Solved

How to enable session shadowing for non local admin users

Posted on 2009-07-16
5
862 Views
Last Modified: 2013-11-21
Without adding the account to the local admin group, is there a way to enable that account to shadow other session in windows terminal server?

PS: I have already enable the remote session in the account property in AD and also added the account in the permission tab under the listener property.

Thanks.
0
Comment
Question by:Beta99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 

Expert Comment

by:JdixonCCNA
ID: 24872972
Try the following link...

http://support.microsoft.com/kb/278845
0
 

Expert Comment

by:JdixonCCNA
ID: 24873037
If you want to shadow the session without requiring the session owners permission, i.e. no prompt to accept the shadow on the users session, uncheck the require users permission checkbox in the RDP/TCP settings under Start-Programs-AdministrativeTools-Terminal Services Configuration.
0
 
LVL 31

Expert Comment

by:Henrik Johansson
ID: 24874681
Start the Terminal Services Configuration MMC
Double-click RDP/Tcp, and in the dialog select Security tab to modify the RDP-permisions. Use the Advanced button to grant the Remote Control permission for the user/group.
0
 

Author Comment

by:Beta99
ID: 24878011
JdixonCCNA, I don't have any issue shadowing any sessions, it's the ability to do it w/o admin rights that's my problem.

henjoh09, I've tried it and gave the user full rights but still get an "access denied" error when attempting to shadow a session.



0
 
LVL 31

Accepted Solution

by:
Henrik Johansson earned 125 total points
ID: 24878694
Modifying the permissions shall work, but changes in RDP-Tcp Properties doesn't affect current sessions makes the users to have to be logged of when doing the modification.
Just tested by myself to refresh my memory, and it doesn't work if the shadowed user is an administrator, propably caused by WIL (Windows Integrity Levels) restricting a process with lower authority token from accessing a process with higher authority token.
0

Featured Post

Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Welcome to my series of short tips on migrations. Whilst based on Microsoft migrations the same principles can be applied to any type of migration. My first tip Migration Tip #1 – Source Server Health can be found listed in my profile here: http:…
Remote Apps is a feature in server 2008 which allows users to run applications off Remote Desktop Servers without having to log into them to run the applications.  The user can either have a desktop shortcut installed or go through the web portal to…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question