UAC continues to stay enabled after attempts to disable and reboot
Hi,
I have been trying to disable user account control in Windows Vista SP2 in order to give a non-admin account more flexibility - specifically the ability to save files to an external USB drive. When the user tries to save a file they get a prompt stating
that they require administrator permission.
Usually I disable UAC by going into the Control Panel - User Accounts - Unchecking the "Use UAC" box, then restarting. I have one system where this will not stick - UAC continues to be enabled (the box is still checked even though i unchecked before
restarting).
I have also tried to do the following before a restart:
Set the EnableLUA registry key to 0
Disable UAC via MSCONFIG
Setting UAC settings to Disabled in the local security options
Both had the same result - UAC is still enabled.
Is there any other way to disable UAC and make it stick?
May 11th, 2011 8:30pm
Hi,
Please change the Non-administrator account to Standard account.
http://windows.microsoft.com/en-US/windows-vista/Change-a-users-account-type
Regards,Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
May 17th, 2011 10:59am
I tried this, the Non-administrator account was already set to a standard user account. I also tried to create a new standard user account under Computer management but the problem continues.
September 20th, 2011 8:25am
I don't think it's a group policy thing but you can check by
Click Start - All Programs - Accessories - Right click
Command Prompt and choose Run As Administrator. Type
gpresult /z
I assume the registry key stays set until you reboot. If so download Process
Monitor from
http://technet.microsoft.com/en-us/sysinternals/bb896645
Start the program as an administrator (right click and choose Run As
Administrator).
Set the filter to
Path Contains EnableLUA Include
then Add then Ok.
Click Options menu - Enable Boot Logging
Reboot. Change the registry key. Reboot.
Run Process Monitor this will tell us if something is changing the value on
shutdown.
In case something is changing it on startup.
Run Process Monitor. Choose Enable Boot Logging. Change the registry key.
Reboot.
What does Process Monitor show for operations on that registry value.
To copy a line Select it and choose Copy on the Edit menu.
--
..
--
"Crispy1014" wrote in message news:245f62a8-ef8c-4a54-b709-59d486f94fcb...
>I tried this, the Non-administrator account was already set to a standard
>user account. I also tried to create a new standard user account under
>Computer management but the problem continues.
>
Free Windows Admin Tool Kit Click here and download it now
September 21st, 2011 8:40am
Thanks - after running Process Monitor I got some logs. I have not checked thoroughly yet but it looks like sometime in the reboot process, the registry key itself is deleted altogether, then a new key gets put in with the original value.
September 22nd, 2011 12:08pm
You'll be looking for operations such as RegDeleteValue, RegDeleteKey,
RegSetValue, or RegSetKeyValue. The operation will have a process name which
I suspect will be a security program.
Don't forget that Group Policy can act this way. Setting values on boot and
once per hour after bootup. So make sure you run
GPResult /z in a command prompt and look for a policy that includes
EnableLUA.
--
..
--
"Crispy1014" wrote in message news:97fcc2f6-d23b-4fdd-96c1-1c1b85fcdaae...
> Thanks - after running Process Monitor I got some logs. I have not
> checked thoroughly yet but it looks like sometime in the reboot process,
> the registry key itself is deleted altogether, then a new key gets put in
> with the original value.
>
Free Windows Admin Tool Kit Click here and download it now
September 23rd, 2011 9:54am