Solved

in W2K Pro, is it better to use administrator or user to install programs

Posted on 2001-09-06
6
145 Views
Last Modified: 2010-04-13
in W2K Pro, is it better to use administrator or user to install programs?

I would like to hear people's ideas regarding this.  I've worked at places where they've asked to give user local admin rights to computer and install programs that way.  Some other places, I've been asked to install programs as administrator.  IS THERE ONE BETTER SET WAY OF INSTALLING PROGRAMS, EITHER FROM ADMINISTRATOR OR FROM USER?  any ideas will be greatly appreciated.
0
Comment
Question by:losgadas
6 Comments
 
LVL 63

Accepted Solution

by:
SysExpert earned 100 total points
ID: 6462212
Administrator is probably the standard way since it gives full access to the machine, and most programs prefer it that way.

In addition , for multiple users on the same machine this is preferable.

If the user has full local admin rights, then it should not make any difference.

I hope this helps  !
0
 
LVL 15

Expert Comment

by:hewittg
ID: 6462418
I have had programs that had to be installed at the user level for them to work.  My common practice is to give them the admin rights, do the install and take it away afterwards.  Just my input.

Glenn
0
 
LVL 3

Expert Comment

by:Rem
ID: 6463425
Hi,

I agree with Glenn on this one.
No permanent local administration rights.
Always submit a new program to the sysop before.
If not people will install carloads of crap which is not exactly secure.

My 0.02$ worth input

Rem
0
NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

 
LVL 10

Expert Comment

by:Longbow
ID: 6463564
For the installations put the users in Power Users local group
0
 
LVL 4

Expert Comment

by:tituba2
ID: 6464394
Been my experience that the best way is to give user admin rights and install all the software.  I've tried it the other way and the registry just doesn't act the same way.
I then take away admin rights.  Power user rights still enables the user to do too much to their PC.

Sometimes, you have to go to explorer and right click the program file, properties, security and give them full rights to certain software programs.  Many of them write to an ini or registry when opened and if they don't have rights, it will throw an error.
0
 
LVL 11

Expert Comment

by:geoffryn
ID: 6464777
If you are also running 2000 servers on the backend, a good way to deal with installation is to publish the application through Active Directory and then modify the permissions to the published apps.  That will allow users to only install the published apps without requiring you to give them local admin rights.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Giving access to ESXi shell console is always an issue for IT departments to other Teams, or Projects. We need to find a way so that teams can use ESXTOP for their POCs, or tests without giving them the access to ESXi host shell console with a root …
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question