we’re normally logged in as the local administrator on our machines
when a user signs in the system creates an access token for the user that contains info about the privs of the user including Security Identifier (SID)s and Windows Privileges
when an administrator logs on. two seperate access tokens are created for the user:
standard user access token
contains the same user-specific info as the administrator access token but with the administrative windows privileges and SIDs removed
used to start apps that dont perform admin tasks
is used to display the process explorer.exe which is the parent process from which all other user initiated processes inherit their access tokens. as a result all apps run as a standard user unless the user provides consent via User Account Control (UAC)