Windows 10 User Account Control (UAC) dialogs can be frustrating. They add an extra step to the process every time you run an exe file or run a program as administrator. Therefore, it is tempting to completely disable UAC in Windows 10, but you should understand the risks associated with such a change.
What is UAC in Windows 10?
User Account Control in Windows 10 is an integral part of operating system security. When an app tries to make changes to your PC, it kicks in and asks for confirmation. Acceptance allows the program to act temporarily with all user rights: administrator rights.
Without UAC, it can be insignificant for malware to compromise your computer. Apps will not require your approval to make changes to your system and may make changes without your knowledge.
Therefore, we can only recommend that you disable UAC under specific circumstances. For example, if you have a user account without administrator privileges and a separate administrator account to perform installation or configuration tasks.
If you are sure you are safe, this guide will show you how to disable UAC in Windows 10 through Control Panel, Registry or Local Group Policy Editor.
How to turn off UAC in Windows 10 through Control Panel
Disabling UAC through the control panel is the most user-friendly route and leaves little room for error. However, it should be noted that you will still need administrator rights to be able to do this. Switch to your administrator account if you need to, or ask your IT department if you are in a business or education scenario.
- Open the control panel
hurry Start and type “Control Panel“. Click on the first result, “Control Panel”, in the Start menu.
- Click on “User Accounts” in the Control Panel
- Click again on “User accounts”
- Tap “Change User Account Control Settings”
At this point, you will need to accept a UAC prompt to make changes.
- Disable UAC in Windows 10
In the User Account Control Settings window, you will see a slider under the “Choose when to be notified of changes to your computer” heading. To turn User Account Control off completely, move the slider down until it says “Never notify”.
Click on “OKAY” and accept your final UAC prompt.
How to Disable Windows 10 UAC Via Registry Editor
Power users can turn off User Account Control through the registry if they dislike or have limited access to the Control Panel interface.
- Open the registry editor
press the Start button and type “Registry editor”. Click on the first result in the Start menu.
- Modify the DWORD “EnableLUA”Disabling UAC via the registry is still fairly straightforward. In its search bar, paste
In the main pane, scroll down the list or tap E on your keyboard until you find an entry called “ActivateLUA”. Double click on it to open the DWORD editor and edit the “Value data” field to “0”. If you don’t have the DWORD value, you can create it yourself. When you’re done, tap “OKAY” to save the changes, then restart your computer.
How to disable UAC through the Local Group Policy Editor
Windows 10 Pro or higher users additionally have access to the Group Policy Editor, commonly known by its file name, gpedit. This makes changes similar to Regedit but offers a more secure and intuitive interface.
- Open gpedit
hurry Start and type “gpedit”. Click on the first result in your Start menu, which should read “Modify group policy”.
- Double click on User Account Control policy
Move towards “Windows Settings> Security Settings> Local Policies> Security Options”. In the main panel, scroll down until you find “User Account Control: Run all administrators in administrator approval mode” if you want to disable UAC.
- Disable User Account Control
Change the toggle “Enabled” To “Disabled”. hurry “OKAY” to turn off UAC in Windows 10.
We’ve covered the different methods to turn off UAC today, but there are other UAC options you can consider. Here’s a full list (via Microsoft):
|Registration key||Group Policy setting||Registry Parameter|
|FilterAdministratorToken||User Account Control: Administrator approval mode for the built-in administrator account||0 (default) = disabled 1 = enabled|
|ActivateUIADesktopToggle||User Account Control: Allow UIAccess apps to request elevation without using the secure desktop||0 (default) = disabled 1 = enabled|
|PromptBehaviorAdmin consent||User Account Control: Behavior of the elevation prompt for administrators in administrator approval mode||0 = Raise without asking 1 = Request credentials on secure desktop 2 = Request consent on secure desktop 3 = Request credentials 4 = Request consent 5 (default) = Request consent for non-Windows binaries|
|PromptBehaviorUser Consent||User Account Control: Behavior of the elevation prompt for standard users||0 = Automatically deny elevation requests 1 = Request credentials on secure desktop 3 (Default) = Request credentials|
|Enable installer detection||User Account Control: Detect app installations and invite elevation||1 = Enabled (default for home) 0 = Disabled (default for business)|
|ValidateAdminCodeSignatures||User Account Control: only elevate signed and validated executables||0 (default) = disabled 1 = enabled|
|Enable SecureUIAPaths||User Account Control: only elevate UIAccess apps installed in secure locations||0 = disabled 1 (default) = enabled|
|ActivateLUA||User Account Control: Run all admins in admin approval mode||0 = disabled 1 (default) = enabled|
|Prompt on secure desktop||User Account Control: switch to secure desktop when requesting elevation||0 = disabled 1 (default) = enabled|
|Enable virtualization||User Account Control: Virtualize file and registry write failures in per-user locations||0 = disabled 1 (default) = enabled|
However, before making any of these changes, we recommend that you read our existing Registry Editor documentation. Learn how to use regedit safely and create an automatic registry backup so that you are fully prepared.