Windows 10 May 21 Feature Update affecting runas /savecred /profile

%3CLINGO-SUB%20id%3D%22lingo-sub-2813021%22%20slang%3D%22en-US%22%3EWindows%2010%20May%2021%20Feature%20Update%20affecting%20runas%20%2Fsavecred%20%2Fprofile%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2813021%22%20slang%3D%22en-US%22%3E%3CP%3EGood%20afternoon%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAre%20there%20any%20reports%20of%20the%20Windows%2010%20Professional%20May%2021%20cumulative%20update%20affecting%20using%20a%20batch%20file%20to%20allow%20a%20non-admin%20profile%20to%20run%20a%20program%20which%20would%20normally%20require%20admin%20priveleges%2C%20by%20executing%20the%20batch%20file%20within%20the%20'normal%20users'%20syntax%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%40echo%20off%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Erunas%20%2Fsavecred%20%2Fprofile%20%2Fuser%3ADESKTOP-PPHFOVC%5CAdministrator%20%22C%3A%5CProgram%20Files%5C%7BProgram%20Directory%7D%5C%7Bprogram.exe%7D%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Eexit%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20have%20a%20stand%20alone%20system%20which%20requires%20normal%20users%20to%20be%20able%20to%20run%20an%20executable%20which%20normally%20requires%20administration%20privileges%20.%26nbsp%3B%20Prior%20to%20the%20May21%20feature%20update%20-%20the%20batch%20file%20when%20executed%20when%20logged%20in%20as%20a%20'non-admin'%20profile%20allowed%20the%20'normal'%20user%20profile%20to%20run%20the%20executable%20on%20successive%20occasions%20without%20entering%20the%20administrator%20password.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHas%20there%20been%20additional%20security%20restraints%20added%20to%20the%20May%2021%20Cumulative%20update%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERgds%2C%20Mark.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
New Contributor

Good afternoon,

 

Are there any reports of the Windows 10 Professional May 21 cumulative update affecting using a batch file to allow a non-admin profile to run a program which would normally require admin priveleges, by executing the batch file within the 'normal users' syntax?

 

@echo off

 

runas /savecred /profile /user:DESKTOP-PPHFOVC\Administrator "C:\Program Files\{Program Directory}\{program.exe}

 

exit

 

I have a stand alone system which requires normal users to be able to run an executable which normally requires administration privileges .  Prior to the May21 feature update - the batch file when executed when logged in as a 'non-admin' profile allowed the 'normal' user profile to run the executable on successive occasions without entering the administrator password.

 

Has there been additional security restraints added to the May 21 Cumulative update?

 

Rgds, Mark.

 

 

0 Replies