Solved

Specify install rights with group policy?

Posted on 2008-10-01
5
456 Views
Last Modified: 2013-12-05
Is it possible to run a software install or file modification via an Active directory login script on a PC that doesn't have rights to perform those changes?  I.e., a "Run as..." option?
0
Comment
Question by:lenwruk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 4

Assisted Solution

by:aerion85
aerion85 earned 50 total points
ID: 22617782
0
 
LVL 4

Accepted Solution

by:
lscapa earned 200 total points
ID: 22634123
Runas is not secure since it still requires a password. MS recommends using a GP to assign or publish an application to. This will install the application as LOCAL SYSTEM and have elevated rights. All without the need to enter a password at the workstation.
http://support.microsoft.com/kb/816102
While SCCM or LanDesk would be better this method will work as well.
 
0
 

Author Comment

by:lenwruk
ID: 22675241
Sorry, I found this solution as well 6 hours after I made the post
0
 

Author Comment

by:lenwruk
ID: 22675246
Sorry, I found this solution as well 6 hours after I made the post
0
 

Author Closing Comment

by:lenwruk
ID: 31502121
Even though I found the answer also, it's only proper to reward your efforts.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question