Ahh, yesh yesh - I see you point the other way around. -- Espi
On Mon, Nov 21, 2016 at 2:25 PM, Kurt Buff <[email protected]> wrote: > Credentials are in memory while the app running as admin is in memory > - and in some cases (such as X-ing out of an RDP session) are left in > memory after the app is closed. > > Oh, wait - I got it backward. You want an admin to run something as a > standard user. That makes more sense. Never mind. > > Kurt > > On Mon, Nov 21, 2016 at 5:49 AM, Micheal Espinola Jr > <[email protected]> wrote: > > Whats the danger in running something from an admin context in a user > > context? > > > > On Sun, Nov 20, 2016 at 9:28 PM Kurt Buff <[email protected]> wrote: > >> > >> Down that path lies great danger... > >> > >> On Sun, Nov 20, 2016 at 11:44 AM, Micheal Espinola Jr > >> <[email protected]> wrote: > >> > This has always annoyed me. I really wish the runas /trustlevel > switch > >> > could be used to overcome this feature. > >> > > >> > -- > >> > Espi > >> > > >> > > >> > On Sun, Nov 20, 2016 at 10:29 AM, Webster <[email protected]> > >> > wrote: > >> >> > >> >> > >> >> > >> >> https://blogs.technet.microsoft.com/askds/2009/01/ > 07/using-group-policy-preferences-to-map-drives-based-on-group-membership/ > >> >> > >> >> > >> >> > >> >> "I can only get this to work if I disable UAC on the Windows 7 > client. > >> >> Is > >> >> this expected?" > >> >> > >> >> > >> >> > >> >> "This should only happen with administrative user accounts. The drive > >> >> mapping occurs in an elevated user process. The Windows Explorer > >> >> process is > >> >> a non-elevated process. Mapped drives, regardless of how they are > >> >> mapped, > >> >> by default do not span across processes of different elevation. > Normal > >> >> User > >> >> accounts should not have this problem. You can bypass the problem by > >> >> mapping > >> >> the drive as a scheduled task, which would occur under the > non-elevated > >> >> process. Or, you can enable the registry setting in MSKB Article ID: > >> >> 937624." > >> >> > >> >> > >> >> > >> >> Thanks > >> >> > >> >> > >> >> > >> >> > >> >> > >> >> Webster > >> >> > >> >> > >> >> > >> >> From: [email protected] > >> >> [mailto:[email protected]] On Behalf Of Mike Kanfer > >> >> Sent: Sunday, November 20, 2016 9:42 AM > >> >> To: [email protected] > >> >> Subject: Re: [NTSysADM] Windows 2012 R2 GPO Mapping Issue > >> >> > >> >> > >> >> > >> >> Bingo! That's was it. Thank you!! > >> >> > >> >> > >> >> > >> >> On Sun, Nov 20, 2016 at 9:11 AM, Eric Wittersheim > >> >> <[email protected]> wrote: > >> >> > >> >> Are the users local admins? UAC can block mapped drives when the > users > >> >> are > >> >> administrators. You can check this by opening up a cmd prompt and > >> >> switch to > >> >> the mapped drive letter. This shows the gpo is working but it's > mapping > >> >> the > >> >> drive for Administrator instead of the intended user. > >> >> > >> >> Eric > >> >> > >> >> > >> >> > >> >> On Sat, Nov 19, 2016 at 9:00 PM Mike Kanfer <[email protected]> > wrote: > >> >> > >> >> We have a GPO that is applied to Authenticated Users and linked to > our > >> >> domain. In it, we have a mapped drive which isn't work. Looking at > >> >> GPResult shows the policy being applied. Using NET USE, we can map > the > >> >> drive with a user logged in. We have unchecked, reconnect at logon > and > >> >> it > >> >> still doesn't work. The drive map action is Create. We also tried > >> >> Update. > >> >> The GPO does work because other elements- a message on the logon > screen > >> >> is > >> >> displayed. The DC is a Windows 2012 R2 server and the workstation > is a > >> >> Windows 10 Pro version. It also is not working on a Windows 2012 R2 > >> >> terminal server. > >> >> > >> >> > >> >> > >> >> Any help would be appreciated. > >> >> > >> >> > >> > > >> > > >> > >> > > -- > > -- Espi (via mobile) > > >

