You are a system administrator for a company network running all Windows 7 workstations, and you rely on User Account Control to minimize the possibility of system infiltration by unauthorized software. Many of the department employees spend most of their time performing administrative tasks for the network and therefore require administrative access to their systems. The IS department for the company headquarters also uses an “open office” design, meaning that employees are constantly wandering around to each others’ work areas, often leaving their workstations logged on.
You are concerned about the danger of unattended workstations being used to gain administrative access to the systems. What changes can you make to the UAC configuration to minimize this possibility? Explain how these changes would enhance the security of the systems.