...Because someone's gotta tell the story...


To return to the main Blog List, click Full Blog Listing.



Selectively bypassing UAC

Friday, April 09, 2010 in Technical Articles (Views: 4927)
Seems like one little registry hive is getting a lot of airtime tonight - but this is a great one.

HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers

Note: This works for ALL users. You can add the runasadmin command for an administrator account to be part of the process.

One great setting here is how you can selectively disable UAC with this registry hive. What purpose would this have?

Well, you are importing registry keys into, say, HKCU (which all users have full access to their own). When you do the regedit /s command, you are prompted whether or not to do this by UAC.

The best way to go about this is to use this registry key.

You create a string value here for each executable (we'll use registry editor).


Name: c:\windows\regedit.exe


Note: The runasinvoker registry value will not work with HKLM.

You can also create anoher string entry for c:\windows\system32\regedt32.exe, as well as any other application that you want to disable UAC on.

One more annoyance out of the way of the common user. :)


Related Blogs You May Be Interested In:

To leave a comment, please log in and/or register.