Dameware Unable To Install Service Error 5
Contents |
Administrator gets an "Access denied" error when they try to perform administrative functions on a client with UAC enabled
Dameware The Token Supplied To The Function Is Invalid
The information in this article applies to: DameWare Remote Support - Version(s) dameware authentication failed token All IssueWhen you use NTU to connect to any Windows computer with User Account Control (UAC) enabled, Windows denies teamviewer error 5 access denied you access to administrative functions such as viewing or editing disk drives, services, or the registry. This issue is directly related to UAC, and cannot be resolved in the NTU http://support.dameware.com/kb/article.aspx?ID=300013 program. For additional information, see the following Microsoft knowledgebase article: http://support.microsoft.com/kb/951016. WorkaroundTo gain remote access to administrative features on computers with UAC enabled, complete the following procedure. Connect to the remote computer using Remote Control> RDP View in NTU, or Windows Remote Desktop. On the remote computer, open Registry Editor (regedit.exe). Expand HKEY_LOCAL_MACHINE> SOFTWARE> Microsoft> Windows> CurrentVersion> policies, and then select http://support.dameware.com/kb/article.aspx?ID=400103 system. Add the DWORD Value, LocalAccountTokenFilterPolicy: Click Edit > New > DWORD Value, and then enter LocalAccountTokenFilterPolicy. Assign the DWORD a value of 1: Select the new value, and then click Edit > Modify. Select Decimal. Enter 1. Click OK. Close Registry Editor. Disconnect from the RDP View or Remote Desktop session. The next time you connect to the remote computer with an administrative account using NTU, you will be able to access the administrative functions on the remote computer.
Knowledgebase Article: #400103 Category: General Information O/S Info: Windows 7, Windows Server 2008, Windows Vista Last Revised: Monday, April 23, 2012 Keywords: errors, failed, fails, failure, message, messages Description: Resolves an issue that prevents NTU users from accessing administrative functions on remote computers by providing a Registry workaround to alter the way UAC behaves with non-local administrative accounts. How would you rate this article? 12345678910 Not HelpfulVery Helpful Please tell us why you are rating this article this way. If you need to enter a URL please remove "http://". Please note: this field is required for negative responses. No HTML please.           &nbs