DameWare Home  |   Product History  |   Community  |   Sales  |   Resellers  |   Contact Us  
Article - #400103   

 

Administrator gets an "Access denied" error when they try to perform administrative functions on a client with UAC enabled

 
The information in this article applies to:
  • DameWare Remote Support - Version(s) All

Issue
When you use NTU to connect to any Windows computer with User Account Control (UAC) enabled, Windows denies you access to administrative functions such as viewing or editing disk drives, services, or the registry. This issue is directly related to UAC, and cannot be resolved in the NTU program.

For additional information, see the following Microsoft knowledgebase article: http://support.microsoft.com/kb/951016.

Workaround
To gain remote access to administrative features on computers with UAC enabled, complete the following procedure.

  1. Connect to the remote computer using Remote Control > RDP View in NTU, or Windows Remote Desktop.
  2. On the remote computer, open Registry Editor (regedit.exe).
  3. Expand HKEY_LOCAL_MACHINE > SOFTWARE > Microsoft > Windows > CurrentVersion > policies, and then select system.
  4. Add the DWORD Value, LocalAccountTokenFilterPolicy: Click Edit > New > DWORD Value, and then enter LocalAccountTokenFilterPolicy.
  5. Assign the DWORD a value of 1:
    1. Select the new value, and then click Edit > Modify.
    2. Select Decimal.
    3. Enter 1.
    4. Click OK.
  6. Close Registry Editor.
  7. Disconnect from the RDP View or Remote Desktop session.

The next time you connect to the remote computer with an administrative account using NTU, you will be able to access the administrative functions on the remote computer.

 


Knowledgebase Article: #400103
Category: General Information
O/S Info: Windows 7, Windows Server 2008, Windows Vista
Last Revised: Monday, April 23, 2012
Keywords: errors, failed, fails, failure, message, messages
Description: Resolves an issue that prevents NTU users from accessing administrative functions on remote computers by providing a Registry workaround to alter the way UAC behaves with non-local administrative accounts.
How would you rate this article?
 12345678910 
Not HelpfulVery Helpful
Please tell us why you are rating this article this way.
If you need to enter a URL please remove "http://".
Please note: this field is required for negative responses.

No HTML please.                          
 

12345678910
Average rating:  7.3 out of 10.
12 people have rated this article.
   ©2003-2017 SolarWinds. All rights reserved.
    Terms of Use  |  Privacy Policy  |  Trademarks  |  EULA  |  End of Life