications try to make changes to the system: in this case, the notification will not appear when changes are made in Windows, for example, through the control panel and snap-ins;

Notify only when applications try to make changes to the system, without using a secure desktop: the same as item 2, except that the UAC dialog appears in the form of a traditional dialog and not in the secure desktop mode. Although this may be convenient in the case of using certain graphics drivers that make it difficult to switch between desktops, this mode is a barrier to applications that mimic the behavior of UAC;

Never Notify: This setting completely disables UAC.

Windows 7 login process

The following figure shows how the administrator login process differs from the standard user.

To ensure security, by default, access to system resources and applications, standard users and administrators, is provided as a standard user. When a user logs in, an access token is created for him. The access token contains information about the access level, which is set to the user, including security identifiers (SID).

When an administrator logs in, two separate user tokens are created: a standard user access token and a full administrator access token. Standard user access contains the same user information as the full administrator access token, but without administrative privileges and SIDs. A standard user access token is used to launch applications that do not perform administrative tasks. Standard user access is used only to display the desktop (explorer.exe). Explorer.exe is a parent process from which the user can run other processes inherited by their access token. As a result, all applications run as a regular user, unless the application requires the use of administrative access.

A user who is a member of the Administrators group can log in to browse the web and read emails using the standard user access token. When an administrator needs to complete a task that requires him to be an administrative user token, Windows 7 will automatically show a notification to use administrative rights. This notification is called a credential request, and its behavior can be configured using the Local Security Policy (Secpol.msc) snap-in or group policies.

Each application that requires an administrator access token must run with administrator consent. An exception is the relationship between the parent and child processes. Child processes inherit the user access token from the parent process. Both parent and child processes must have the same level of integration.

Windows 7 protects processes by marking integration levels. Levels of integration are measured by trust. Applications with "high" integration are applications that perform tasks that can change system data. And applications with "low" integration are tasks that can potentially cause damage to the operating system. Applications with a lower level of integration cannot change data in applications with a high level of integration.

When a standard user tries to start an application that requires an administrator access token, UAC requires the user to provide administrative information.

UAC User Capabilities

When UAC is enabled, user capabilities are different from administrator capabilities in administrator approval mode. There is an even more secure method of logging into Windows 7 - creating a primary account with standard user rights. Working as a regular user allows you to maximize security. With the built-in credentials component in UAC, standard users can easily perform administrative tasks by entering the local administrator account information.

An alternative way to launch applications as a regular user is to launch applications with elevated administrative rights. Using the credentials built into UAC, members of the local Administrators group can easily perform administrative tasks by providing approving data. By default, the built-in credential component for an administrator account in approval mode is called a consent request. The UAC credential request can be configured using the local security policy snap-in (Secpol.msc) or group policies.

With UAC enabled, Windows 7 asks for the consent or credentials of the local administrator's record before running a program or task that requires a full administrator access token. This query does not guarantee that spyware can be installed in silent mode.

A consent request is displayed when a user tries to complete a task that requires an administrator access token. Below is a screenshot of the UAC consent request.


A credential request is displayed when an ordinary user tries to start a task that requires an administrator access token. This request for a regular user can be configured using the local security policy snap-in (Secpol.msc) or group policies. A credential request can also be configured for administrators by changing the UAC policy: the behavior of an elevation request for administrators in an administrator-approved mode with the Request credential value.

The following screenshot shows an example of a UAC proxy request.

Requests to increase UAC rights

Requests for elevated UAC rights are color-coded for specific applications, allowing you to immediately identify a potential security risk. When an application tries to start up with a full administrator access token, Windows 7 first analyzes the executable file to determine the publisher. First of all, applications are divided into 3 categories of publishers of an executable file: Windows 7, verified publisher (signed), not verified publisher (not signed). The following image shows how Windows 7 determines which color of the enhancement request to display to the user.

The color coding of elevation requests is as follows:

A shield icon is displayed on a red background: the application is blocked using group policy or blocked due to an unknown publisher.

A golden shield icon is displayed on a blue background: the application is a Windows 7 administrative application, such as the Control Panel.

A blue shield icon is displayed on a blue background: the application is signed and is trusted on the local computer.

A yellow shield icon is displayed on a yellow background: the application is not signed or signed, but is not trusted on the local computer.

Rights elevation requests use the same color marking as the dialog boxes in Windows Internet Explorer 8.

Shield icon

Some elements of the "Control Panel", such as "Date and time" contain a combination of administrator operations and ordinary users. Regular users can see the time and change the time zone, a full administrator access token is required to change the date and time of the system. Below is a screenshot of the "Date and time" dialog in the control panel.

The shield icon on the "Change date and time" button indicates that this process requires a full administrator access token and will display a request for increasing UAC rights.

Providing a request for elevation

The elevation process provides direct requests to protect the desktop. Consent and credential prompts are displayed by default in Windows 7 for system security. Only system processes can gain full access to a secure work environment. To achieve a higher level of security, it is recommended to enable Group Policy User Account Control: Switch to a secure desktop when executing a request for elevation.

When executable files request elevation, the interactive desktop, also called the desktop, switches to a secure desktop. The secure desktop darkens the user and displays a request for elevation, in which the user must make a decision to continue the task. When the user clicks the "Yes" or "No" button, the desktop again switches to the user.

Malicious software can mimic a secure desktop, but when the User Account Control policy is enabled: elevation request behavior for administrators in administrator approval mode with a value of “Request Consent”, the malicious program will not be able to get elevated rights even if the user clicks Yes ". If the policy setting is set to "Request Credentials", then the malicious software will be able to collect user credentials.

Quite often are situations where several people use the same computer. In this case, it may be necessary to allow one user to one and the other to another. For example, some users may be allowed to install programs on their computer, while others may not be allowed. In addition, you can allow some users to use any program or file, and others to prohibit it. And finally, you can make sure that each computer user has his own settings and design of the Desktop, windows, and Windows as a whole.

To make all this possible, it is necessary to register each of the intended users in the system — to create an account for it. It is like a registration card in the personnel department.

When the system is booted, the welcome window displays a list of registered users who are allowed to log in. To continue, you will need to specify under what user you are going to work, and enter the appropriate password. After that, the system will finally boot, and taking into account the individual settings of the user.

Account creation

To create a new account, go to the Control Panel (Start Control Panel) and click on the icon

User accounts. As a result, a dialog box of the same name will appear on the screen (see fig. 5.1), in which you can perform various operations on your own account under which you are currently working in the system. We will learn to edit accounts in the next section, but now let's find out how to create a new account.

Fig. 5.1. Dialog box "User Accounts"

After that, go to another window, shown in Fig. 5.2. This window is the most general and allows you to switch to editing not only yours, but also other accounts. However, we are now interested in the link to create an account. Click on it with the mouse. The first thing you need to specify is the type of account created, that is, the access rights that the owner of the created account should have (fig. 5.3). There are two possible meanings:

Fig. 5.2. Existing accounts in the system

Administrator - in this case, the user with this account will have administrative rights. He will get full control over the system resources and will be able to change any settings and perform all possible actions.

Normal access - in this case, the rights of the user who owns this account will be significantly reduced. He will not have access to the basic settings of the system, and also will not be able to use some programs. Also, he will not be able to install most programs.

In addition, you need to enter the name of the new account in the field above. To create an account, click the Create Account button. After that, the account will be created and will appear in the User Accounts window (Fig. 5.3).

Fig. 5.3. Creating a new account - set permissions and name

It remains to configure it now (by default, it does not have a password).

Setting up and editing an account

To set up an account, you must first click in the User Accounts window (Fig. 5.2). After this, you will see a list of possible settings and operations that can be performed with this account (Fig. 5.4):

Name change.

Create a password (or Change password).

Change pattern.

Change account type.

Deleting an account.

Parental Control

Fig. 5.4.   Account editing

Setting an account password

In the future, you can take any of these actions, but immediately after creating a new account, you first need to set a password for it. Therefore, click on the Create a password link and in the appeared window (Fig. 5.5), enter the password twice, and in the bottom - a hint. However, you can not enter a hint.

When finished, click the Create Password button.

Change account picture

It may not be superfluous to change the image used to indicate the account. To do this, after you select an account in the User Accounts window (Fig. 5.2), you should click the Change Picture link.

Fig. 5.5.   Create password

Fig. 5.6. We set a new picture for the account

As a result of these “super-complex” actions, a set of drawings will appear on the screen, which you can assign to your account (Fig. 5.6). Choose the one you like and click on the Change Picture button. If none of the proposed standard drawings you are not deceived, you can specify your drawing. To do this, click on the Search for other drawings link and indicate what image you want to use.

Deleting an account

To delete an account, select first the Accounts Record users (Fig. 5.2), the account account (see Fig. 5.4) and click on the Delete Account link. After that, you will be asked if you want to save personal files belonging to the user with the account being deleted (Fig. 5.7). If you agree to delete, the Documents, Images, etc. folders will be deleted, which means everything that was placed in these folders when the user was working on the computer with this account.

Fig. 5.7.   Deleting an account

What is a user account? What types of accounts are available and how are they configured? About this and about the benefits of connecting a Microsoft account in Windows 7 will be discussed in this article.

Windows accounts are a regular functionality that is designed to provide several users of one computer with comfortable work with it.

A personal account is a kind of personal space of a person where he can most conveniently organize for himself the work with system settings, files and programs within an account type of authority, thereby not interfering with exactly the same process of working with a computer to another user.

So, within a separate record, each of the users can choose their own theme, adjust the location of icons on the desktop, set the position of the tiles on the initial screen (in the case of Windows 8.1), configure the browser, media players or social resources applications. If different computer users have secrets from each other, they can protect their accounts with a password.

What types of accounts are there?

Administrator   - the type of this account is intended for users who have the right to make changes to the operation of the operating system (by their own actions or through software). Administrators have access to all computer files, to all system services and installed programs, as well as to all existing system accounts.

This is the first account that appears after installing Windows. An administrator's account in organizations is usually used only by IT specialists to maintain a computer and take security measures to keep confidential trade secrets, while the employee using the computer entrusted to him performs his duties using a standard user account. Often, IT executives use executives to block the computers of game organizers or the ability to visit social networks on computers to prevent them from working time for entertainment.

Standard   - it is a personalized user account, which provides for the full use of the computer, except for the ability to make changes to the operating system, change some settings or delete important files. The user can call such an account with his name, set his photo as an avatar, and also protect the entry with a password.

Users of home computers and laptops often use a single administrator account, not even suspecting that separate accounts can be created for individual family members. Few users create separate accounts on the home computer for children with some restrictions — for example, using the off timer, if the time allowed by the parents for working with the computer has expired, or with restrictions on access to sites harmful to children. It is also best to create a separate standard account if you trust your computer device to an adult but inexperienced user. This minimizes the risks of unwanted changes to the system.

Guestbook   - this is not a personalized account. It is the most limited in functionality and provides for temporary work of the user with the computer. You can transfer the computer to the guest account if you are asked to use it by strangers - guests, visiting the honor of the holiday, or nice employees from the neighboring department of the organization. They will be able to sit on the Internet, work with some installed program, watch a video or listen to music. And no more - guests will not be able to install or delete anything without your knowledge.

Where are the system account settings?

You can change the settings of an existing entry, create a new one or delete an unused one in the case of Windows 7 through the Start menu. You need to go to the “User Accounts and Family Safety” toolbar section.

If you have Windows 8 / 8.1 installed, you can take advantage of the capabilities of the new interface: you need to call the panel that pops up on the right, select "Parameters", then - "Change computer settings - Accounts".


Benefits of a Windows 8.1 Account

In previous versions of the Windows operating system - by the 7th inclusive - the binding to the Microsoft account was not so tough. When installing the system, you are asked to register on the software giant's online resource, but you can skip this step and continue installing the system under a local computer account. In this case, the absence of a Microsoft account to fully work with Windows XP, Vista or 7 systems will not particularly affect.

In Windows 8 and its evolutionary continuation - version 8.1 - you, in principle, can also skip the step of registering or logging in to an existing Microsoft account. But in the future, using only the local computer account, you will not be able to actively use the functionality of the Metro-interface. You will need a Microsoft account to work with some regular Metro applications (Mail, Calendar, People, Messages) and Windows 8 / 8.1 store.

If the step to connect your Microsoft account is skipped during the installation of Windows 8 / 8.1, you can return to it at any time. To do this, you need to go to the above path of the Metro-settings "Options - Change computer settings - Accounts".

What are the advantages of connecting a Microsoft account in Windows 8 / 8.1?

Single sign-on to Microsoft Internet services

A Microsoft account is a single key for using the Internet resources of the software giant, including: Outlook.Com mail service, OneDrive cloud storage, Windows Phone mobile OS service, Xbox LIVE gaming and multimedia service. And, of course, the aforementioned Metro application store for Windows 8 / 8.1. To register a Microsoft account, you will need an e-mail inbox, which will be your login later.

Synchronization of data and settings of Windows 8 / 8.1

When you reinstall or use this system on another device, connecting a Microsoft account and synchronizing data gives you a previously configured system — with update settings, network settings, selected theme, language settings, etc.

Batch install applications from the Windows store

In addition to the synchronization of some regular applications, a list of applications that you have previously installed will be displayed in a separate section “Account” in the Windows store. From this list, you can select all or part of them and activate their batch installation on a computer. Given that the applications are installed quickly, you can restore the desired state very quickly.

Continuing the theme:
Apple

Apple carefully monitors the security of its devices. Therefore, you may notice suspicious activity of your account and temporarily block it. There is...