X
x
User Account Control appears to be dropping privileges from inbuilt groups
other than just Administrators (except Authenticated Users)?
I use a separate logical drive for data and use "standard" user accounts.
The partition is NTFS-formatted. For convenience instead of adding each
login name that should have access to the drive with modify privileges (and
below) I just added the Power Users group (with modify and below) privileges
and made each user a member of Power Users. Because I don't want all users
to access the drive I removed "Authenticated Users" and "Users" from the
access list. The access list shows SYSTEM - Full Control, Administrators -
Full Control, Power Users - Modify.
This worked fine on XP but under Vista when any of the standard user
accounts are used, Computer shows no space information. When I click on the
drive, I get the message box saying "F:\ is not accessible. Access is
denied".
If I use Advanced Security, click the Effective Permissions tab, and type in
the group name of Power Users, all the boxes are checked apart from Full
Control, telling me that the logon on user should be able to read. write
etc.
To prove the security setup was okay, I turned UAC off, rebooted, and
retried. This time Windows Explorer shows space information for that drive,
any standard user account in the Power Users group can read and modify data
on it okay.
I turned UAC back on, rebooted and retried the test and the missing space
information and "F:\ is not accessible. Access is denied" problems returned.
I am aware that the Power Users group only exists for compatibility reasons
and thought it may be that it doesn't have any privileges any more so I
tried a couple of other groups, Backup Operators, and Network Configuration
Operators in place of Power Users but the same problems occur with UAC
turned on.
The only way I seem to be able to use groups with UAC is if I create a group
of my own instead of using the inbuilt groups. Then if I do the above test
using my Test group instead of Power Users/Backup Operators/Network
Configuration Operators it works.
I completely uninstalled my Internet Security system, including running the
vendor's special "cleanup" tool to ensure it was completely gone, used
MSCONFIG to turn off all startup items and non-Microsoft services, then
rebooted, but this made no difference to the results of the tests: UAC on,
no access. UAC off, access is okay.
My understanding of UAC is that it turns off Administrator privileges so
even if a logon is a member of the Administrators group the default
environment is non-Administrative. I've been searching documents and the
Internet and I haven't seen it mentioned anywhere that UAC also turns off
other privileges from other inbuilt groups.
By the way you may be wondering why I was keen on using Power Users instead
of a group name of my own making. It's because I use the same technique with
removable hard disks, which I switch between two systems. It worked fine in
XP and saved me having to mess about changing access lists permitting users
logons on each system to the drive every time I switched it (due to SID
differences). But my understanding is that if I create a group of my own, it
won't have the same SID on each system so I'd still have to mess about with
access lists when switching the disk between systems.
Regards,
Brian.
other than just Administrators (except Authenticated Users)?
I use a separate logical drive for data and use "standard" user accounts.
The partition is NTFS-formatted. For convenience instead of adding each
login name that should have access to the drive with modify privileges (and
below) I just added the Power Users group (with modify and below) privileges
and made each user a member of Power Users. Because I don't want all users
to access the drive I removed "Authenticated Users" and "Users" from the
access list. The access list shows SYSTEM - Full Control, Administrators -
Full Control, Power Users - Modify.
This worked fine on XP but under Vista when any of the standard user
accounts are used, Computer shows no space information. When I click on the
drive, I get the message box saying "F:\ is not accessible. Access is
denied".
If I use Advanced Security, click the Effective Permissions tab, and type in
the group name of Power Users, all the boxes are checked apart from Full
Control, telling me that the logon on user should be able to read. write
etc.
To prove the security setup was okay, I turned UAC off, rebooted, and
retried. This time Windows Explorer shows space information for that drive,
any standard user account in the Power Users group can read and modify data
on it okay.
I turned UAC back on, rebooted and retried the test and the missing space
information and "F:\ is not accessible. Access is denied" problems returned.
I am aware that the Power Users group only exists for compatibility reasons
and thought it may be that it doesn't have any privileges any more so I
tried a couple of other groups, Backup Operators, and Network Configuration
Operators in place of Power Users but the same problems occur with UAC
turned on.
The only way I seem to be able to use groups with UAC is if I create a group
of my own instead of using the inbuilt groups. Then if I do the above test
using my Test group instead of Power Users/Backup Operators/Network
Configuration Operators it works.
I completely uninstalled my Internet Security system, including running the
vendor's special "cleanup" tool to ensure it was completely gone, used
MSCONFIG to turn off all startup items and non-Microsoft services, then
rebooted, but this made no difference to the results of the tests: UAC on,
no access. UAC off, access is okay.
My understanding of UAC is that it turns off Administrator privileges so
even if a logon is a member of the Administrators group the default
environment is non-Administrative. I've been searching documents and the
Internet and I haven't seen it mentioned anywhere that UAC also turns off
other privileges from other inbuilt groups.
By the way you may be wondering why I was keen on using Power Users instead
of a group name of my own making. It's because I use the same technique with
removable hard disks, which I switch between two systems. It worked fine in
XP and saved me having to mess about changing access lists permitting users
logons on each system to the drive every time I switched it (due to SID
differences). But my understanding is that if I create a group of my own, it
won't have the same SID on each system so I'd still have to mess about with
access lists when switching the disk between systems.
Regards,
Brian.