Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 10 Current »

User Account Control (UAC) helps prevent unauthorized changes to computers in your system, but they can also annoy users. You can use Application Control Solution to suppress UAC prompts for many common processes and programs but still have it provide an additional layer of security.

This document describes how you can determine which files need to be managed by ACS to suppress the UAC prompts:

  1. Check the UAC prompt details
  2. Search for “has image name”

Note:

You can also use this information to determine which processes ACS needs to elevate privileges for.

Check the UAC prompt details

Run the process or program to the point where the UAC prompt appears and then click the Show Details link. The details section in the top of the page will show the file that is attempting to start and need to be managed by ACS.

Note

The UAC dialog box that you see may vary from the example in the screenshot, but the basic layout is the same with the Show/Hide details at the bottom left side, and the details in the upper middle section.

Search for "has image name"

If the UAC prompt page does not give enough information then a more extensive investigation will be necessary. 

  1. Increase the logging level on the client machine which has the ACS agent installed to 1f. It may help to clear the log files on the client machine to expedite the search.
  2. Turn off the secure desktop.
  3. Download and run the Process Explorer from Microsoft (for information on how to use the Process Explorer, go to the following heading Use Process Explorer from the former SysInternals). Because secure desktop is turned off, Process Explorer will run behind the UAC prompts on your screen (just drag the UAC dialog box to the side). 
  4. Right-click the process and click Properties to view process details.
  5. Execute the process or program in question.
  6. Search for "has image name" in the ACS_.log files on the client machine.  All the processes which ACS is detecting will be listed there.
  7. Keep track of the processes in a table if necessary like the following:

    Process name

    PID

    Parent PID

    Start time

    End time

     

     

     

     

     

     

     

     

     

     

  8. Search for "process start" in the ACS_.log files and put the PID in the table.
  9. Then search forwards and backwards for the PIDs in question and fill out the rest of the table.  Note:  If the process did not finish then there will be no end time.  Just use the last entry time.
  10. Then evaluate the data in the table and see which process needs the Application Initiation policy or a standard Application Control policy with a Rights Action (maybe including the using the Users unrestricted token).

Use Process Explorer from the former SysInternals

Use Process Explorer from the former SysInternals (now with Microsoft) - Process Explorer download

Run Process Explorer and by default it will show the hierarchy of the processes running on the computer.  Elevating or applying UAC to the parent process and allowing it to flow to child processes if necessary will usually be the correct action.  Process Explorer can be used to find out what process or process family runs a window or parts of a window.  With Process Monitor there is an icon on the menu bar which looks kind of like a target.  Clicking and dragging on that icon over any window on the screen will highlight part or all of the window.  When the item which needs to be elevated is highlighted release the mouse button and Process Explorer will  highlight in its list of processes the process which runs that window or part of a window.  That process or its parent process would be the appropriate place to test elevating the process to see if it is the corrrect process.

  • No labels