Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Using "Run with Different Credentials" safely

Posted on 2006-07-06
3
Medium Priority
?
212 Views
Last Modified: 2012-05-05
I working to protect school computers using Windows Shared Computer Toolkit.

In order to run some old programmes I have found it necessary to use "Run with Different Credentials", using a specially created Administrator account called, say, Admin2 (although the name used is less obvious than this). I can supply the students with the password to Admin2 so they can run the programme. So far so good.

However I am concerned that, knowing the name/password combination they will be able remember it and use it at the main logon screen. I have prevented this account from showing in the list of users, but they could still access the account by using Ctl+Alt+Del twice.

Can you suggest another method or policy I can use to prevent login occurring in this way for Admin2 , or another method of providing access to the legacy programmes? The computers are not connecting to a domain.

I tried adding the user to the "Deny Logon Locally" policy but this prevented the legacy programmes from running.

Thanks.

Jim B.

0
Comment
Question by:JimBrook
  • 2
3 Comments
 
LVL 13

Accepted Solution

by:
prashsax earned 2000 total points
ID: 17054500
Here is a utility which allow you to mention the password using script.

http://www.jsifaq.com/SUBO/tip7100/rh7111.htm

Just create a script to run the program and then compile the script using bat2exe.

This way you don't have tell password to anyone and your application will work.
0
 

Author Comment

by:JimBrook
ID: 17055091
Thanks. I followed up on your advice and while looking how to implement it came across a utility called RunAs Professional which does most of the work for me.
0
 
LVL 13

Expert Comment

by:prashsax
ID: 17059947
Great.
ThankQ.
0

Featured Post

[Webinar] Database Backup and Recovery

Does your company store data on premises, off site, in the cloud, or a combination of these? If you answered “yes”, you need a data backup recovery plan that fits each and every platform. Watch now as as Percona teaches us how to build agile data backup recovery plan.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like me and like multiple layers of protection, read on!
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

578 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question