User Account Control: Virtualize file and registry write failures to per-user locations

Information

User Account Control: Virtualizes file and registry write failures to per-user locations

This security setting enables the redirection of legacy application write failures to defined locations in both the registry and file system. This feature mitigates those applications that historically ran as administrator and wrote runtime application data back to either %ProgramFiles%, %Windir%; %Windir%\system32 or HKLM\Software\....

Virtualization facilitates the running of pre-Vista (legacy) applications that historically failed to run as Standard User. An administrator running only Windows Vista compliant applications may choose to disable this feature as it is unnecessary.

The options are:

Enabled: Facilitates the runtime redirection of application write failures to defined user locations for both the file system and registry.

Disabled: Applications that write data to protected locations will simply fail as they did in previous versions of Windows.

Default : Enabled

Solution

Policy Path: Security Options
Policy Setting Name: User Account Control: Virtualize file and registry write failures to per-user locations

See Also

https://techcommunity.microsoft.com/t5/microsoft-security-baselines/windows-11-security-baseline/ba-p/2810772

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-29(1)

Plugin: Windows

Control ID: 02a446768308cf74715510cd9db5291fcb51d5a0f79342f325029030538915d1