-
Notifications
You must be signed in to change notification settings - Fork 3
/
SAS_Registry_Hack.reg
40 lines (30 loc) · 3.7 KB
/
SAS_Registry_Hack.reg
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
Windows Registry Editor Version 5.00
; SAS Super Admin Suppessor a simple RegHACK by JonnyBanana
; https://github.com/JonnyBanana
; Only the built-in administrator account (RID 500) is placed into Admin Approval Mode.
; Approval is required when performing administrative tasks.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"FilterAdministratorToken"=dword:00000001
; Allow UIAccess app's to prompt for elevation without using the secure desktop
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"EnableUIADesktopToggle"=dword:00000001
; allows the Consent Admin to perform an operation that requires elevation
; without consent or credentials.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"ConsentPromptBehaviorAdmin"=dword:00000000
; disable the system todetermines whether application installations prompt for elevation
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"EnableInstallerDetection"=dword:00000000
; disable admin approval mode and all related UAC policy settings.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"EnableLUA"=dword:00000000
; will allow the execution of UIAccess applications from non-secure locations
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"EnableSecureUIAPaths"=dword:00000001
; disable Secure Dekstop PromptOnSecureDesktop
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"PromptOnSecureDesktop"=dword:00000000
; enables the redirection of legacy application File and Registry writes that would
; normally fail as standard user to a user-writable data location
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"EnableVirtualization"=dword:00000001