I am trying to put together a login script that will gather info about a user's login session processes using a command like this:
tasklist.exe /v /fo list
I would like for a standard AD domain user to display al list of processes on, and also what user owns them. I am able to do this while logged in as a domain admin, but get incomplete information as a non-admin. Specifically, it will only return "N/A" in the user name field where I would normally expect "DOMAINNAME\Username" attached to the process.
I don't want to make everyone a local admin to make this work, so I am looking for a specific setting probably in the Local Security Policy either under User Rights Assignment or Security Options. If anyone knows the setting, I can analyze is and decide if the reduced security is acceptable.