Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
Microsoft Windows Server 2022 Security Technical Implementation Guide
SRG-OS-000134-GPOS-00068
Windows Server 2022 User Account Control (UAC) must virtualize file and registry write failures to per-user locations.
Windows Server 2022 User Account Control (UAC) must virtualize file and registry write failures to per-user locations.
An XCCDF Rule
Details
Profiles
Prose
Windows Server 2022 User Account Control (UAC) must virtualize file and registry write failures to per-user locations.
Medium Severity
<VulnDiscussion>UAC is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures non-UAC-compliant applications to run in virtualized file and registry entries in per-user locations, allowing them to run.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>