Solved

Run SpySweeper as a service?

Posted on 2004-08-06
5
443 Views
Last Modified: 2013-12-04
I'd like to run SpySweeper as a service on a PC where the user logs in to a non-privileged account.

My objective is to have SpyWeeper run in a privileged account without having to give the users the password to a priviledged account.

Any reason why a standard "run as a service" using Srvany.exe and Instsrv.exe on Win2K and WinXP worstations won't work?

Any other suggestions?

TIA.

Terry
0
Comment
Question by:CTThroop
  • 2
  • 2
5 Comments
 
LVL 57

Accepted Solution

by:
Pete Long earned 125 total points
ID: 11745947
try

How to run a program as a Service


The Windows NT Resource Kit provides two utilities that allow you to create a Windows NT user-defined service for Windows NT applications and some 16-bit applications (but not for batch files).

Instrsrv.exe installs and removes system services from Windows NT and Srvany.exe allows any Windows NT application to run as a service.


HOWTO: Create a User-Defined Service
http://support.microsoft.com/default.aspx?scid=kb;en-us;137890

**********

To remotely create and start a service from the command line, you can use the SC tool (Sc.exe) included in the Resource Kit.

Although you can use the Netsvc.exe and Instsrv.exe tools to start a service on a remote computer, these tools do not give you the ability to remotely create a service.


How to Create a Windows Service Using Sc.exe
http://support.microsoft.com/?kbid=251192

**********Third Party Solutions**********

Service Mill from http://www.activeplus.com/default.asp?Jump=ServiceMill
FireDaemon from http://www.firedaemon.com/

**********
0
 

Author Comment

by:CTThroop
ID: 11765105
Thanks Pete,

I'll try some of those ideas.

Terry
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 11766012
ThanQ
0
 

Expert Comment

by:DKelsey01
ID: 12043258
Has anyone tried to implement these techniques for this particular issue with this software?

It is quite counter-intuitve, and--alas--common, that a product that can be tailored to be such a boon for all users, but will not run under most of them.  It is almost laughable:  the number of larger vendors whose software seems to be completely oblvlivious to account security remains stubbornly high.  It seems a pretty good indicator that security, in general, is still not of primary industry focus amongst many product designers, amidst mid- and upper-level software company management, etc. (though there are many who are accutely aware of these things, there are still too many whose approach is, "Well, why can't you just make EVERYONE in your ENTERPRISE a FULL ADMINISTRATOR? ...Doesn't that FIX the problem??").

Yea, that's a good solution.  And I think I want the janitor, lawn crew, and receptionist to all have keys to the vault for the bank I'm planning.  It will be easy for everyone to get in there, should they need to.  NOT!

Any insights into this approach with Spy Sweeper would be very helpful.  A lot of people are having this issue, PC Magazine just reviewed it again (v. 3.x) and gave it high marks, but nearly 100% of the resulting user feedback remarked about this very issue, and how it could be missed.  There were also some remarks about how it can hog up system resources even when no browser is open.  If WebRoot can address this they should probably eliminate the lion's share of their product's highest (warranted) foible.
0
 

Expert Comment

by:DKelsey01
ID: 12046153
OK...we tried this approach and it failed on the first three attempts.  Essentially, the service was created successfully but the software then complained the same way it does if trying to log in as a Limited User after first installing it and making no registry changes:  it says that if this "must" happen, to start the SpySweeper program using the "local administrator" credentials (? I thought that the System account had this type of credentials, and that services set to execute upon boot were, by default, endowed with System rights??).

Has anyone succeeded in getting this to work yet?

We are using a Win2k Domain with mostly generic System Policies, all WinXP Pro Sp1 desktops and all limited users.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now