• Online, Self-Paced
Course Description

In this challenge you will configure User Account Control (UAC). First, you will determine whether UAC is in effect, and then you will alter UAC configuration via Group Policy Object. Next, you will disable UAC via Group Policy Object, and then you will enable UAC via Group Policy Object. Finally, you will alter UAC for a local administrator, and then you will alter the PowerShell Execution Policy. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.

Learning Objectives

In this challenge you will configure User Account Control (UAC). First, you will determine whether UAC is in effect, and then you will alter UAC configuration via Group Policy Object. Next, you will disable UAC via Group Policy Object, and then you will enable UAC via Group Policy Object. Finally, you will alter UAC for a local administrator, and then you will alter the PowerShell Execution Policy. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.