Administrator Protection feature is essentially an OS-level Just-In-Time (JIT) privilege escalation control. The SMAA is hidden and the token is auto-destructed upon completion of the privileged action.
Count on Black Hatters annihilating this new security feature as they discover vulns with it.
Since LLM/AI is little more than just a crawler, aggregator and repackager of information it is able to access or is fed, what is described below might or might not be entirely accurate or complete. The Microsoft team responsible for the creation and development of Administrator Mode have made no detailed statements as to the exact internals, and probably never will. Most everything below is pulled by LLM/AI from third party, unofficial non-Microsoft sources except for the generalized Windows Blog article released by M$
Enhance your application security with administrator protection.
The thing about official Microsoft sources of infos is that they are often high level with a paucity of details, and therefore often inadequate. But that is the Microsoft way when it comes to documnentation.
View attachment 290736