Users Guide
UAC Restrictions When Running DUPs Remotely
By default, after UAC starts, all Administrator Account users login as Standard Users. Thus, rights to access critical system
resources are not available until the user confirms the privilege elevation request. This restriction disables the option to remotely
deploy DUPs. UAC returns an Access Denied error if the management node agent runs on these login credentials.
You can bypass the UAC restrictions by:
• Enabling remote agent use of the Local System Account to perform a DUP update. The Local System Account is not protected
by UAC (recommended option).
• Using the Local Administrator Account on each remote machine where the DUP is running.
• Disabling UAC for all users on remote machines (not a recommended option).
• Not upgrading to Administrator account on remote machines.
NOTE: Only two accounts (the Local Administrator Account and the Local System Account) are not protected by UAC.
All other users including accounts with local administrator rights or domain administrator rights have UAC enabled by
default. Even though UAC can be disabled by updating the local or domain security policy, it is not recommended.
Remote users have to login as a built-in Local Administrator Account or obtain the Local System Account privilege to
launch a DUP remotely.
37