User account control(UAC) protects your system from virus and malwares from infected scripts and applications, and it doesn’t allow them to explore your administrative privileges. If an application is trying to write to system locations it will prompt to enter admin password to standard users to let the application to write to the folders and locations, for ex : Windows registry, program files, program files(x86) etc. User account control(UAC) will inform you about the integrity of the process selected by you. It also helps users finding the restrictions imposed on an application. It also finds the specific security details for the selected app including Integrity Level, Trusted Directory, UAC Virtualization and Digital Signature.
So let’s start analyzing applications:
First of all download the application and then install it.
Open the application select a process name from the drop down menu, if your not able to find the application you can type and search for it.
Once it is done, it will show you the file location, integrity level, whether the UAC virtualization is enabled or disabled, trusted directory and whether it is signed and having a digital signature or not.
So now the details have been analyzed by the UAC process analyzer, now you must be thinking how to understand them?So let’s learn that as well.
Integrity level : The integrity level ranges from low to high, if an application has a low integrity it is not allowed to write into the system core unless it has the administrative privileges and if the application has high level if integrity it doesn’t require the administrative privileges.
Uac virtualization is advanced concept which makes your system a lot more secured when enabled, it can’t write to the system folders and locations such as program files and windows registry where it gets redirected to the profile folders where it doesn’t require any administrative rights but can perform all the tasks which are requested by a normal user. The write requests of the application with UAC Virtualization Enabled gets redirected to user profile folder instead of system wide folders and locations (Program Files, Windows, System32, Windows Registry hives) to protect the system. And If the Uac virtualization is disabled for an application the application gets the rights to the system folders such as program files. It can directly write to the system folder and locations unless you request any modifications disabling this feature can be dangerous.
Trusted Directory shows whether the application is from a trusted supplier or not, you can also change it to trusted/non-trusted with admin permissions if the application is trusted it won’t be interfered by the Security feature.
This feature lets the end-users check whether the application has been modified by the external sources or not. It provides brief details of the publisher such as, developer’s name, name of the certificate authority, validity period, serial number, the signature algorithm, and thumbprint.
The reason for code signing is to decrease the spread of malwares a viruses which looks like a normal application but has the power to gain the exploit administrative rights of the system because sometimes many malicious applications shows themselves as digitally signed. So it’s a good security check.
Uac processor analyzer works on vista and windows 7(32 and 64 bit both are supported)