The version that you have installed has an built-in protection system to prevent unauthorized access. After you made the modification, it requires to perform the security verification to make sure that the administrator is making the changes, if you previously set them up, or otherwise to set them up now. For additional information about this, visit the official website.