use gpedit.msc Computer Configuration/Policies/Windows Settings/Security Settings/Local Policies/Security Options Policy Setting User Account Control: Admin Approval Mode for the Built-in Administrator account Enabled User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop Enabled User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode Elevate without prompting User Account Control: Behavior of the elevation prompt for standard users Prompt for credentials User Account Control: Detect application installations and prompt for elevation Enabled User Account Control: Only elevate executables that are signed and validated Disabled User Account Control: Only elevate UIAccess applications that are installed in secure locations Enabled User Account Control: Run all administrators in Admin Approval Mode Enabled User Account Control: Switch to the secure desktop when prompting for elevation Disabled User Account Control: Virtualize file and registry write failures to per-user locations Enabled Dosnt break modern applications and the store if you do it this way like it does if you disable UAC outright.
Does that work though? I thought the only way to disable UAC "completely" on Windows 8/8.1 was to set EnableLua from the registry to 0. If I understand right, the visible slider from Control Panel only turns off most visible prompts, but you'll still get them if you, for example, copy something into one of the Program Files folder(s).
This is nonsense UAC Disable = run as administrator Disabled here a reg to disable for sure: Code: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] "ConsentPromptBehaviorAdmin"=dword:00000000 "EnableInstallerDetection"=dword:00000000 "EnableLUA"=dword:00000000 "EnableSecureUIAPaths"=dword:00000000 "EnableUIADesktopToggle"=dword:00000000