DonatShell
Server IP : 180.180.241.3  /  Your IP : 216.73.216.252
Web Server : Microsoft-IIS/7.5
System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586
User : IUSR ( 0)
PHP Version : 5.3.28
Disable Function : NONE
MySQL : ON  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /Windows/Help/Windows/en-US/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /Windows/Help/Windows/en-US/uap.h1s
MZ@PEL!@0 @.rsrc@@.its @@0	HX||4VS_VERSION_INFOStringFileInfo040904b0b!FileVersion1.00.00                         l"FileDescriptionCompiled Microsoft Help 2.0 TitleBFileStampEA6176CD01CA041F4JCompilerVersion2.5.71210.08579VCompileDate2009-07-14T01:10:45      >TopicCount35000000000000ALegalCopyright 2005 Microsoft Corporation. All rights reserved.CCCCCCCCCCCCCDVarFileInfo$Translation	ti#va.IKITOLITLS(X쌡^
V`   x 9CAOLPHHC ITSF #Oc	-Y쌡^
VY쌡^
VIFCMAOLL9IFCM AOLL//$FXFtiAttribute//$FXFtiAttribute/BTREES/$FXFtiAttribute/DATA/$FXFtiAttribute/PROPERTYkN/$FXFtiMain//$FXFtiMain/BTREEc/$FXFtiMain/DATA{
/$FXFtiMain/PROPERTYN/$Index/$ATTRNAME)\/$Index/$PROPBAGK/$Index/$STRINGS)(/$Index/$SYSTEM9
/$Index/$TOC//$Index/$TOC/$uapX/$Index/$TOPICATTR9p/$Index/$TOPICSy@/$Index/$URLSTRQ/$Index/$URLTBLa/$Index/$VTAIDX$/$Index/AssetId//$Index/AssetId/$LEAVES)	/$OBJINSTX/assets/0/assets/008c8a2a-4b61-4d94-b3e5-3896aae0923b.xmltL0/assets/0bf4ca05-a222-4e92-b9db-782d098e4e88.xml@X0/assets/2ba8fb4a-acb6-44d2-b030-9b730613635d.xmly0/assets/2bd27171-3ad0-4902-863e-a834189950dd.xmlu0/assets/3d65a393-c92b-4ddc-843f-b72a9d340175.xml80/assets/3de47f30-235f-427f-9876-498a6d0368ba.xml>O0/assets/528904ce-2949-4738-bd90-78a9be3dbdc4.xml
0/assets/530c0b5b-b5b2-4906-bfea-361fad19fb9e.xml0/assets/683e0bf4-22b9-41bb-a132-ce38284bc2f5.xml.0/assets/6efbe26f-cd54-479b-b69e-a6873586471e.xml90/assets/86fd3b13-46c4-4145-9842-b0eeae295aa8.xml<0/assets/8815a9e4-60eb-458d-8250-862158fc7ba1.xmlJ0/assets/95e7a6de-85c5-4196-a245-25f3426b4e10.xmlix0/assets/9c245eed-3b62-485b-bf24-997953dcc58d.xmlaj0/assets/9c44d317-0378-4c4d-98d1-0fde9323283f.xmlKJ0/assets/a7ed1cad-b78e-4b28-8188-eeb7e483eed7.xml0/assets/fd0b13b3-14f2-4f65-9d99-bf46466556b7.xml,i/uap.h1cK/uap.H1F`S/uap.H1T~\/uap.H1V3K/uap_AssetId.H1KZk/uap_BestBet.H1KEk/uap_LinkTerm.H1K0l/uap_SubjectTerm.H1Ko::DataSpace/NameList<(::DataSpace/Storage/MSCompressed/ContentN,::DataSpace/Storage/MSCompressed/ControlDataT )::DataSpace/Storage/MSCompressed/SpanInfoL/::DataSpace/Storage/MSCompressed/Transform/List<_::DataSpace/Storage/MSCompressed/Transform/{8CEC5846-07A1-11D9-B15E-000D56BFE6EE}/InstanceData/i::DataSpace/Storage/MSCompressed/Transform/{8CEC5846-07A1-11D9-B15E-000D56BFE6EE}/InstanceData/ResetTableYP3::Transform/{8CEC5846-07A1-11D9-B15E-000D56BFE6EE}/_vcPAMp9UncompressedMSCompressedFX쌡^
VMLZXCHH<maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>User Account Control: Turn on Admin Approval Mode</maml:title><maml:introduction>

<maml:para>The <maml:ui>User Account Control: Turn on Admin Approval Mode</maml:ui> policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer.</maml:para>

<maml:para>The options are:</maml:para>
<maml:list class="unordered">
<maml:listItem><maml:para><maml:ui>Enabled.</maml:ui> (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the <maml:phrase>Administrators</maml:phrase> group to run in Admin Approval Mode.</maml:para></maml:listItem>

<maml:listItem><maml:para><maml:ui>Disabled.</maml:ui> Admin Approval Mode and all related UAC policy settings are disabled.</maml:para>
<maml:alertSet class="note"><maml:title>Note </maml:title><maml:para>If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.</maml:para></maml:alertSet>
</maml:listItem>
</maml:list>

</maml:introduction><maml:content><maml:sections></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>User Account Control: Detect application installations and prompt for elevation</maml:title><maml:introduction>

<maml:para>The <maml:ui>User Account Control: Detect application installations and prompt for elevation</maml:ui> policy setting controls the behavior of application installation detection for the computer.</maml:para>

<maml:para>The options are:</maml:para>
<maml:list class="unordered">
<maml:listItem><maml:para><maml:ui>Enabled.</maml:ui> (Default for home) When an application installation package is detected that requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.</maml:para></maml:listItem>

<maml:listItem><maml:para><maml:ui>Disabled.</maml:ui> (Default for enterprise) Application installation packages are not detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies such as Group Policy Software Installation or Systems Management Server (SMS) should disable this policy setting. In this case, installer detection is unnecessary.</maml:para></maml:listItem></maml:list>

</maml:introduction><maml:content><maml:sections></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>How do I change the behavior of User Account Control by using the slider?</maml:title><maml:introduction>


<maml:para>You can use the User Account Control (UAC) settings slider to change UAC settings and to enable or disable UAC.</maml:para>

<maml:para>Examples of situations where you might want to change the behavior of UAC include:</maml:para>
<maml:list class="unordered">
<maml:listItem><maml:para>Environments where all applications must be preapproved and installed centrally.</maml:para></maml:listItem>
<maml:listItem><maml:para>Organizations that must comply with Common Criteria standards or corporate policies that require credentials to be used for all administrator tasks.</maml:para></maml:listItem></maml:list></maml:introduction><maml:content><maml:sections><maml:section address="bkmk_change_settings"><maml:title>Change UAC settings</maml:title><maml:introduction>

<maml:para>UAC settings include:</maml:para>
<maml:list class="unordered">
<maml:listItem><maml:para><maml:ui>Always notify me and wait for my response.</maml:ui> The UAC prompt is displayed on the secure desktop when a program is trying to install software or when you or a program attempt to change Windows settings. If you do not click <maml:ui>Yes</maml:ui>, after 30 seconds the UAC prompt automatically denies the request.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:ui>Always notify me.</maml:ui> The UAC prompt is displayed on the desktop when a program is trying to install software or when you or a program changes Windows settings. If you do not click <maml:ui>Yes</maml:ui>, after 30 seconds the UAC prompt automatically denies the request.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:ui>Only notify me when programs try to make changes to my computer.</maml:ui> You are notified only when a program tries to make changes to your computer, including changes to Windows settings.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:ui>Never notify me.</maml:ui> This selection disables UAC. </maml:para>
</maml:listItem>
</maml:list>

<maml:alertSet class="note"><maml:title>Note </maml:title><maml:para>You must restart your computer when you enable or disable UAC. Changing levels of notification does not require that you restart your computer.</maml:para></maml:alertSet>

<maml:para>Use the following procedure to change UAC settings.</maml:para>

<maml:para>To perform this procedure, you must be logged on as a local administrator or provide the credentials of a member of the local <maml:ui>Administrators</maml:ui> group.</maml:para>

<maml:procedure><maml:title>To change UAC settings</maml:title><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>Click <maml:ui>Start</maml:ui>, and then click <maml:ui>Control Panel</maml:ui>.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>In <maml:ui>Control Panel</maml:ui>, click <maml:ui>User Accounts</maml:ui>.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>In the <maml:ui>User Accounts</maml:ui> window, click <maml:ui>User Accounts</maml:ui>.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>In the <maml:ui>User Accounts</maml:ui> tasks window, click <maml:ui>Turn User Account Control on or off</maml:ui>.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>If the <maml:ui>User Account Control</maml:ui> dialog box appears, confirm that the action it displays is what you want, and then click <maml:ui>Yes</maml:ui>.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>In the <maml:ui>Security</maml:ui> section of the <maml:ui>Windows Solution Center</maml:ui> page, click <maml:ui>Adjust UAC Settings</maml:ui>.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>On the <maml:ui>User Account Control Settings</maml:ui> page:</maml:para>
<maml:list class="ordered">
<maml:listItem><maml:para>To disable UAC, move the slider to <maml:ui>Never notify</maml:ui>, and then click <maml:ui>OK</maml:ui>.</maml:para></maml:listItem>
<maml:listItem><maml:para>To enable UAC or change levels of notification, move the slider to the appropriate notification option, and then click <maml:ui>OK</maml:ui>.</maml:para></maml:listItem>
</maml:list>
</maml:section></maml:sections></maml:step></maml:procedure>

</maml:introduction></maml:section></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop</maml:title><maml:introduction>


<maml:para>The <maml:ui>User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop</maml:ui> policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user.</maml:para>

<maml:para>The options are:</maml:para>
<maml:list class="unordered">
<maml:listItem><maml:para><maml:ui>Enabled.</maml:ui> UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the <maml:ui>User Account Control: Switch to the secure desktop when prompting for elevation</maml:ui> policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop.</maml:para></maml:listItem>

<maml:listItem><maml:para><maml:ui>Disabled.</maml:ui> (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the <maml:ui>User Account Control: Switch to the secure desktop when prompting for elevation</maml:ui> policy setting.</maml:para></maml:listItem></maml:list>

<maml:para>UIA programs are designed to interact with Windows and application programs on behalf of a user. This policy setting allows UIA programs to bypass the secure desktop to increase usability in certain cases; however, allowing elevation requests to appear on the interactive desktop instead of the secure desktop can increase your security risk.</maml:para>

<maml:para>UIA programs must be digitally signed because they must be able to respond to prompts regarding security issues, such as the UAC elevation prompt. By default, UIA programs are run only from the following protected paths:</maml:para>

<maml:list class="unordered">
<maml:listItem><maml:para>…\Program Files, including subfolders</maml:para></maml:listItem>
<maml:listItem><maml:para>…\Program Files (x86), including subfolders for 64-bit versions of Windows</maml:para></maml:listItem>
<maml:listItem><maml:para>…\Windows\System32</maml:para></maml:listItem>
</maml:list>

<maml:para>The User Account Control: Only elevate UIAccess applications that are installed in secure locations policy setting disables the requirement to be run from a protected path.</maml:para>

<maml:para>While this policy setting applies to any UIA program, it is primarily used in certain remote assistance scenarios, including the Windows Remote Assistance program in Windows Vista.</maml:para>

<maml:para>If a user requests remote assistance from an administrator and the remote assistance session is established, any elevation prompts appear on the interactive user's secure desktop and the administrator's remote session is paused. To avoid pausing the remote administrator's session during elevation requests, the user may select the <maml:ui>Allow IT Expert to respond to User Account Control prompts</maml:ui> check box when setting up the remote assistance session. However, selecting this check box requires that the interactive user respond to an elevation prompt on the secure desktop. If the interactive user is a standard user, the user does not have the required credentials to allow elevation.</maml:para>

<maml:para>If you enable this policy setting, requests for elevation are automatically sent to the interactive desktop (not the secure desktop) and also appear on the remote administrator's view of the desktop during a remote assistance session. This allows the remote administrator to provide the appropriate credentials for elevation.</maml:para>

<maml:para>This policy setting does not change the behavior of the UAC elevation prompt for administrators.</maml:para>

<maml:para>If you plan to enable this policy setting, you should also review the effect of the User Account Control: Behavior of the elevation prompt for standard users policy setting. If it is configured as <maml:ui>Automatically deny elevation requests</maml:ui>, elevation requests are not presented to the user.</maml:para>
</maml:introduction><maml:content><maml:sections></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>How do I change the behavior of User Account Control by using Group Policy?</maml:title><maml:introduction>


<maml:para>You can use the local User Account Control (UAC) Group Policy settings to change the behavior of UAC for standard users or for local administrators. </maml:para>
<maml:para>Examples of situations where you might want to change the behavior of UAC include the following:</maml:para>
<maml:list class="unordered">
<maml:listItem><maml:para>By default, UAC detects most setup applications automatically and then treats them as applications that require elevation of the user's security context, even if the application is not explicitly marked as a setup application. In a managed environment, where users are not expected to run installation or setup programs, this can create unwanted requests for support when users receive a UAC prompt. Therefore, an administrator can disable the automatic setup detection in UAC or disable the prompts for setup applications entirely.</maml:para></maml:listItem>
<maml:listItem><maml:para>Applications normally run with the level of access granted in a standard user access token, even if the applications are started by a user that is a member of the local <maml:phrase>Administrators</maml:phrase> group. By default, users logged on as local administrators receive the same UAC prompts as standard users. Local administrators can change when and how they receive a UAC prompt. Local administrators can also change when and how standard users receive a UAC prompt.</maml:para></maml:listItem>
</maml:list>

<maml:para>Use the following procedure to change the behavior of UAC by using Group Policy.</maml:para>
<maml:para>To perform this procedure, you must be logged on as a local administrator or provide the credentials of a member of the local <maml:ui>Administrators</maml:ui> group.</maml:para>

<maml:procedure><maml:title>To change the behavior of UAC by using Group Policy</maml:title><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>Click <maml:ui>Start</maml:ui>, type <maml:userInput>secpol.msc</maml:userInput> in the <maml:ui>Search programs and files</maml:ui> box, and then press ENTER.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>If the <maml:ui>User Account Control</maml:ui> dialog box appears, confirm that the action it displays is what you want, and then click <maml:ui>Yes</maml:ui>.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>In the console tree, expand <maml:ui>Local Policies</maml:ui>, and then click <maml:ui>Security Options</maml:ui>.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>In the details pane, scroll down and double-click the Group Policy setting that you want to change. UAC policy settings that a local administrator can modify include:</maml:para>
<maml:list class="unordered">
<maml:listItem><maml:para>User Account Control: Admin Approval Mode for the built-in Administrator account</maml:para></maml:listItem>
<maml:listItem><maml:para>User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop</maml:para></maml:listItem>
<maml:listItem><maml:para>User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode</maml:para></maml:listItem>
<maml:listItem><maml:para>User Account Control: Behavior of the elevation prompt for standard users</maml:para></maml:listItem>
<maml:listItem><maml:para>User Account Control: Detect application installations and prompt for elevation</maml:para></maml:listItem>
<maml:listItem><maml:para>User Account Control: Only elevate executables that are signed and validated</maml:para></maml:listItem>
<maml:listItem><maml:para>User Account Control: Only elevate UIAccess applications that are installed in secure locations</maml:para></maml:listItem>
<maml:listItem><maml:para>User Account Control: Run all administrators in Admin Approval Mode</maml:para></maml:listItem>
<maml:listItem><maml:para>User Account Control: Switch to the secure desktop when prompting for elevation</maml:para></maml:listItem>
<maml:listItem><maml:para>User Account Control: Virtualize file and registry write failures to per-user locations</maml:para></maml:listItem>
</maml:list></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>On the <maml:ui>Properties</maml:ui> page, make your selection, and then click <maml:ui>OK</maml:ui>.</maml:para>
</maml:section></maml:sections></maml:step></maml:procedure>
</maml:introduction><maml:content><maml:sections></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>Why is User Account Control necessary?</maml:title><maml:introduction>

<maml:para>The most important rule for controlling access to resources is to provide the least amount of access privileges required for users to perform their daily tasks. Many tasks do not require administrator privileges. However, because previous versions of Windows created all user accounts as administrators by default, users logged on to their computers with an administrator account. Without User Account Control (UAC), when a user is logged on as an administrator, that user is automatically granted full access to all system resources.</maml:para>

<maml:para>However, most users do not require such a high level of access to the computer. Often users are unaware that they are logged on as an administrator when they browse the Web, check e-mail, and run software. While logging on with an administrator account enables a user to install legitimate software, the user can also unintentionally or intentionally install a malicious program. A malicious program installed by an administrator can fully compromise the computer and affect all users.</maml:para>

<maml:para>With the introduction of UAC, the access control model changed to help mitigate the impact of a malicious program. When a user attempts to start an administrator application, the <maml:ui>User Account Control</maml:ui> dialog box asks the user to click <maml:ui>Yes</maml:ui> or <maml:ui>No</maml:ui> before the user's full administrator access token can be used. If the user is not an administrator, the user must provide an administrator's credentials to run the program.</maml:para>

<maml:para>Because UAC requires an administrator to approve application installations, unauthorized applications cannot be installed automatically or without the explicit consent of an administrator.</maml:para>

</maml:introduction><maml:content><maml:sections></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>User Account Control: Behavior of the elevation prompt for standard users</maml:title><maml:introduction>

<maml:para>The <maml:ui>User Account Control: Behavior of the elevation prompt for standard users</maml:ui> policy setting controls the behavior of the elevation prompt for standard users.</maml:para>

<maml:para>The options are:</maml:para>
<maml:list class="unordered">

<maml:listItem><maml:para><maml:ui>Automatically deny elevation requests.</maml:ui> When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:ui>Prompt for credentials on the secure desktop.</maml:ui> (Default) When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:ui>Prompt for credentials.</maml:ui> When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.</maml:para></maml:listItem>
</maml:list>
</maml:introduction><maml:content><maml:sections></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode</maml:title><maml:introduction>

<maml:para>The <maml:ui>User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode</maml:ui> policy setting controls the behavior of the elevation prompt for administrators.</maml:para>

<maml:para>The options are:</maml:para>

<maml:list class="unordered">
<maml:listItem><maml:para><maml:ui>Elevate without prompting.</maml:ui> Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials.</maml:para>
<maml:alertSet class="note"><maml:title>Note </maml:title><maml:para>Use this option only in the most constrained environments.</maml:para></maml:alertSet></maml:listItem>

<maml:listItem><maml:para><maml:ui>Prompt for credentials on the secure desktop.</maml:ui> When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege.</maml:para></maml:listItem>

<maml:listItem><maml:para><maml:ui>Prompt for consent on the secure desktop.</maml:ui> When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either <maml:ui>Permit</maml:ui> or <maml:ui>Deny</maml:ui>. If the user selects <maml:ui>Permit</maml:ui>, the operation continues with the user's highest available privilege.</maml:para></maml:listItem>

<maml:listItem><maml:para><maml:ui>Prompt for credentials.</maml:ui> When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.</maml:para></maml:listItem>

<maml:listItem><maml:para><maml:ui>Prompt for consent.</maml:ui> When an operation requires elevation of privilege, the user is prompted to select either <maml:ui>Permit</maml:ui> or <maml:ui>Deny</maml:ui>. If the user selects <maml:ui>Permit</maml:ui>, the operation continues with the user's highest available privilege.</maml:para></maml:listItem>

<maml:listItem><maml:para><maml:ui>Prompt for consent for non-Windows binaries.</maml:ui> (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either <maml:ui>Permit</maml:ui> or <maml:ui>Deny</maml:ui>. If the user selects <maml:ui>Permit</maml:ui>, the operation continues with the user's highest available privilege.</maml:para></maml:listItem></maml:list> 

</maml:introduction><maml:content><maml:sections></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>How do I mark an application to always require a full administrator access token?</maml:title><maml:introduction>

<maml:para>Some applications, such as internal line-of-business applications or non-Microsoft products, may require the full administrator access token to perform some of their functions or tasks, but the applications are not identified by the developer or publisher as administrator applications. In this case, you can use the following procedure to mark an application so that the operating system always prompts for a full administrator access token.</maml:para>
</maml:introduction><maml:content><maml:sections><maml:section><maml:title></maml:title>
<maml:introduction>
<maml:alertSet class="important"><maml:title>Important </maml:title><maml:para>You cannot mark an application to bypass the User Account Control (UAC) message.</maml:para></maml:alertSet>


</maml:introduction></maml:section><maml:section><maml:title></maml:title>

<maml:introduction>
<maml:para>To perform this procedure, you must be logged on as a local administrator or provide the credentials of a member of the local <maml:ui>Administrators</maml:ui> group.</maml:para>
<maml:procedure><maml:title>To mark an application to always require a full administrator access token</maml:title><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>Right-click the application that may require a full administrator access token but has not been marked as such.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>Click <maml:ui>Properties</maml:ui>, and then click the <maml:ui>Compatibility</maml:ui> tab.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>In the <maml:ui>Privilege Level</maml:ui> section, click <maml:ui>Run this program as an administrator</maml:ui>, and then click <maml:ui>OK</maml:ui>.</maml:para></maml:section></maml:sections></maml:step></maml:procedure>
</maml:introduction>

</maml:section></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>User Account Control: Only elevate executables that are signed and validated</maml:title><maml:introduction>

<maml:para>The <maml:ui>User Account Control: Only elevate executables that are signed and validated</maml:ui> policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers.</maml:para>

<maml:para>The options are:</maml:para>
<maml:list class="unordered">
<maml:listItem><maml:para><maml:ui>Enabled.</maml:ui> Enforces the PKI certification path validation for a given executable file before it is permitted to run.</maml:para></maml:listItem>

<maml:listItem><maml:para><maml:ui>Disabled.</maml:ui> (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run.</maml:para></maml:listItem></maml:list>

</maml:introduction><maml:content><maml:sections></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>User Account Control: Switch to the secure desktop when prompting for elevation</maml:title><maml:introduction>

<maml:para>The <maml:ui>User Account Control: Switch to the secure desktop when prompting for elevation</maml:ui> policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop.</maml:para>

<maml:para>The options are:</maml:para>
<maml:list class="unordered">
<maml:listItem><maml:para><maml:ui>Enabled.</maml:ui> (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:ui>Disabled.</maml:ui> All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used.</maml:para></maml:listItem>
</maml:list>

<maml:para>When this policy setting is enabled, it overrides the <maml:ui>User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode</maml:ui> policy setting. The following table describes the behavior of the elevation prompt for each of the administrator policy settings when the <maml:ui>User Account Control: Switch to the secure desktop when prompting for elevation</maml:ui> policy setting is enabled or disabled.</maml:para>
<maml:table>
<maml:tableHeader><maml:row><maml:entry><maml:para>Administrator policy setting</maml:para></maml:entry><maml:entry><maml:para>Enabled</maml:para></maml:entry><maml:entry><maml:para>Disabled</maml:para></maml:entry></maml:row></maml:tableHeader>
<maml:row><maml:entry><maml:para><maml:ui>Prompt for credentials on the secure desktop</maml:ui></maml:para></maml:entry><maml:entry><maml:para>The prompt appears on the secure desktop.</maml:para></maml:entry><maml:entry><maml:para>The prompt appears on the secure desktop.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para><maml:ui>Prompt for consent on the secure desktop</maml:ui></maml:para></maml:entry><maml:entry><maml:para>The prompt appears on the secure desktop.</maml:para></maml:entry><maml:entry><maml:para>The prompt appears on the secure desktop.</maml:para></maml:entry></maml:row>

<maml:row><maml:entry><maml:para><maml:ui>Prompt for credentials</maml:ui></maml:para></maml:entry><maml:entry><maml:para>The prompt appears on the secure desktop.</maml:para></maml:entry><maml:entry><maml:para>The prompt appears on the interactive user's desktop.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para><maml:ui>Prompt for consent</maml:ui></maml:para></maml:entry><maml:entry><maml:para>The prompt appears on the secure desktop.</maml:para></maml:entry><maml:entry><maml:para>The prompt appears on the interactive user's desktop.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para><maml:ui>Prompt for consent for non-Windows binaries</maml:ui></maml:para></maml:entry><maml:entry><maml:para>The prompt appears on the secure desktop.</maml:para></maml:entry><maml:entry><maml:para>The prompt appears on the interactive user's desktop.</maml:para></maml:entry></maml:row>


</maml:table>

<maml:para>When this policy setting is enabled, it overrides the <maml:ui>User Account Control: Behavior of the elevation prompt for standard users</maml:ui> policy setting. The following table describes the behavior of the elevation prompt for each of the standard user policy settings when the <maml:ui>User Account Control: Switch to the secure desktop when prompting for elevation</maml:ui> policy setting is enabled or disabled.</maml:para>


<maml:table>
<maml:tableHeader><maml:row><maml:entry><maml:para>Standard user policy setting</maml:para></maml:entry><maml:entry><maml:para>Enabled</maml:para></maml:entry><maml:entry><maml:para>Disabled</maml:para></maml:entry></maml:row></maml:tableHeader>
<maml:row><maml:entry><maml:para><maml:ui>Automatically deny elevation requests</maml:ui></maml:para></maml:entry><maml:entry><maml:para>No prompt. The request is automatically denied.</maml:para></maml:entry><maml:entry><maml:para>No prompt. The request is automatically denied.</maml:para></maml:entry></maml:row>

<maml:row><maml:entry><maml:para><maml:ui>Prompt for credentials on the secure desktop</maml:ui></maml:para></maml:entry><maml:entry><maml:para>The prompt appears on the secure desktop.</maml:para></maml:entry><maml:entry><maml:para>The prompt appears on the secure desktop.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para><maml:ui>Prompt for credentials</maml:ui></maml:para></maml:entry><maml:entry><maml:para>The prompt appears on the secure desktop.</maml:para></maml:entry><maml:entry><maml:para>The prompt appears on the interactive user's desktop.</maml:para></maml:entry></maml:row></maml:table>
</maml:introduction><maml:content><maml:sections></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>What does "running with a full administrator token" or "running with an elevated token" mean in User Account Control?</maml:title><maml:introduction>

<maml:para>Applications normally run with the level of access granted in a standard user access token, even if the applications are started by a user that is a member of the local <maml:phrase>Administrators</maml:phrase> group. "Running with a full administrator access token," sometimes referred to as "running with an elevated access token," means that an application is allowed to use the user's full administrator access token, which includes the administrator security identifiers (SIDs).</maml:para>
<maml:alertSet class="note"><maml:title>Note </maml:title><maml:para>The user must be logged on as a local administrator or be able to provide credentials for a member of the local <maml:ui>Administrators</maml:ui> group.</maml:para></maml:alertSet>



</maml:introduction><maml:content><maml:sections></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>User Account Control: Use Admin Approval Mode for the built-in Administrator account</maml:title><maml:introduction>

<maml:para>The <maml:ui>User Account Control: Admin Approval Mode for the built-in Administrator account</maml:ui> policy setting controls the behavior of Admin Approval Mode for the built-in Administrator account.</maml:para>

<maml:para>The options are:</maml:para>
<maml:list class="unordered">
<maml:listItem><maml:para><maml:ui>Enabled.</maml:ui> The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation.</maml:para></maml:listItem>

<maml:listItem><maml:para><maml:ui>Disabled.</maml:ui> (Default) The built-in Administrator account runs all applications with full administrative privilege.</maml:para></maml:listItem></maml:list>

</maml:introduction><maml:content><maml:sections></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>How do I run an application once with a full administrator access token?</maml:title><maml:introduction>

<maml:para>Some legitimate applications require a full administrator access token to perform their functions or tasks. The User Account Control (UAC) message is displayed to request consent or credentials to allow an application to use the full administrator access token in any of the following circumstances:</maml:para>
<maml:list class="unordered">
<maml:listItem><maml:para>The application developer marked the application to require an administrator access token. This is done by using a development technique known as an embedded manifest.</maml:para></maml:listItem>
<maml:listItem><maml:para>UAC detected that the application is an installer or setup application. (Automatic detection can be disabled by using Group Policy.)</maml:para></maml:listItem>
<maml:listItem><maml:para>Microsoft analyzed the application and provided an application compatibility shim. A shim is a small amount of extra code provided by Microsoft that supports certain non-Microsoft applications.</maml:para></maml:listItem>
<maml:listItem><maml:para>An administrator configured the application compatibility settings on the application's <maml:ui>Program Properties</maml:ui> page.</maml:para></maml:listItem>
<maml:listItem><maml:para>An interactive user right-clicked the application and then clicked <maml:ui>Run as administrator</maml:ui> to start the application.</maml:para></maml:listItem></maml:list>
<maml:para>All of these settings except <maml:ui>Run as administrator</maml:ui> apply every time the application is started. To occasionally run an application with a full administrator access token, use the following procedure.</maml:para>

<maml:para>To perform this procedure, you must be logged on as a local administrator or provide the credentials of a member of the local <maml:ui>Administrators</maml:ui> group.</maml:para>
<maml:procedure><maml:title>To run an application one time with a full administrator access token</maml:title><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>Locate the program icon or a shortcut in Windows Explorer.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>Right-click the program icon or shortcut, and then click <maml:ui>Run as administrator</maml:ui>.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>When the UAC message is displayed, do one of the following:</maml:para>
<maml:list class="unordered">
<maml:listItem><maml:para>If you are logged on as a standard user, or if UAC is configured to always require credentials, enter the appropriate administrative credentials, and then click <maml:ui>OK</maml:ui>.</maml:para></maml:listItem>
<maml:listItem><maml:para>If you are logged on as an administrator and UAC is not configured to always require credentials, click <maml:ui>Yes</maml:ui> to start the application.</maml:para></maml:listItem></maml:list></maml:section></maml:sections></maml:step></maml:procedure></maml:introduction><maml:content><maml:sections></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>User Account Control: Only elevate UIAccess applications that are installed in secure locations</maml:title><maml:introduction><maml:para>The <maml:ui>User Account Control: Only elevate UIAccess applications that are installed in secure locations</maml:ui> policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following:</maml:para><maml:list class="unordered"><maml:listItem><maml:para>…\Program Files, including subfolders</maml:para></maml:listItem><maml:listItem><maml:para>…\Windows\system32</maml:para></maml:listItem><maml:listItem><maml:para>…\Program Files (x86), including subfolders for 64-bit versions of Windows</maml:para></maml:listItem></maml:list><maml:alertSet class="note"><maml:title>Note </maml:title><maml:para>Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting.</maml:para></maml:alertSet><maml:para>The options are:</maml:para><maml:list class="unordered"><maml:listItem><maml:para><maml:ui>Enabled.</maml:ui> (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity.</maml:para></maml:listItem><maml:listItem><maml:para><maml:ui>Disabled.</maml:ui> An application runs with UIAccess integrity even if it does not reside in a secure location in the file system.</maml:para></maml:listItem></maml:list></maml:introduction><maml:content><maml:sections></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>User Account Control Overview for IT Professionals</maml:title><maml:introduction>

<maml:para>User Account Control (UAC) helps prevent malicious programs, sometimes called malware, from damaging a computer and helps organizations deploy a better-managed desktop environment.</maml:para>

<maml:para>With UAC, applications and tasks always run in the security context of a non-administrator account, unless an administrator specifically authorizes administrator-level access to the computer. UAC can block the automatic installation of unauthorized applications and prevent inadvertent changes to system settings.</maml:para>
</maml:introduction><maml:content><maml:sections><maml:section>
<maml:title>How does UAC work?</maml:title><maml:introduction>
<maml:para>There are two levels of users: standard users and administrators. Standard users are members of the <maml:phrase>Users</maml:phrase> group and administrators are members of the <maml:phrase>Administrators</maml:phrase> group on the computer.</maml:para>

<maml:para>Both standard users and administrators access resources and run applications in the security context of standard users by default. When a user logs on to a computer, the system creates an access token for the user. This access token contains information about the level of access that the user is granted, including specific security identifiers (SIDs) and Windows privileges. When an administrator logs on, two separate access tokens are created for the user: a standard user access token and an administrator access token. The standard user access token contains the same user-specific information as the administrator access token, but the administrative Windows privileges and SIDs are removed. The standard user access token can start standard user applications but cannot start applications that perform administrative tasks.</maml:para>

<maml:para>When the user needs to run applications that perform administrative tasks (administrator applications), the user is prompted to change or elevate the security context from a standard user to an administrator. This default user experience is called Admin Approval Mode. In this mode, applications require specific permission to run as an administrator application.</maml:para>


<maml:alertSet class="note"><maml:title>Note </maml:title><maml:para>The behavior of the UAC message can be changed by using Group Policy.</maml:para></maml:alertSet>
<maml:para>When designing an application, the software developer should identify the application as either an administrator application or a standard user application. If an application is not identified as an administrator application, Windows treats it as a standard user application. However, administrators can also mark an application to be treated as an administrator application.</maml:para></maml:introduction></maml:section></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>User Account Control: Virtualize file and registry write failures to per-user locations</maml:title><maml:introduction>

<maml:para>The <maml:ui>User Account Control: Virtualize file and registry write failures to per-user locations</maml:ui> policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\system32, or HKLM\Software.</maml:para>

<maml:para>The options are:</maml:para>
<maml:list class="unordered">
<maml:listItem><maml:para><maml:ui>Enabled.</maml:ui> (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry.</maml:para></maml:listItem>

<maml:listItem><maml:para><maml:ui>Disabled.</maml:ui> Applications that write data to protected locations fail.</maml:para></maml:listItem></maml:list>
</maml:introduction><maml:content><maml:sections></maml:sections></maml:content></maml:conceptual><?xml version="1.0" encoding="utf-8"?>
<HelpCollection Id="uap" DTDVersion="1.0" FileVersion="" LangId="1033" Copyright="© 2005 Microsoft Corporation. All rights reserved." Title="uap" xmlns="http://schemas.microsoft.com/help/collection/2004/11">
	<CompilerOptions CompileResult="H1S" CreateFullTextIndex="Yes" BreakerId="Microsoft.NLG.en.WordBreaker">
		<IncludeFile File="uap.H1F" />
	</CompilerOptions>
	<TOCDef File="uap.H1T" Id="uap_TOC" />
	<VTopicDef File="uap.H1V" />
	<KeywordIndexDef File="uap_AssetId.H1K" />
	<KeywordIndexDef File="uap_BestBet.H1K" />
	<KeywordIndexDef File="uap_LinkTerm.H1K" />
	<KeywordIndexDef File="uap_SubjectTerm.H1K" />
	<ItemMoniker Name="!DefaultTOC" ProgId="HxDs.HxHierarchy" InitData="AnyString" />
	<ItemMoniker Name="!DefaultFullTextSearch" ProgId="HxDs.HxFullTextSearch" InitData="AnyString" />
	<ItemMoniker Name="!DefaultAssetIdIndex" ProgId="HxDs.HxIndex" InitData="AssetId" />
	<ItemMoniker Name="!DefaultBestBetIndex" ProgId="HxDs.HxIndex" InitData="BestBet" />
	<ItemMoniker Name="!DefaultAssociativeIndex" ProgId="HxDs.HxIndex" InitData="LinkTerm" />
	<ItemMoniker Name="!DefaultKeywordIndex" ProgId="HxDs.HxIndex" InitData="SubjectTerm" />
</HelpCollection><?xml version="1.0" encoding="utf-8"?>
<HelpFileList xmlns="http://schemas.microsoft.com/help/filelist/2004/11">
	<File Url="assets\008c8a2a-4b61-4d94-b3e5-3896aae0923b.xml" />
	<File Url="assets\0bf4ca05-a222-4e92-b9db-782d098e4e88.xml" />
	<File Url="assets\2ba8fb4a-acb6-44d2-b030-9b730613635d.xml" />
	<File Url="assets\2bd27171-3ad0-4902-863e-a834189950dd.xml" />
	<File Url="assets\3d65a393-c92b-4ddc-843f-b72a9d340175.xml" />
	<File Url="assets\3de47f30-235f-427f-9876-498a6d0368ba.xml" />
	<File Url="assets\528904ce-2949-4738-bd90-78a9be3dbdc4.xml" />
	<File Url="assets\530c0b5b-b5b2-4906-bfea-361fad19fb9e.xml" />
	<File Url="assets\683e0bf4-22b9-41bb-a132-ce38284bc2f5.xml" />
	<File Url="assets\6efbe26f-cd54-479b-b69e-a6873586471e.xml" />
	<File Url="assets\86fd3b13-46c4-4145-9842-b0eeae295aa8.xml" />
	<File Url="assets\8815a9e4-60eb-458d-8250-862158fc7ba1.xml" />
	<File Url="assets\95e7a6de-85c5-4196-a245-25f3426b4e10.xml" />
	<File Url="assets\9c245eed-3b62-485b-bf24-997953dcc58d.xml" />
	<File Url="assets\9c44d317-0378-4c4d-98d1-0fde9323283f.xml" />
	<File Url="assets\a7ed1cad-b78e-4b28-8188-eeb7e483eed7.xml" />
	<File Url="assets\fd0b13b3-14f2-4f65-9d99-bf46466556b7.xml" />
</HelpFileList><?xml version="1.0" encoding="utf-8"?>
<VTopicSet DTDVersion="1.0" xmlns="http://schemas.microsoft.com/help/vtopic/2004/11">
	<Vtopic Url="assets\008c8a2a-4b61-4d94-b3e5-3896aae0923b.xml" RLTitle="User Account Control: Turn on Admin Approval Mode">
		<Attr Name="assetid" Value="008c8a2a-4b61-4d94-b3e5-3896aae0923b" />
		<Keyword Index="AssetId" Term="008c8a2a-4b61-4d94-b3e5-3896aae0923b" />
		<Keyword Index="AssetId" Term="008c8a2a-4b61-4d94-b3e5-3896aae0923b1033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="008c8a2a-4b61-4d94-b3e5-3896aae0923b" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\0bf4ca05-a222-4e92-b9db-782d098e4e88.xml" RLTitle="User Account Control: Detect application installations and prompt for elevation">
		<Attr Name="assetid" Value="0bf4ca05-a222-4e92-b9db-782d098e4e88" />
		<Keyword Index="AssetId" Term="0bf4ca05-a222-4e92-b9db-782d098e4e88" />
		<Keyword Index="AssetId" Term="0bf4ca05-a222-4e92-b9db-782d098e4e881033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="0bf4ca05-a222-4e92-b9db-782d098e4e88" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\2ba8fb4a-acb6-44d2-b030-9b730613635d.xml" RLTitle="How do I change the behavior of User Account Control by using the slider?">
		<Attr Name="assetid" Value="2ba8fb4a-acb6-44d2-b030-9b730613635d" />
		<Keyword Index="AssetId" Term="2ba8fb4a-acb6-44d2-b030-9b730613635d" />
		<Keyword Index="AssetId" Term="2ba8fb4a-acb6-44d2-b030-9b730613635d1033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="CommunityContent" Value="1" />
		<Attr Name="cultureCode" Value="EN-US" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="2ba8fb4a-acb6-44d2-b030-9b730613635d" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\2bd27171-3ad0-4902-863e-a834189950dd.xml" RLTitle="User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop">
		<Attr Name="assetid" Value="2bd27171-3ad0-4902-863e-a834189950dd" />
		<Keyword Index="AssetId" Term="2bd27171-3ad0-4902-863e-a834189950dd" />
		<Keyword Index="AssetId" Term="2bd27171-3ad0-4902-863e-a834189950dd1033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="2bd27171-3ad0-4902-863e-a834189950dd" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\3d65a393-c92b-4ddc-843f-b72a9d340175.xml" RLTitle="How do I change the behavior of User Account Control by using Group Policy?">
		<Attr Name="assetid" Value="3d65a393-c92b-4ddc-843f-b72a9d340175" />
		<Keyword Index="AssetId" Term="3d65a393-c92b-4ddc-843f-b72a9d340175" />
		<Keyword Index="AssetId" Term="3d65a393-c92b-4ddc-843f-b72a9d3401751033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="3d65a393-c92b-4ddc-843f-b72a9d340175" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\3de47f30-235f-427f-9876-498a6d0368ba.xml" RLTitle="Why is User Account Control necessary?">
		<Attr Name="assetid" Value="3de47f30-235f-427f-9876-498a6d0368ba" />
		<Keyword Index="AssetId" Term="3de47f30-235f-427f-9876-498a6d0368ba" />
		<Keyword Index="AssetId" Term="3de47f30-235f-427f-9876-498a6d0368ba1033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="CommunityContent" Value="1" />
		<Attr Name="cultureCode" Value="EN-US" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="3de47f30-235f-427f-9876-498a6d0368ba" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\528904ce-2949-4738-bd90-78a9be3dbdc4.xml" RLTitle="User Account Control: Behavior of the elevation prompt for standard users">
		<Attr Name="assetid" Value="528904ce-2949-4738-bd90-78a9be3dbdc4" />
		<Keyword Index="AssetId" Term="528904ce-2949-4738-bd90-78a9be3dbdc4" />
		<Keyword Index="AssetId" Term="528904ce-2949-4738-bd90-78a9be3dbdc41033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="528904ce-2949-4738-bd90-78a9be3dbdc4" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\530c0b5b-b5b2-4906-bfea-361fad19fb9e.xml" RLTitle="User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode">
		<Attr Name="assetid" Value="530c0b5b-b5b2-4906-bfea-361fad19fb9e" />
		<Keyword Index="AssetId" Term="530c0b5b-b5b2-4906-bfea-361fad19fb9e" />
		<Keyword Index="AssetId" Term="530c0b5b-b5b2-4906-bfea-361fad19fb9e1033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="530c0b5b-b5b2-4906-bfea-361fad19fb9e" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\683e0bf4-22b9-41bb-a132-ce38284bc2f5.xml" RLTitle="How do I mark an application to always require a full administrator access token?">
		<Attr Name="assetid" Value="683e0bf4-22b9-41bb-a132-ce38284bc2f5" />
		<Keyword Index="AssetId" Term="683e0bf4-22b9-41bb-a132-ce38284bc2f5" />
		<Keyword Index="AssetId" Term="683e0bf4-22b9-41bb-a132-ce38284bc2f51033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="CommunityContent" Value="1" />
		<Attr Name="cultureCode" Value="EN-US" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="683e0bf4-22b9-41bb-a132-ce38284bc2f5" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\6efbe26f-cd54-479b-b69e-a6873586471e.xml" RLTitle="User Account Control: Only elevate executables that are signed and validated">
		<Attr Name="assetid" Value="6efbe26f-cd54-479b-b69e-a6873586471e" />
		<Keyword Index="AssetId" Term="6efbe26f-cd54-479b-b69e-a6873586471e" />
		<Keyword Index="AssetId" Term="6efbe26f-cd54-479b-b69e-a6873586471e1033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="6efbe26f-cd54-479b-b69e-a6873586471e" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\86fd3b13-46c4-4145-9842-b0eeae295aa8.xml" RLTitle="User Account Control: Switch to the secure desktop when prompting for elevation">
		<Attr Name="assetid" Value="86fd3b13-46c4-4145-9842-b0eeae295aa8" />
		<Keyword Index="AssetId" Term="86fd3b13-46c4-4145-9842-b0eeae295aa8" />
		<Keyword Index="AssetId" Term="86fd3b13-46c4-4145-9842-b0eeae295aa81033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="86fd3b13-46c4-4145-9842-b0eeae295aa8" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\8815a9e4-60eb-458d-8250-862158fc7ba1.xml" RLTitle="What does &quot;running with a full administrator token&quot; or &quot;running with an elevated token&quot; mean in User Account Control?">
		<Attr Name="assetid" Value="8815a9e4-60eb-458d-8250-862158fc7ba1" />
		<Keyword Index="AssetId" Term="8815a9e4-60eb-458d-8250-862158fc7ba1" />
		<Keyword Index="AssetId" Term="8815a9e4-60eb-458d-8250-862158fc7ba11033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="CommunityContent" Value="1" />
		<Attr Name="cultureCode" Value="EN-US" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="8815a9e4-60eb-458d-8250-862158fc7ba1" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\95e7a6de-85c5-4196-a245-25f3426b4e10.xml" RLTitle="User Account Control: Use Admin Approval Mode for the built-in Administrator account">
		<Attr Name="assetid" Value="95e7a6de-85c5-4196-a245-25f3426b4e10" />
		<Keyword Index="AssetId" Term="95e7a6de-85c5-4196-a245-25f3426b4e10" />
		<Keyword Index="AssetId" Term="95e7a6de-85c5-4196-a245-25f3426b4e101033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="95e7a6de-85c5-4196-a245-25f3426b4e10" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\9c245eed-3b62-485b-bf24-997953dcc58d.xml" RLTitle="How do I run an application once with a full administrator access token?">
		<Attr Name="assetid" Value="9c245eed-3b62-485b-bf24-997953dcc58d" />
		<Keyword Index="AssetId" Term="9c245eed-3b62-485b-bf24-997953dcc58d" />
		<Keyword Index="AssetId" Term="9c245eed-3b62-485b-bf24-997953dcc58d1033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="CommunityContent" Value="1" />
		<Attr Name="cultureCode" Value="EN-US" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="9c245eed-3b62-485b-bf24-997953dcc58d" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\9c44d317-0378-4c4d-98d1-0fde9323283f.xml" RLTitle="User Account Control: Only elevate UIAccess applications that are installed in secure locations">
		<Attr Name="assetid" Value="9c44d317-0378-4c4d-98d1-0fde9323283f" />
		<Keyword Index="AssetId" Term="9c44d317-0378-4c4d-98d1-0fde9323283f" />
		<Keyword Index="AssetId" Term="9c44d317-0378-4c4d-98d1-0fde9323283f1033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="9c44d317-0378-4c4d-98d1-0fde9323283f" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\a7ed1cad-b78e-4b28-8188-eeb7e483eed7.xml" RLTitle="User Account Control Overview for IT Professionals">
		<Attr Name="assetid" Value="a7ed1cad-b78e-4b28-8188-eeb7e483eed7" />
		<Keyword Index="AssetId" Term="a7ed1cad-b78e-4b28-8188-eeb7e483eed7" />
		<Keyword Index="AssetId" Term="a7ed1cad-b78e-4b28-8188-eeb7e483eed71033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="CommunityContent" Value="1" />
		<Attr Name="cultureCode" Value="EN-US" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="a7ed1cad-b78e-4b28-8188-eeb7e483eed7" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\fd0b13b3-14f2-4f65-9d99-bf46466556b7.xml" RLTitle="User Account Control: Virtualize file and registry write failures to per-user locations">
		<Attr Name="assetid" Value="fd0b13b3-14f2-4f65-9d99-bf46466556b7" />
		<Keyword Index="AssetId" Term="fd0b13b3-14f2-4f65-9d99-bf46466556b7" />
		<Keyword Index="AssetId" Term="fd0b13b3-14f2-4f65-9d99-bf46466556b71033" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1819" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="fd0b13b3-14f2-4f65-9d99-bf46466556b7" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
</VTopicSet><?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE HelpTOC>
<HelpTOC xmlns="http://schemas.microsoft.com/help/toc/2004/11" DTDVersion="1.0" Id="uap_TOC" FileVersion="" LangId="1033" ParentNodeIcon="Book" PluginStyle="Hierarchical">
	<HelpTOCNode Url="mshelp://windows/?tocid=7e212745-e13c-4a25-a853-5f0862cd33bb" Title="">
		<HelpTOCNode Url="mshelp://windows/?id=3de47f30-235f-427f-9876-498a6d0368ba" Title="Why is User Account Control necessary?" />
		<HelpTOCNode Url="mshelp://windows/?id=a7ed1cad-b78e-4b28-8188-eeb7e483eed7" Title="User Account Control Overview for IT Professionals" />
		<HelpTOCNode Url="mshelp://windows/?id=2ba8fb4a-acb6-44d2-b030-9b730613635d" Title="How do I change the behavior of User Account Control by using the slider?" />
		<HelpTOCNode Url="mshelp://windows/?id=3d65a393-c92b-4ddc-843f-b72a9d340175" Title="How do I change the behavior of User Account Control by using Group Policy?">
			<HelpTOCNode Url="mshelp://windows/?id=95e7a6de-85c5-4196-a245-25f3426b4e10" Title="User Account Control: Use Admin Approval Mode for the built-in Administrator account" />
			<HelpTOCNode Url="mshelp://windows/?id=2bd27171-3ad0-4902-863e-a834189950dd" Title="User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop" />
			<HelpTOCNode Url="mshelp://windows/?id=530c0b5b-b5b2-4906-bfea-361fad19fb9e" Title="User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" />
			<HelpTOCNode Url="mshelp://windows/?id=528904ce-2949-4738-bd90-78a9be3dbdc4" Title="User Account Control: Behavior of the elevation prompt for standard users" />
			<HelpTOCNode Url="mshelp://windows/?id=0bf4ca05-a222-4e92-b9db-782d098e4e88" Title="User Account Control: Detect application installations and prompt for elevation" />
			<HelpTOCNode Url="mshelp://windows/?id=6efbe26f-cd54-479b-b69e-a6873586471e" Title="User Account Control: Only elevate executables that are signed and validated" />
			<HelpTOCNode Url="mshelp://windows/?id=9c44d317-0378-4c4d-98d1-0fde9323283f" Title="User Account Control: Only elevate UIAccess applications that are installed in secure locations" />
			<HelpTOCNode Url="mshelp://windows/?id=008c8a2a-4b61-4d94-b3e5-3896aae0923b" Title="User Account Control: Turn on Admin Approval Mode" />
			<HelpTOCNode Url="mshelp://windows/?id=86fd3b13-46c4-4145-9842-b0eeae295aa8" Title="User Account Control: Switch to the secure desktop when prompting for elevation" />
			<HelpTOCNode Url="mshelp://windows/?id=fd0b13b3-14f2-4f65-9d99-bf46466556b7" Title="User Account Control: Virtualize file and registry write failures to per-user locations" />
		</HelpTOCNode>
		<HelpTOCNode Url="mshelp://windows/?id=8815a9e4-60eb-458d-8250-862158fc7ba1" Title="What does &quot;running with a full administrator token&quot; or &quot;running with an elevated token&quot; mean in User Account Control?" />
		<HelpTOCNode Url="mshelp://windows/?id=9c245eed-3b62-485b-bf24-997953dcc58d" Title="How do I run an application once with a full administrator access token?" />
		<HelpTOCNode Url="mshelp://windows/?id=683e0bf4-22b9-41bb-a132-ce38284bc2f5" Title="How do I mark an application to always require a full administrator access token?" />
	</HelpTOCNode>
</HelpTOC><?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE HelpIndex>
<HelpIndex DTDVersion="1.0" Name="AssetId" /><?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE HelpIndex>
<HelpIndex DTDVersion="1.0" Name="BestBet" /><?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE HelpIndex>
<HelpIndex DTDVersion="1.0" Name="LinkTerm" /><?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE HelpIndex>
<HelpIndex DTDVersion="1.0" Name="SubjectTerm" /> y`FEOܖ}TP*٫`	
JDXJR(Bp.(\Tj(*PJ1D D"eh`?}=	B貛!f#B;+"RBжi&fE
9@`D(
VD
"tъ jKϻ˄PV@S6wr-tط_6ޢqϷ?Յ˾nzMJ^m9oZ{uѳ7xgw㹭͞׽lM
dk>ٺ~oc\cǎpM~%gs>5~ؿ9ݒQ-tNt9]sQ=8OtǍMtqY?8?_
u:'_W:#{7Ɠkcp7w/=g=7{?]<')e!sT?{o]
75:7싊gۿ_q+~\=ͣ4pgsyv[y-XܞE7&}Km|g{?yym'|kmSqF<_g<+s|q<{_1')3#9߶x}vIS
?W.iN\D$Szywsþ8;ȷ_P#}_zFc=vw++=cn.<(_rll
sL3Joz1~{~յSg]gD'lOsw`б=wGoǝ-|cclz{lnGؾ8O:Y쮯t쎭wv؋=c}c쥾zu7k;;cxw^=:;qpUZPQؾc6o=w:6ǖn<_{l/{z]|^?sxkC&ѷuѷo~kŽo}k[7|ӡo5٥o=ufw95Mh{>VhNV}[k_m^pۮͷ]o}mmwo~mŽ~-:,g}kkmæۯ]'^oxwܼom6հ^ȵWv6֩Q{R߾nn}ݥ^~إ5uW5:KR|-R=|R|Mڥ>uؽKuzkZŗ뗚kƗbZcחkǚǗd5ؐ/חzȍK.u/.u͵//וۖ/.uj]v_Ov{ X;폶qǏ\1;8滯74_;>|l+ޝx|<=Wkq>z=4<'c{g}J;a~xGT<<\ Gn$$b2&ݝ;~buOsgSguJ?;5
݆j_7
w~_9K]}Ӿ={):tQLN靥)=S:=:SJgF{t{JtVU:_S=S:s:tƷJg~{tg{JtJguOsY)ҝ)=S:3:t]ΜOz鼽N):Ss=S:g{JtJg|tg|Jt§Jg.|tg|Jt>ħJgvOΉ鬋OO΍YS:>:?SJg|t|Jte<N)ҙ+):SJgvN)f;tm|N);ţJg|tgwJN)>:oS3;tuܞON)ߝS:g}JtyYҝE)yI);t}\N)&twJO)ҝS)s>S:g}Jt^Oέ	O):SJg|xO)s1t2Y|
/ŋx/^x^/ŋx/^x^/ŋx/^x^/ŋx/^x^/ŋx/^x^/ŋx/^x^/ŋx/^x ny;ߣ!|Gp4}GCCGah<!Xh4|?6GCѐ|4M>
CG0|4Q>
)0hh?<Ϗap4~
CG0~4
GC44|>
[G4L~
.ҏh2?MG4||?PG!Ѱ~4
6hH|4U?Տxh4̱~
ìGpP|4[?!Ѱhv^?h4
}?`G!Ѱhh>
HGáh(\}42>B3zA200``00``00``00``00``00``00``00`o_VQe}tj;/xu}v:ofOSsΛQySx9MZ9oVjv7௜1<YN0dS8Y6px>4^gw?̌#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1bBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBg^)q,C!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ7dwn-1|o?^u;HF\.\…p\.¸p.\…p\.7.\.¸p.\…p\.¸p.\8\..\…p\.puw¸p.\…p\?p…p\.¸p.\…p\.¸p.\k#qGjvG;#qw1ct|n6wFOޤػ}6CoN_;>x!cZ>Ax617c_<.\b8iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiimV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[շmk3iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii.{mV[[mVmV[[mVmV[[mVvZmjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګj۶ǵⳚiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii˞#ۛ7oq؛\#.y¸pQE[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmm[ڌxiiiiiiiiiiiiiiiiiiiiiii~eiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiڶiiiiiiiiiiiiiiiiiiiiiiiiiiii{[4MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM4M%44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM4>1iiۦw}w-j:u_Wv%}1osί$=߻Y+nv:C[_蓏{鷾۹Ow?~gu~~?k.7{j>lʿv?xwsV__!?n`v>2,rB |{d=Ulک"R)лM(0aݮCj5d0*\UGQ_:~Z{޽+x9y9m}##
WFf3*x$ۚfX2ŜD(h,oLY.)Ia6nibl`ڇ]4`<v[0+ ?ϼ=@כּ\Yt;_Y΂!'h(!("AAXUauDnF:De
fxhCoբO-JnI䪸E)+/^C[JŻ[ȩ'
RI+	zz)-eLK:5I55lH:(F%%VrPO1J;%CgNũ%IxS)ȣuDOO"iYJǿEm.cVd'S-V^$|0L+첢t_XGɘXkmӗԈ}xwpPeYDd&ЯNH&ĻÌQNE3T#1@`sX2]ҩW!u,8h̷gifX&-cL{LU?PE(՟))so'q-S_>w0+w0Bb--Ÿቌ]T#kh:ږޖ#(t7ILu41Ww>QeDʧ6uɑ1v68>-gLw
fZfSS;|d"k-UGXVHVJnU>/|'!;- qtܥ<qtI8@q.^eNuj4;s͉w│nil(OBuS)?u4C"\Y,]sQqbY%u_1mG,{rqFvC;<{.ޤ+i2LR̈6Y^7ү(޷M޸!B.24(Ef?ĭC$Vz+LbRW{ti<1DLS5&raı)eԻb%7tCA\@.uh]~7k[)4mHKb),[DQ@ FiЧa|M;lղXaeqxb%pʜkd2$
m换ZNՠk̨άƷdd7¶_,eo6G'
+yVA?SU{$(ǘxQE_V+\VmH4I{+*GYRmU;D݌XZ	IDZ#tR%6JvM]Jɦ]ZJjh\,Jpu}Zyq)?2N^@wjYV#Aǟnq3-(9ajyT8@A>T}@&͸Fq+at($-m[7x^Kӄ`>!O_e>+	qGSoYJbN[]DU4ǤqȦbDZZ'xպ&8UN	/%h3K.B!Y6	h5'zzk(cvǺ:Er>T,'64.9I=FE^2bo!A[rcW&νDbGSPј!6~fF>DiE
gni;wD
+Hcy촘"=*ŌF7EԂx~yU*~H#'#_-0k#e DuAZs@IsU$Zq3QgOaqy&Ռ \!MjfD3jÌPPH)xXr\jɞFOC/ّAcɺخXʧyz%SkzBȇIyq'֫$T^{j\8BW7!ː3+V
e~6E\<un&>?(S
Z1t5Bn\U-!/1EF*czsξ|"?ZCf[<ߐ_9oĭ= %UPÒP](r2و;!')"ig$K|w9X8`Xa)I0a}v04tՀe2X29g6ьaN/a{=W]TGO^Dۣt'<l\he-y\6a{Z(g\ỷ,L%2~P ~[r!	F#^~x9NcCb/3K#FS"[ݟ:LlɪV4,K>Ts<Ap@5x5JyHkb(Zb#&=ݖâ@:D/v2)rݬ.&ڦ)	NN2u^N
>b5=*jlᣤѨke1Pqb”MG3q34KT'fd}(b/Z^ƿ_AMfY	+7oxun%92?1K&|
P-vbjt8+ȸ{e{k(X=3颖X5[y(M9U-k3
ԯL,0]`XhomF)RA{$˱y#&ǞXHB;F^aͅAkq:#[U@5ʂ3m S'LUM\'#<wAڴ)K<cΩug㍦n̫jJ~430+!S::WSwug*@`Ka,h|4PcnJڋ^6A2BǏBS\m.k?Kxp#܊Gn
TOױcҕ2|S
fdYmjYPE|yZQ7*YWSŖً,e-ljСeK	U_rϵ
Q ;ӠfcΕ'6XI>%w
X6Z҂o,E&᩾Yg8Q2{|i\mfv%VkaEu͐>T/X="qF|^a;湋TB&rƿ#*		*d><O[Na&]FPIū(<
Ľ^)lסIiVmJ3fВB	z*$TQ=bB;WD*fMB]N@X1G٘6-Cwjȭ	˛zcG
=~ƥS]
:Km~OV.E$xNQuJ$|}=I
dpbpm[TZѷ4-hmӆ	cK4i-8f
Z$RY=d_?4#\[!'բBKe¸ס0x䉈s`>I"$ߵzNyV:,b$
B2ُB{͢jvy-XpJQNi.}0p"U%$Ef޽:)y	C

m0--V̩uKmPtN".%
jP+*90\EiټV4dIcXbciS͉/&-J	GImiIvcs?A}ՒXGZ~'MET(^ Vj[Lob_v4#:/a${a`܍>.mP=,HP+bB!"mac)H~ᢔt}yG
9eBb5sicmha~kk&+&=a[@ȃfhOcm5+Dݤ%Ĥ^pHBk}zM@7ky4喳[y[gX3O%m>ЕN<ڷz*/p@S9O=Ko|>O0w=o;}H{-\g<{pN\+^~NǗ6^[LnͶzQ=Gk}]M?9*O!^3XG7Sl^ҟo`Lq	86A@1	([J-2y<}WS.B,6*)RRoHv%C}0{~-ÎNLnvȞT(q-QL+Gi"͎VAI\nj
?ؔ0b1pƼ|jToM
;`T(eAw85Pb;OE&8m;0U@M 3jߡ	RI:RA?A.Ī)K\X`Tmf]aM~miTjAR[Vn|"/USbU#Wȵy}Y^ dԯ舤XBXt潪EotN/ש{g(I\6:dopKJR[9~oɷd	Sm[V>:INuwgou/*ӻhǷ©K|q(/)lF!еFTe@~4[+F=NIj׎1oc~5k_Z3+.R}hxoU1Hؤ8G׺IpI}TCYo)r_ʱP*m~a"
HVkb1wr`V\T`4[{K˲0teA
7`=o%goc<{x>N^ޱj}YcjuL繀/ےv\X~6ې4K9͇%ѼAukH'CcQӣf޽`C"JNrp iVս߁4DHZ-}	_gƍbgꙻŰ"3-Y,qJ1Sbba//T$%q/aeN23j-UhLLGPzV 6,/4
A?HXoa0u(T@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@zCDuг^K[՚fٛ	üpD`]mQv[ouz@ho+u%z?ĵ$aC+
|Rl $,xU!V+m+d݊j'ka,lS4CTUq|iތۑg _=4nݷFZް:-;
cػsYIN8ZJUmeGKb![D_ę!t92e{h;¶IK'$i[ضazm1n=Bu1yr}c*\l%7I/'[0^̭}#(yI6Is(ՠ<.[QouJulȪbm<JOlR/JKf:]OޫΣ)\Uf:	p}.R])r%!røbp]!閇1?o^Y}[;@edž=rkRZ6s6Ei Ho='?DŽ=Cؾ'Ozvq{v5=0qjC[ɦ^=;[c1ά-+lns={?F-nIۂְ<F &P:N#o$b(j 96.9U	41g$;ňş4]~xUU/qNUc|nE.Y1#
g`y4X˖
C0w*D<Oߕj02BPEyF|>3˞^_IX(*ˠC*w4?j:Z#Be[ݼC|e'0Cfy`U&U>mQ[Ա,G5a[޷x<mcjV۝1k()И1oN~ҵwˣ^mo?AXKBCp_P_nͼ@|n1rڨj)8ct!84j!o{˸dՙφމ{gb0=$hP+Lfy[*X6.\[#EːVw^aN0+2&es*p{#y=Vd
QҤyԉ͠ʓKsK{*뵁;EsKWwb8S;cKݸ	Ainu7^dFYvo	`n}q4<q6-QP<aK0>fU4/T"If-jXxst ^
NTc½{"%+s\4ij+7.dJ^V)ؐx(E-&k!r8Ι
"nlWZ$hcZ޼J0:<A߶/e.{5bLW`ZCVHX@mлM:cS:6	Bht*3ͲӞ'#Yt.Ͳe+kTnx
T0Ccvad$"h`4SYt{(Qn^+b
 X!\7],HQTuEsL UފiN*|	\p|y!o&T8h*pY;<,lw|PSnd	&ce)NjB'YE쨖4:=[}8UݐYS
Y3hxs/܃AdX;[#Qm;io&OLۘYhJ_NxyBpg(\B~*lUd5TLdR~ԸQy:b<mbFLQv{=j&_`?OwP.hGIduZDӨEy(<oZ/;OE/70ztđKv^"ZhvK',ML)+t[a.IUZ}5Rjnl(榄6QaDp ./`,z/m
޷ȺX֡0|Gamk7b	)KIL*ָܧ+C{l]`Wf֖*8jOD؄wWXMv{ɷ>4GM}صWwQ;7^0>bg*X
ޅA7-{VEt ]zj_ѱ&
Xt,g8r)Vl2)ebYg2[;li3q9[C0CB?t
/ZRf:j-8Sju~^׮kHڟῸqK3?h\ZdV
1-{.g&=%@m|r(+rd<G>pLXѺnNw0Эj/GC5E|2o\2B
:Kmh(5-3t,{8U֩t-qjcrHT7	Z!3E>'jשw&TY,Qp@s#ȧk1TY<"ar	uW5IbM
ߵ9'RP}aOerDŽU9ۡ8a-`,B`ZP
JʆH'UT>E=
??dD6Ӆ@!}Z".C
+34T@|.vej;]0cN$jv䋅׭dcH,=e^jJmkz)jm~&!ˊhT-luyI%:kL}
xvaHԲFQ3])#fԽ,Cn]/׹Qj׋;
ί[#e}NYOqaJQW!זUq&7_̦s5*iM;6!Uq*eo87uln>B~q5Zx'4
bMyH$K-k~B\)~BEV5
>Y	<FND^$M$_bcf筋gPKRT땕}0id CU5w~0vXWgv3n6Lp‡$oÙ='&跺*!fo
RIKwNYZ@HX?ޙ0N$;A~3ۘ>JOFj2a$9m$(5k6D2Gu7m=5>w8ܶL[Z[4[)JceNL5,:~"WbF.*vVj
NsDkK iڭc$a*GC,42gb:vF8:K  BkBo+VDϮn;"@"֓jEc[Jhԋysu4 JuMY&-Ӯ
WëD@	*
ZYYL-hR9X9Qa=ei|EQ5S'R0ɳ./L˸<*	ŀ[ՙĴrjF<+Y{(p:,.S'2*בEi*=;ufBbvr6fI<ġIm;$[4'HfBv\B5_r$o1EG]P8?f/'X)յߒ98
+I]5:N
o ZRMVȮqM3s6E|#oB=FUm^RnLTTo0Uqw%2EĔɍw
2n-U&'E^!LKr1hq)K
ENQUs8Mys
^pQ-{ztY1O$cZ5YA#2K&;TM7Ix"<M95},C!זtUgםN[\]{1-?ef1aә:Z;iz;%5vq*PaJ)}-ʬ?JRUw)d^rD&UhtŠoUP3e0읷q<XGiqɓ]BD6^~B=ũAɶGVyzQM!8ciǁ6yK:OYWY^Wqe; .!2hkS7mQòG5D]/޶пoo)*R,mQL$&N-vp$Ys-Β9VfV(4fl5ѰŖS#f
Q]jxõkF4Kcdjd"pم
O7K媨sx>`djʚ&H=#μ2f3*Z
[I`ъfT> "_HB©]z>kiƤWMҧu:&%=BwI9J(Z"#F57ZƵT+P׮hiMc5<S]D/z2wbVѦ+(R}&'x.[-
]qf2,]Wh%&I
UeD**?e
0]p(ɉ, G|-ә: MĠ7%=SSp7N{0jnu}ݽ
d\o'$2Q_W'SF"V.۾IG^pcoQvFm>qjJ˞l6zP0Y&]XCÕ)·Kr&*e`:*,TR
)~zO2oe=E5蔾ػCe$:RwMaaY|~#OuK9TxrcFs@%Y%k0װl6g_+q5Ge,K[rfD$/<7[ǥVlA6<W(ԡ+oݷm/~CH-)LtCQatw^1S@>V~a1eiwzn&x "?DOK(
N9-]Aen|ץ){ThȤ5T-j%em
"|hƑn9>T^(LG=@\x+[Psy4[Q(`
{wo'MHk,Y\GWLt:)j
by̼vV6Fz̿Ԃfi	6f/R">Y6L	+p@*SluG]3i

bf/oeH-JQL<c~EVH>hMB񉧸}+E&2#TNшUiԸΥm4Fs/XHqSHK)ɦ*QYѫUҴra}cYu_Joǁ#"ŏMFYgͭ$PV&\0"8`?f%#M=?:*4ƤD
Fe:stqQu:vu&G2P}cr;6E=^%OA@~fvŠ2qE\"		0\|0PW2vOYwEbݓplz?mG3#͉?Fά`?mP֟P<9^$|z$BПyʡkluNQ~LDI33rzPs3w*)T~)$:Z|	<]/3A!B:qKfQ=Ƚ'|)AZ0we!KJʥC=E:(ȺP={Fn
Ǿg!\80 7h>!I 9ZwȆ/4:c@@ >D(G)IG
<pRԇIs8H)Q$zʕn}
r)TLC A0?u;w;@:}rwGC*}\!5	DQy
G] I@t"C)R	,b;V4IPyvePαN&u ϔG8<=!Rh 4ӄmޏ`Aw*-qOLH7<EJk3Yі@PHFG샚A֣pB]G
?Syra
)Q ?b=CJ%RH(M2pƒIޤSPS-:jOMmzq_*-K+ƳO; 2}:i)P%Hкna,2CB;r4]#w#YҶxEcFvңR[H;lJp^0ߩ{J,-JlWɮ*/؋
񂊎bggO(hjf-;>͟l^ufCMn,֛uUrhVjJpɤ65D<(2t{EqXm#:~{P
ba>﫾}!'}$&lprq[p]]9 |/^<0Wze*~& ǻ 6`I0@?@\Α(r@"G8lBi<J{:NRfe.%{tFHHFx?Mb(cGDvvB3';yBv}o"%,y:&:FK"|C~wr#br*h\w2!!,x(Kw(
(jrIsG*+N~K<:{9Ư䣅d].N`v0FN2<wӠ$֜ѮQI|JhMeNTMN *6J\oc''?&(':ggZxy5_/grVg^;5~}AgΖD;>gV?gcg:AݳvvuGl]^!ȣ6}v>;Xg:l|?c?gg:A
uv`Gl](em$;>g׎Y	~tƾut
~tƾuGB]vuٻ:MCl  v 
0@MxJ'w/W
/h?|;gLQebѾ3`/9	<q2!!QfHCR&wspAgnдP@t%zƀUgK+ɽ`v{]vu&)|enҘDi{枹M>?$9`>%oK)
HܔdnnmDsC=<Hɍwo'gg GKvtx/
`#r_7̢sa\^)@W_!A0,?ABx$}43sr?snǡs;wĿ,~dKNbH܈gs'ޓ1y&p.%6rK\)GI`yOH:D{q6%ps偌JRWcg}Ш_[d֟C|
$J~_M_|C(f;4a7'cH4![?j&%lbj7	
cyC*Ȇ/Wo	>ߚY!v7$L
C|ov/^&J:eݷ[9ﭚݷC~wk7c_
5T-R3'Coa[Fv^mvP^wϯ ʫɥ`?^C|&KX
h7ބz`3~9Ou/%x̒ן?~+aRcӹ(<3	My%LΝ|oD	*_K{ٙs?
d	t?`[!?wJcQg#$L9\ɠu=MH;|˟_Dusu4 Xh	D[$;m"$AֿJ,#:\Wv,E"6'Nݠe	V#{aNb;\T:6)
(>G@x2mD|OFdڞ̍۷=}o{2C>'ۦ{
O߾X<>[H5AŒ@d9)W
W}B]QVh?ra<fÖN!u4svr%5\CjɂmwӔdSAH]
( @δ52
@wOo~9٥Zj΍^/p.zɐRCɌ9ՓAjR΍Ҡ渡Y8B)jQ<IùEd7+&<]	:Ђ
]FxȀӷSnH`P1.TktiȈ	<]r
LԐ]C
k@]N=Ypr㲲U*cΌEQ岍^r0ԧEBjLFAN>Cw\vy4y';A"I5Zݪ.U{~QF5|
~d}p/bD~oOp1׫Ksb3@\#F$_)K^1FK_Գbf1DFT4H1BvmeSo;vuFCXvЛNr{ȶ/|S⢃isYRE9bpTNߵ'@Yr3L l2+4L-^L֪vdU1NH;"Ndnw&Yӟ]$%(/ʁGJ{;?)pɐv$ȕ7-ȚHqp|uDT;J4/<.36׺|d
4VkV:44	J|aϨUd
|#, t$w6]	zt'^W3a7M21F1@>c2|Zy^~Sߋ=7ہ:;VzE%*+m A#pEo""\ ."*6Հ	D}Zl_@ 0#ܠ8iQު[nI8d_@#3PzBgJJ50>ҶRVK(E)Pg,%뿥kxe&c|Y'Ff^_(4ME?/:f=ΆW[]U!=+NzUkinwk4Sw'nk]ys
(fhſqa/W3ޤ?wt/oבf/+땯G/eepcYLT8,0.VvAn&c=4XƉ
nSg,ոP/?7uƲ__9"(MS~'dGQ

Anon7 - 2022
AnonSec Team