UAC continues to stay enabled after attempts to disable and reboot
Hi, I have been trying to disable user account control in Windows Vista SP2 in order to give a non-admin account more flexibility - specifically the ability to save files to an external USB drive. When the user tries to save a file they get a prompt stating that they require administrator permission. Usually I disable UAC by going into the Control Panel - User Accounts - Unchecking the "Use UAC" box, then restarting. I have one system where this will not stick - UAC continues to be enabled (the box is still checked even though i unchecked before restarting). I have also tried to do the following before a restart: Set the EnableLUA registry key to 0 Disable UAC via MSCONFIG Setting UAC settings to Disabled in the local security options Both had the same result - UAC is still enabled. Is there any other way to disable UAC and make it stick?
May 11th, 2011 1:30pm

Hi, Please change the Non-administrator account to Standard account. http://windows.microsoft.com/en-US/windows-vista/Change-a-users-account-type Regards,Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
May 17th, 2011 3:59am

I tried this, the Non-administrator account was already set to a standard user account. I also tried to create a new standard user account under Computer management but the problem continues.
September 20th, 2011 8:17am

I don't think it's a group policy thing but you can check by Click Start - All Programs - Accessories - Right click Command Prompt and choose Run As Administrator. Type gpresult /z I assume the registry key stays set until you reboot. If so download Process Monitor from http://technet.microsoft.com/en-us/sysinternals/bb896645 Start the program as an administrator (right click and choose Run As Administrator). Set the filter to Path Contains EnableLUA Include then Add then Ok. Click Options menu - Enable Boot Logging Reboot. Change the registry key. Reboot. Run Process Monitor this will tell us if something is changing the value on shutdown. In case something is changing it on startup. Run Process Monitor. Choose Enable Boot Logging. Change the registry key. Reboot. What does Process Monitor show for operations on that registry value. To copy a line Select it and choose Copy on the Edit menu. -- .. -- "Crispy1014" wrote in message news:245f62a8-ef8c-4a54-b709-59d486f94fcb... >I tried this, the Non-administrator account was already set to a standard >user account. I also tried to create a new standard user account under >Computer management but the problem continues. >
Free Windows Admin Tool Kit Click here and download it now
September 21st, 2011 8:37am

Thanks - after running Process Monitor I got some logs. I have not checked thoroughly yet but it looks like sometime in the reboot process, the registry key itself is deleted altogether, then a new key gets put in with the original value.
September 22nd, 2011 12:04pm

You'll be looking for operations such as RegDeleteValue, RegDeleteKey, RegSetValue, or RegSetKeyValue. The operation will have a process name which I suspect will be a security program. Don't forget that Group Policy can act this way. Setting values on boot and once per hour after bootup. So make sure you run GPResult /z in a command prompt and look for a policy that includes EnableLUA. -- .. -- "Crispy1014" wrote in message news:97fcc2f6-d23b-4fdd-96c1-1c1b85fcdaae... > Thanks - after running Process Monitor I got some logs. I have not > checked thoroughly yet but it looks like sometime in the reboot process, > the registry key itself is deleted altogether, then a new key gets put in > with the original value. >
Free Windows Admin Tool Kit Click here and download it now
September 23rd, 2011 9:51am

I think I have figured it out: The reason this has been resetting is due to a group policy object: Registry Policy Processing” is set to “Enabled”, and the option “Process even if the Group Policy objects have not changed” is checked. This policy ensures that the policies will be reprocessed even if none have been changed. This way, any unauthorized changes are forced to match the domain-based group policy settings again. If this is reset to not defined, which can be done by deleting the registry key Software\Policies\Microsoft\Windows\Group Policy\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}\. After that UAC can be disabled and it will stick. I have tested and so far t seems to work.
October 4th, 2011 12:07pm

@ Crispy1014 what is the complete REG KEY Thank You
Free Windows Admin Tool Kit Click here and download it now
October 4th, 2011 4:44pm

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy -- .. -- "Smithkjc" wrote in message news:e8c6bf3f-f86b-4729-ba4f-00e4b9a918f0... >@ Crispy1014 what is the complete REG KEY > > > > Thank You > > > > >
October 5th, 2011 5:14am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics