Norton UAC Tool Beta
User Account Control (UAC) is a new security feature in Microsoft Windows Vista that changes the architecture of the access token creation process and prevents users from logging on with full administrative rights.
While the intent of this feature may have been multi-layered threat detection system, all too often users need administrative rights for tasks like installing/updating programs, and many software applications need access to run properly.
The User Account Control tool has been designed to replace the Vista UAC, to simultaneously make your system more secure while significantly improving user-friendliness.
By default, any application launched by an administrator is running with a filtered, standard user access token. When the administrator attempts to perform a task, the UAC prompts the user to approve the action. This can lead to poor user experiences because the prompts can be slow to display, and appear frequently and without warning. What’s more, because the UAC may give a false sense of security since other processes can still access the desktop, it actually raises security concerns.
The net effect is that many users find the UAC security clearance and prompting process annoying, especially those who are a computer’s only user and have all the latest Norton Internet Security software installed and updated.
The will collect user input as well as information on applications causing prompts. The data will be processed to improve the comprehensiveness and robustness of the white list, which will be updatable while running the tool online.
Download: Norton UAC Tool 2008.1.0.11 Beta
Protection Features
- Real-time threat detection
- Malware scanning
- Phishing protection
- Zero-day threat protection
Performance Impact
Minimal impact on system performance with optimized scanning.
Quarantine and Threat Management
Detected threats are quarantined before removal, preventing data loss of potentially important files. The quarantine area allows review of isolated files. Users can restore quarantined files or permanently delete them.
Key Features
Fast Performance
Optimized for speed and efficiency
Secure & Safe
Built with security in mind
Cross-Platform
Available on multiple platforms
Customizable
Personalize to fit your needs
System Requirements
Windows
Compatible with Windows operating system