Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Specify install rights with group policy?

Posted on 2008-10-01
5
453 Views
Last Modified: 2013-12-05
Is it possible to run a software install or file modification via an Active directory login script on a PC that doesn't have rights to perform those changes?  I.e., a "Run as..." option?
0
Comment
Question by:lenwruk
  • 3
5 Comments
 
LVL 4

Assisted Solution

by:aerion85
aerion85 earned 50 total points
ID: 22617782
0
 
LVL 4

Accepted Solution

by:
lscapa earned 200 total points
ID: 22634123
Runas is not secure since it still requires a password. MS recommends using a GP to assign or publish an application to. This will install the application as LOCAL SYSTEM and have elevated rights. All without the need to enter a password at the workstation.
http://support.microsoft.com/kb/816102
While SCCM or LanDesk would be better this method will work as well.
 
0
 

Author Comment

by:lenwruk
ID: 22675241
Sorry, I found this solution as well 6 hours after I made the post
0
 

Author Comment

by:lenwruk
ID: 22675246
Sorry, I found this solution as well 6 hours after I made the post
0
 

Author Closing Comment

by:lenwruk
ID: 31502121
Even though I found the answer also, it's only proper to reward your efforts.
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This script can help you clean up your user profile database by comparing profiles to Active Directory users in a particular OU, and removing the profiles that don't match.
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

837 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question