Solved

User Account Control

Posted on 2014-10-15
3
178 Views
Last Modified: 2014-10-24
I have a set of users who all use a particular application to do their work. They all use Windows 7 SP1 64-bit Professional. The application in question will not update unless these users are local administrators on their machine and UAC is deactivated.

A couple of these users have abused the ability to install programs onto their computer and it's becoming a problem.

Is there a way to selectively deactivate UAC by path or application such that it will still update, but keeping the usual UAC activity normal?

I have attempted to make the user an owner in the folder that the program is in, and I used this:

http://social.technet.microsoft.com/wiki/contents/articles/19900.how-to-make-uac-exception-for-applications-in-windows-vista-windows-7-and-windows-8.aspx

however, it did not achieve the desired result.

Thank you!
0
Comment
Question by:flipm0
  • 2
3 Comments
 
LVL 90

Accepted Solution

by:
John Hurst earned 500 total points
ID: 40382213
You should never disable UAC - to do so invites problems.

If the application vendor cannot provide a fix, look at a different application. Everything we run for all our clients runs with UAC enabled.
0
 
LVL 50

Expert Comment

by:jcimarron
ID: 40382524
flipm0 --
Here is a detailed explanation of how to create elevated shortcuts for programs that you wish to open without involving UAC.
http://www.thewindowsclub.com/create-elevated-shortcut-run-programs-bypass-uac

 For other programs I suggest you use the Default setting in the User Account Control Settings window.  That is the notch second from the top in the slider.
0
 
LVL 90

Expert Comment

by:John Hurst
ID: 40402789
@flipm0  - Thank you and I was happy to help you with this.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Image capture and Deploy method is consist on two phases. In our first phase we capture the image of windows from the PC in which Windows and others softwares are already installed. In second phase we deploy the created image on new PC in which we…
When you use the right mouse button (assuming you're right handed) to click something in Windows, you usually get what is called a "context menu".  It's called that because the items in the menu vary according to context, that is, according to where…
In this Micro Tutorial viewers will learn how to use Boot Corrector from Paragon Rescue Kit Free to identify and fix the boot problems of Windows 7/8/2012R2 etc. As an example is used Windows 2012R2 which lost its active partition flag (often happen…
This Micro Tutorial will go in depth within Systems and Security in Windows 7 and will go into detail regarding Action Center, Windows Firewall, System, etc. This will be demonstrated using Windows 7 operating system.

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now