Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Issues installing an agent over the network (suspect UAC)

Posted on 2013-11-01
4
Medium Priority
?
282 Views
Last Modified: 2013-12-17
Hi guys,
Hope you are all well and can help.

Scenario:

Single forest
Domain 1 (root)
Domain 2 (sub domain)


Domain administrator on machine A in Domain 2 is trying to install a backup agent from machine A to machine B (which is a domain controller in the root domain). He is a domain admin on machine B.

He gets insufficient privileges message.

I have added him to every group imaginable.
Local admins, enterprise admins, domain admins...you name it.

I can log on locally with this account to the problem machine.

I suspect UAC or some group policy, since this is an over the network logon and install.

What settings should I check to see if UAC is the cause of this?

Thank you guys.
0
Comment
Question by:Simon336697
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 47

Accepted Solution

by:
noxcho earned 2000 total points
ID: 39618262
Have you tried simply disabling UAC on that mashine? Check if the WMI service and simple file sharing are enabled in firewall settings.
0
 
LVL 1

Author Comment

by:Simon336697
ID: 39618303
Hi noxcho.
Thanks for that.
That machine is  a domain controller.
0
 
LVL 1

Author Closing Comment

by:Simon336697
ID: 39723098
Thank you and sorry for the delay.
0
 
LVL 47

Expert Comment

by:noxcho
ID: 39723354
No problem. Was the UAC a cuplrit?
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Windows Server 2003 introduced persistent Volume Shadow Copies and made 2003 a must-do upgrade.  Since then, it's been a must-implement feature for all servers doing any kind of file sharing.
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question