How to change UAC settings with GPO

Last updated on:

User Account Control (UAC) is a Windows security feature that prompts users for permission or an administrator password before allowing changes that could affect system settings or files. While UAC helps protect against malware and unauthorized changes, enterprise environments often need to configure UAC settings centrally using Group Policy Objects (GPO) to meet specific security policies or operational requirements.

This article explains how to configure UAC group policy settings using: PowerShell, the Group Policy Management Console (GPMC), and ManageEngine ADManager Plus.

  • GPMC
  • PowerShell
  • ADManager Plus
  • Native tools limitations
  • Why ADManager Plus
  • FAQ
 

How to configure UAC settings with GPO using GPMC

Prerequisites

You must have Domain Administrator privileges to edit Group Policy Objects (GPOs).

How to disable UAC with Group Policy using GPMC

  1. Open the Group Policy Management Console (GPMC).
  2. Right-click the target OU and select Create a GPO in this domain, and Link it here...
  3. Name the GPO and click OK.
  4. Right-click the new GPO and select Edit.
  5. Navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security Options.
  6. Locate User Account Control: Run all administrators in Admin Approval Mode and set it to Enabled to turn on UAC and Disabled to turn off UAC.
    The Group Policy Management Console (GPMC) with the User Account Control: Admin Approval Mode option selected and configured to Disabled.
  7. Close the Group Policy Editor. Changes will take effect at the next Group Policy refresh or restart.

How to configure UAC behavior settings using GPMC

You can fine-tune individual UAC behaviors without fully disabling the feature. Within the same Security Options path, configure the following policies as needed:

User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode — Controls how admins are prompted for elevation.

User Account Control: Behavior of the elevation prompt for standard users — Controls how standard users respond to elevation requests.

User Account Control: Detect application installations and prompt for elevation — Enables or disables prompts for software installs.

User Account Control: Only elevate UIAccess applications that are installed in secure locations — Restricts elevation to applications in protected directories.

How to configure UAC settings with GPO using PowerShell

Prerequisites

  • Ensure the Remote Server Administration Tool (RSAT) and the GroupPolicy PowerShell module are installed in your admin workstation or management server.
  • Run PowerShell as an Administrator when logged into Windows Server as a Domain Administrator.
  • Import the GroupPolicy module by running: Import-Module GroupPolicy

How to enable or disable UAC with Group Policy using PowerShell

Use the following PowerShell script to disable UAC for all users in a target OU by modifying registry settings within a GPO. To enable UAC, change the Value parameter from 0 to 1.

Import-Module GroupPolicy
$gpoName = "Configure UAC Settings"
$targetOU = "OU=Workstations,DC=yourdomain,DC=com"
# Create and Link GPO if it doesn't exist
if (!(Get-GPO -Name $gpoName -ErrorAction SilentlyContinue)) { New-GPO -Name $gpoName }
New-GPLink -Name $gpoName -Target $targetOU -ErrorAction SilentlyContinue
# Disable UAC for all users (Computer Configuration)
Set-GPRegistryValue -Name $gpoName `
-Key "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" `
-ValueName "EnableLUA" `
-Type DWord `
-Value 0

How to configure UAC behavior with GPO using PowerShell

You can fine-tune individual UAC behaviors without fully disabling the feature. The base script structure remains the same as above with only the -ValueName and -Value parameters changed for each setting. The sections below highlight only those differences.

User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode

Controls how administrators are prompted when an operation requires elevated privileges. Change the -ValueName and -Value parameters as shown:

-ValueName "ConsentPromptBehaviorAdmin" ` -Value <integer>

Accepted integer values:

0 — Elevate without prompting (silently grants elevation)

1 — Prompt for credentials on secure desktop

2 — Prompt for consent on secure desktop

3 — Prompt for credentials

4 — Prompt for consent

5 — Prompt for consent for non-Windows binaries (default)

User Account Control: Behavior of the elevation prompt for standard users

Controls how standard users respond to operations that require elevation. Change the -ValueName and -Value parameters as shown:

-ValueName "ConsentPromptBehaviorUser" ` -Value <integer>

Accepted integer values:

0 — Automatically deny elevation requests

1 — Prompt for credentials on secure desktop

3 — Prompt for credentials (default)

User Account Control: Detect application installations and prompt for elevation

Enables or disables UAC prompts when Windows detects a software installation package. Change the -ValueName and -Value parameters as shown:

-ValueName "EnableInstallerDetection" ` -Value <integer>

Accepted values:

1 — Enabled: prompt for elevation when an installer is detected (default for Home editions)

0 — Disabled: no prompt (default for Enterprise editions)

User Account Control: Only elevate UIAccess applications that are installed in secure locations

Restricts access via the File Explorer to applications installed in secure directories such as Program Files or System32. Change the -ValueName and -Value parameters as shown:

-ValueName "EnableSecureUIAPaths" ` -Value <integer>

Accepted values:

1 — Enabled: only applications in secure locations can request UIAccess elevation (default)

0 — Disabled: any application can request UIAccess elevation regardless of install location

How to configure UAC settings with GPO using ADManager Plus

  1. Log in to ADManager Plus and select the Management tab.
  2. In the left pane, select GPO Management.
  3. Under GPO Management, select Manage GPOs.
  4. In the Actions column of the GPO you want to edit, select the edit icon.
  5. Navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security Options.
  6. Locate and configure the desired UAC settings, such as User Account Control: Run all administrators in Admin Approval Mode, and set it to the desired state.
The User Account Control: Admin Approval Mode setting selected and toggled to Disabled in the Manage GPO Settings task of ADManager Plus.

Note: To configure individual UAC behavior settings using ADManager Plus, follow the same steps above and navigate to the same Security Options path.

Limitations of using native tools to configure UAC settings with GPO

While PowerShell and GPMC are powerful tools, relying on them for UAC group policy settings management can present several challenges:

  • GPMC does not support bulk-editing UAC settings across multiple GPOs; each GPO must be edited individually.
  • PowerShell GPO cmdlets require knowledge of the exact registry key paths for UAC settings, which can vary between Windows versions.
  • Scripting errors in Set-GPRegistryValue or New-GPLink can misconfigure UAC settings across an entire OU or domain.
  • Editing UAC-related Group Policy settings requires Domain Administrator privileges, limiting delegation to junior admins.
  • Testing UAC policy changes in staging environments is essential, as misconfigurations can disrupt user workflows or lock out administrator access.

Benefits of using ADManager Plus to edit GPOs

ADManager Plus—an AD management and reporting solution—helps admins perform GPO management tasks with a script-free, easy-to-use interface.

FAQ

User Account Control (UAC) is a Windows security feature designed to prevent unauthorized changes to the operating system. It ensures that apps always run with the limited permissions of a non-administrator account, unless an administrator explicitly authorizes elevated access. This helps prevent the impact of malware by requiring a confirmation before any high-impact changes are made to the system.

UAC settings in Security Options are Computer Configuration policies and apply to machines, not individual users. To target specific machines, link the GPO to the OU containing those computers, or use Security Filtering on the GPO to limit its scope to specific machine accounts.

Disabling UAC does not directly disable Windows Defender. However, some Windows Defender features rely on UAC to prompt for elevated permissions. Disabling UAC may reduce the visibility of certain security prompts related to Defender. If you need to disable Windows Defender Group Policy settings, those are managed separately under Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus.

Yes. Since UAC GPO settings are applied at the computer level, disabling or modifying UAC behavior affects all users who log into the targeted machines, including both standard users and administrators.

Yes. UAC group policy settings are fully reversible. To re-enable UAC, set the EnableLUA registry value back to 1 within the GPO, or remove the policy entirely. Changes will apply at the next Group Policy refresh or system restart.

Take the complexity out of GPO management using ADManager Plus

The one-stop solution to Active Directory Management and Reporting
Email Download Link Email the ADManager Plus download link