09.02.2014 Views

Windows sysinternals

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

16 Part I Getting Started<br />

unrestricted access to the computer and all its resources, while Users are restricted from<br />

making changes to operating system configuration or accessing data belonging to other<br />

users. For historical reasons, however, until recently end users on <strong>Windows</strong> computers were<br />

frequently granted administrative access, so many people have remained unaware that these<br />

distinctions exist. (Even today, the first local user account created on a <strong>Windows</strong> 7 computer<br />

is a member of the Administrators group.)<br />

Note Users can have effective administrative control over a computer without explicit membership<br />

in the Administrators group if they are given the ability to configure or control software that<br />

runs in a more powerful security context—for example: granting users control over systemwide<br />

file or registry locations used by administrators or services (as Power Users had before <strong>Windows</strong><br />

Vista); granting users “admin-equivalent” privileges such as the Debug, Take-Ownership, Restore,<br />

or Load Driver privileges; or enabling the AlwaysInstallElevated <strong>Windows</strong> Installer policy, under<br />

which any MSI file launched by any user runs under the System account.<br />

Recently, organizations wishing to improve security and reduce costs have begun moving<br />

toward a “non-admin” model for their end users. And with <strong>Windows</strong> Vista’s introduction of<br />

User Account Control (UAC), most programs run by users—including those who are members<br />

of the Administrators group—execute with user rights, not administrative rights. However,<br />

it sometimes becomes necessary to run a program with administrative rights. While many<br />

people didn’t know how to do this in <strong>Windows</strong> XP, <strong>Windows</strong> Vista changed those methods<br />

significantly.<br />

Many of the Sysinternals utilities always require administrative rights, while many have full<br />

functionality without them. Some, however, are able to work correctly with standard user<br />

rights but have features that need administrative rights, and thus operate in a “partially<br />

degraded” mode when executed with standard user rights.<br />

Running a Program with Administrative Rights on <strong>Windows</strong><br />

XP and <strong>Windows</strong> Server 2003<br />

If you log on to a <strong>Windows</strong> XP or <strong>Windows</strong> Server 2003 computer with an account that is a<br />

member of the Administrators group, no special steps are required to run a Sysinternals utility<br />

with administrative rights. Every program you run has full administrative rights.<br />

But if you log on to that same computer with an account that does not have the required<br />

privileges to run a particular Sysinternals utility, you will need to get the administrative rights<br />

from a different user account. The Secondary Logon (Seclogon) service enables programs to<br />

start a new process as a different user on the current desktop by supplying alternative credentials.<br />

Two programs that expose this functionality are Explorer’s Run As dialog box and<br />

the Runas.exe command-line utility.<br />

www.it-ebooks.info

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!