Manipulating the registry for which the current user has access will not itself invoke the UAC prompt.
However, when using an application with a manifest requiring elevation, if it is running as an administrator with a failed request.
Are you trying to use regedit.exe to perform a batch operation? If so, replace reg.exe (using cmd.exe ) or, better, built-in PowerShell registry support.
Eg.
get-itemproperties 'HKLM:\SOFTWARE\Classes\Folder'
It will not require elevation (since this key is read by everyone), but an elevated PSH session will be required to set the property on this key.
An alternative approach if you perform operations that require administrative access (you need to modify access to some object with an ACL that restricts the modification to administrators). Or, something a non-administrator could never do UAC or not, without entering the credentials of an administrator account.
Consider using the task scheduler: a trigger for a user to log in, but configured under a specific administrator account.
Summary: you really need to know at least one of the things you do that UAC triggers in detail.
source share