Difference between revisions of "Active Directory/Documentation/Admin Shortcuts"

From WolfTech
Jump to navigation Jump to search
m
Line 2: Line 2:
  
 
The following shows how to runas common OU Admin tools.  Simply create a new shortcut, using the below path as the <b>Target</b> and change <userid> to your userid.  When you run the shortcut, you will be prompted to type your password, then the tool will launch using the alternate credentials.
 
The following shows how to runas common OU Admin tools.  Simply create a new shortcut, using the below path as the <b>Target</b> and change <userid> to your userid.  When you run the shortcut, you will be prompted to type your password, then the tool will launch using the alternate credentials.
 +
 +
* Generic MMC (build your own toolbox)
 +
 +
%windir%\system32\runas.exe /user:wolftech\<userid>.admin "mmc"
  
 
* Active Directory Users and Computers
 
* Active Directory Users and Computers

Revision as of 13:47, 17 October 2007

It is a good security practice not to use an OU Admin account for everyday computing. However, this can make the administration of your network a pain. Fortunately, the runas command allows you to run programs that need OU Admin priveleges while logged in as a normal domain user.

The following shows how to runas common OU Admin tools. Simply create a new shortcut, using the below path as the Target and change <userid> to your userid. When you run the shortcut, you will be prompted to type your password, then the tool will launch using the alternate credentials.

  • Generic MMC (build your own toolbox)
%windir%\system32\runas.exe /user:wolftech\<userid>.admin "mmc"
  • Active Directory Users and Computers
%windir%\system32\runas.exe /user:wolftech\<userid>.admin "mmc %windir%\system32\dsa.msc"
  • Group Policy Management Console
%windir%\system32\runas.exe /user:wolftech\<userid>.admin "mmc %windir%\system32\gpmc.msc"
  • Computer Management Console
%windir%\system32\runas.exe /user:wolftech\<userid>.admin "mmc %windir%\system32\compmgmt.msc"
  • Offer Unsolicited Remote Assistance
C:\WINDOWS\system32\runas.exe /NETONLY /user:wolftech\<userid>.admin 
"%windir%\PCHEALTH\HELPCTR\Binaries\helpctr /url 
hcp://CN=Microsoft%20Corporation,L=Redmond,S=Washington,C=US/Remote%20Assistance/
Escalation/Unsolicited/unsolicitedrcui.htm"

In Vista (within the admin cmd prompt):

msra /expert


Notes