We have a requirement in out company that forces enabling the "UAC: Only elevate executables that are signed and validated" local security setting for all Windows servers.
This corresponds to setting HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures with a DWORD value of 1.
Can you confirm whether the installers and interactive management tools are signed in this manner for the latest patch version of 4.3 of Process Automation?
The first release of CA Process Automation to support UAC: Only elevate executables that are signed and validated is version 4.3 sp3.
If you need this additional level of security on your Windows servers please upgrade to 4.3 sp3 or later.