can someone explain to me the point of this security policy
like what kind of problem is this trying to solve when there are 5 million other signed system executables capable of proxy execution

@still

That is a bit of a strange one as UAC is not a security boundary, allegedly.

Microsoft change their minds on that one as the mood suits though 🤔🤷‍♂️