Nasty UAC with Explorer in Windows Server 2008 R2

When installing a new server/workstation with Server 2008 R2 or Windows 7. I’m having a strange problem.

For instance, my D partition on my laptop (which runs Windows 7) has default the built in USERS group with right to read the partition. Oké lets remove those rights. Now the partition has only Administrators and System with Full Control. But when opening the partition we are getting a Access Denied warning :?.

image

How is that possible? Well, the explorer process is still running in ‘User’ mode. When opening the explorer in ‘Admin’ mode we still getting the Access Denied warning.

image  image

Why? Well, actually the explorer isn’t started in elevated mode. But only the first process. That triggers a DCOM to open the Explorer, witch runs in ‘User’ mode 😉

How do we disable that? First open regedit en navigate to: HKEY_CLASSES_ROOT\AppID\{CDCBCFCA-3CDC-436f-A4E2-0E0207520C2}

image

Rename the RunAs to something else, like: _RunAs (Become owner first ;))

image

And now it’s possible to open the explorer in elevated mode. And it’s possible to set the correct permissions without adding your own account first.

Unattended Installation Impromptu Administrator 7.3

I’m currently trying to install Impromptu Administrator. But on the net I can’t find any serious document/howto of a silent/unattended installation. So here’s my tutorial. 😉

Sorry for the Dutch screenshots 😉

First we do a manual installation. This will generate the response files. This isn’t documented here 😉 After the installation you have an “ats” file in te following location: installation locationinstlog
image_thumb6

Copy this file into your installation source. (In the directory Cognosimpa)
image_thumb11

Continue reading “Unattended Installation Impromptu Administrator 7.3”

Unattended Installation Impromptu Administrator 7.3

I’m currently trying to install Impromptu Administrator. But on the net I can’t find any serious document/howto of a silent/unattended installation. So here’s my tutorial. 😉

Sorry for the Dutch screenshots 😉

First we do a manual installation. This will generate the response files. This isn’t documented here 😉 After the installation you have an “ats” file in the following location: installation location\instlog
image
Copy this file into your installation source. (In the directory Cognos\impa)
image

To perform the unattended installation run the following command: issetup.exe /s <location>\ts-impa-version-yyyymmdd-hhmm.ats (of course you can change the name of the ats file ;))
image 
Now that the software is installed it must be configured. Start the Configuration Manager on the source machine on which the software is installed manually and correct configured. Click on Start and choose Open the current configuration.
image 
Select Actions and Export Script.
image
Save the file in the installation source. (in this tutorial configuration.ccp)

To import the configuration file into the machines which are unattended installed. Execute the following command: <local_installation_path>\bin\configcp.exe –t <location>\configuration.ccp
image

Book: Instant Citrix Security How-to

I got myself a copy of this small book (75 pages). In this book there are step-by-step instructions, including screenshots :), about securing your Citrix environment with the help of a Citrix Netscaler.

Although I’m not that deep into the whole Netscaler jibba jabba, I find this book very helpfull and it gives a lot of real world recipes to get the job done.

These are the topics:

  • DMZ;
  • Triple A;
  • Surge/Burst;
  • Content Switching;
  • Zombie Cleanup;
  • Disaster Recovery;
  • DOS and attack preventions; (I like this topic :))
  • Learning application firewall;
  • Access Gateway integation forn XA and XD
  • Network Management.

Carmel Jacob, good job 🙂

Click here or on the image below to get your copy 🙂

1849686734