Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Administrative privileges - Wireless Networking

Posted on 2004-08-16
3
Medium Priority
?
199 Views
Last Modified: 2010-04-14
How to provide administrative privileges to separate programs while operating under a power users group account?

It is my recollection from NT training that it is inadvisable to surf the internet under an administrative account.

D-Link wireless network support swears that there is no danger in regularly surfing the internet under an admin account so long as virusware et.al. is up to date.

The wireless utilities that run at startup seem to require an administrative account in order to operate (i.e. no internet access unless under an admin accct).

It seems that there ought to be some way to give these utilities (Run As?) administrative privileges while under a power users group account - w/o compromising security.

As yet I have not determined how to do this properly and am unsure as to whether this is really an issue or not given the feedback from D-Link.

I also ran into this problem with some volunteer work I was doing for the local Humane Society with their QuickBooks program requiring administrative privileges.  This results in the bookkeeper having admin privileges - this cannot possibly be the only solution.

All advice appreciated
0
Comment
Question by:tometh
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 7

Accepted Solution

by:
wtrmk74 earned 750 total points
ID: 11816013
If the users require access to a specific program you can always add the USERS to the security group tab within the program itself.

The drawback is that it doesn't always work if the required software is bound to a particular piece of hardware.

you would then have to go into REGEDT32 and add the USERS to the HARDWARE as necessary.

:)
Wtrmk74
0
 

Author Comment

by:tometh
ID: 11817596
Thanks for the response.  Sorry, how do I do this? I am completely unfamiliar with "the security group tab within the program itself" .
0
 

Author Comment

by:tometh
ID: 11817660
Disregard last comment - I understand what you are referring to - I'll get back later with results
0

Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
WooCommerce is becoming the most powerful e-commerce plugin for Wordpress. And why not. The platform comprises of numerous core plugins that may come in handy, powerful options to make your website development task much easier.
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question