Filtered Token.
When a user with administrative rights, other powerful...
Does this mean that you have configured the local administrators group on the Windows 7 machine to include all members of the "Domain Users" group?All users are in the local administrators group
Does this mean that you have configured the local administrators group on the Windows 7 machine to include all members of the "Domain Users" group?
Kevin et al,
I have run into the same issue ... the first time it happened, I discounted it as an aberration. Today, it happened again. The Administrators group has Full Control, but I get errors telling me I lack sufficient permissions. Then, I assign the Users group Full Control, and the error goes away.
I am a member of the Administrators group. I never saw this issue on WinXP. I have seen it 2x now in the ~1 month that I have had Win7.
My workaround to this point has been to take the offending file and assign Full Control to the Users group. I'm sure this is sub-optimal from a security perspective, so I'm definitely open to suggestions.
We also use AD.
Thanks!!
SOURCE: User Account Control Step-by-Step GuideFiltered Token.
When a user with administrative rights, other powerful privileges, or a specific group membership logs on, the Windows operating system creates two access tokens that represent the user account. One has all the user’s group memberships and privileges, while the filtered token represents the user with the equivalent of standard user rights. A filtered token is used to run the user’s programs by default. An unfiltered token is associated only with elevated programs. An account that is a member of the Administrators group and gets a filtered token at logon is called a Protected Administrator account.
When an administrator logs on to a computer that is running Windows 7, Windows Vista, Windows Server 2008 R2, or Windows Server 2008, the user is assigned two separate access tokens. Access tokens, which contain a user's group membership and authorization and access control data, are used by the Windows operating system to control what resources and tasks the user can access.
UAC
Unlike earlier versions of Windows, when an administrator logs on to a computer running Windows 7, Windows Vista, Windows Server 2008 R2, or Windows Server 2008, the user’s full administrator access token is split into two access tokens: a full administrator access token and a standard user access token. During the logon process, authorization and access control components that identify an administrator are removed, resulting in a standard user access token. The standard user access token is then used to start the desktop, the Explorer.exe process. Because all applications inherit their access control data from the initial launch of the desktop, they all run as a standard user.
On the individual machines you can check and adjust the local user account control settings by simply typing
user account control
into the search box and hitting enter. You can then turn it off by sliding the control all the way to the bottom and rebooting to test and see if that is what is producing your issues.
And yes choosing "Run as Administrator" is also a potential option, however depending on the application your results can very as to how successful that option can be. You can set this option to be persistent, by simply right clicking the shortcut to the executeable and choosing properties and then the compatability tab and checking the box and you can set other compatability options there as well.
Keep us posted.
Regards
Randy