•
Windows 1.0x–3.11 and Windows 9x: all applications had privileges equivalent to the operating system; •
All versions of Windows NT up to, and including, Windows XP and Windows Server 2003: introduced multiple user-accounts, but in practice most users continued to function as an administrator for their normal operations. Further, some applications would require that the user be an administrator for some or all of their functions to work. •
Windows Vista and Windows Server 2008: Microsoft developed Vista security firstly from the
Limited User Account (LUA), then renamed the concept to
User Account Protection (UAP) before finally shipping User Account Control (UAC). Introduced in
Windows Vista, User Account Control (UAC) offers an approach to encourage "super-user when necessary". The key to UAC lies in its ability to elevate privileges without changing the user context (user "Bob" is still user "Bob"). As always, it is difficult to introduce new security features without breaking compatibility with existing applications. • When someone logs into Vista as a standard user, the system sets up a logon session and assigns a
token containing only the most basic privileges. In this way, the new logon session cannot make changes that would affect the entire system. • When a person logs in as a user with membership in the Administrators group, the system assigns two separate tokens: the first token contains all privileges typically awarded to an administrator, and the second is a restricted token similar to what a standard user would receive. • User applications, including the
Windows Shell, then start with the restricted token, resulting in a reduced-privilege environment – even when running under an Administrator account. • When an application requests higher privileges or when a user selects a "Run as administrator" option, UAC will prompt standard users to enter the credentials of an Administrator account and prompt Administrators for confirmation and, if consent is given, continue or start the process using an unrestricted token. •
Windows 7 and Windows Server 2008 R2: Microsoft included a user interface to change User Account Control settings, and introduced one new notification mode: the
default setting. By default, UAC does not prompt for consent when users make changes to Windows settings that require elevated permission through programs stored in
%SystemRoot% and digitally signed by Microsoft. Programs that require permission to run still trigger a prompt. Other User Account Control settings that can be changed through the new UI could have been accessed through the
registry in Windows Vista. •
Windows 8/8.1 and Windows Server 2012/R2: add a design change. When UAC is triggered, all applications and the taskbar are hidden when the desktop is dimmed. •
Windows 10 and Windows Server 2016-2022: early versions have the same layout as
Windows 8 and
8.1. The
Anniversary Update (including Windows Server 2016, which is based on said update) adds a more modern look, along with support for dark mode. Also, Windows 10 adds support for
Windows Hello in the User Account Control dialog box. •
Windows 11 and Windows Server 2025: has mostly the same layout as in later versions of
Windows 10, but with visual changes that match the rest of the operating system's new look and feel. ==Tasks that trigger a UAC prompt==