Solved

Using "Run with Different Credentials" safely

Posted on 2006-07-06
3
201 Views
Last Modified: 2012-05-05
I working to protect school computers using Windows Shared Computer Toolkit.

In order to run some old programmes I have found it necessary to use "Run with Different Credentials", using a specially created Administrator account called, say, Admin2 (although the name used is less obvious than this). I can supply the students with the password to Admin2 so they can run the programme. So far so good.

However I am concerned that, knowing the name/password combination they will be able remember it and use it at the main logon screen. I have prevented this account from showing in the list of users, but they could still access the account by using Ctl+Alt+Del twice.

Can you suggest another method or policy I can use to prevent login occurring in this way for Admin2 , or another method of providing access to the legacy programmes? The computers are not connecting to a domain.

I tried adding the user to the "Deny Logon Locally" policy but this prevented the legacy programmes from running.

Thanks.

Jim B.

0
Comment
Question by:JimBrook
  • 2
3 Comments
 
LVL 13

Accepted Solution

by:
prashsax earned 500 total points
ID: 17054500
Here is a utility which allow you to mention the password using script.

http://www.jsifaq.com/SUBO/tip7100/rh7111.htm

Just create a script to run the program and then compile the script using bat2exe.

This way you don't have tell password to anyone and your application will work.
0
 

Author Comment

by:JimBrook
ID: 17055091
Thanks. I followed up on your advice and while looking how to implement it came across a utility called RunAs Professional which does most of the work for me.
0
 
LVL 13

Expert Comment

by:prashsax
ID: 17059947
Great.
ThankQ.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now