On Mon, 21 Oct 2024 21:31:03 -0400, Mickey D wrote:
As you said, any command will be elevated with this method, but I wasJust to be super clear about the sequence, any command will be elevated
specifically talking about the command prompt which comes up when you enter >>> "windows + r" and "control + shift + enter" & then "cmd" into the Run box. >>
with this method, but I was specifically talking about the command prompt
which comes up when you enter "windows + r" and "control + shift + enter"
with "cmd" into the Run box as shown super clearly obviously in the below. >>
1. Windows + r
2. cmd
3. Control + shift + enter
4. Yes to the UAC prompt
All I want to do is figure out a way for #4 to not happen.
Any ideas?
(Other than turning off UAC for all commands - which is not a good idea.)
Well, that's what works, is turning off UAC entirely.
*******
There is a second way to run the OS.
1) Enable the "real administrator" account.
Now, there is a home directory for the Administrator.
2) Start : Run : dropmyrights.exe cmd.exe
That is an example, of starting the Command Prompt window
in an unelevated state. The "dropmyrights" executable
as far as I know, is third party. I have a couple other utilities
of this sort, which are also third party, and are useful for weird
stuff like that. Todd is the one who posted about this.
So that's "running upside-down" in a sense. You are always elevated,
except when you specifically want to de-elevate yourself. As an IT
guy, Todd likes this when doing a series of maintenance commands for
a customer. When most of the commands need the elevation, and
only the occasional one needs "dropmyrights.exe" placed in front of it.
*******
Windows has had a "sudo" command added. However,
this is likely to be a half-assed job and the UAC prompt
is *still* going to come up. Whether that is in 24H2 only,
or is available as a Feature before 24H2, I don't know.
Personally, I am not placing bets on this feature being
worth my time.
In Linux, after you authenticate on the first instance of
"sudo" usage, the token is kept for around ten minutes or so.
This means if you enter "sudo notepad.exe" a second time,
you would not be asked for authentication again. However,
the Windows design intent, is to always present the UAC prompt,
even if doing identical things in a row:
sudo notepad.exe UAC prompt, proceed with what you were doing
sudo notepad.exe UAC prompt, proceed with what you were doing
sudo notepad.exe UAC prompt, proceed with what you were doing
Because again, the idea is not to refine the presentation of UAC and
make it a minimalist thing. The intention is belt-and-suspenders,
to make sure the user really intended to do this. Even if to any
casual observer, there's no point in doing the second and third one.
Some day, I'm going to get to see this new "sudo" feature... Maybe
I should fire up the Insider and repair it.
https://learn.microsoft.com/en-us/windows/sudo/
"Because sudo elevates the targeted process to run
with administrator-level permission, a prompt will
open asking you to verify that you want to continue." <=== Bwahahaha!!! No shit!
a "User Account Control" prompt asks me "Do you want to allow
this app to make changes to your device?"
Not here ...
a "User Account Control" prompt asks me "Do you want to allow
this app to make changes to your device?"
Not here ...
Instead of
1. Windows + r
2. cmd
3. control + shift + enter
4. Yes to UAC
5. This opens an administrator command prompt window
The three Windows tricks below reduce those steps to about half.
1. Windows + r
2. admin
3. enter
4. This opens (a red) administrator command prompt window
Here's exactly how to set it up so that it works perfectly on any PC.
1. Create a new task by typing "taskschd.msc" in the Windows Run box.
Name = admin
[x]Run with highest privileges
Action = Start a program = %comspec%
Arguments = /k "cd /D "C:\Windows\System32" & echo admin: & color 4f"
2. Point to that new task using a Windows shortcut placed anywhere.
Name = admin.lnk
Target = C:\Windows\System32\schtasks.exe /run /TN "admin"
Start in = %windir%\system32
Comment = %comspec% /k "cd /D "C:\Windows\System32" & echo admin: & color 4f"
When you test this shortcut, it should bring up a red admin command
window (without popping up a UAC request for you to press Yes to).
3. Create a Windows Run box command in the Windows system registry.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
Rightclick on "App Paths" to create a "New key" named "admin.exe"
String Value Data = C:\wherever-you-put-the-shortcut\admin.lnk
Now when you want to enter an admin command prompt, you can just type
"admin" + "enter" into the Run box which is pinned to your taskbar.
If you can make it even fewer steps, please let me know how (as that's the >> most efficient way to bring up an admin window I can think of for now).
You first asked how to avoid the UAC prompt.
Now you're trying to educate folks on how to use their devices for
something only you might use/need?
Open Command.com in two steps.
Change the shortcut properites for command.com to an admin level shortcut. Place a copy of the shortcut on your desktop.
Click the shortcut, click yes. <= two steps
| Sysop: | Amessyroom |
|---|---|
| Location: | Fayetteville, NC |
| Users: | 65 |
| Nodes: | 6 (0 / 6) |
| Uptime: | 02:47:34 |
| Calls: | 862 |
| Files: | 1,311 |
| D/L today: |
10 files (20,373K bytes) |
| Messages: | 264,422 |