Remote Tools Issue
I'm having an issue on Windows 7 x64, whereby users who do have permissions from SCCM Console to connect are unable to, unless they are Administrators of the remote machine. After some testing, I think it could be to do with UAC, which we have enabled. Here are our UAC settings in GPO: User Account Control Policy Setting User Account Control: Admin Approval Mode for the Built-in Administrator account Enabled User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop Disabled User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode Prompt for credentials User Account Control: Behavior of the elevation prompt for standard users Automatically deny elevation requests User Account Control: Detect application installations and prompt for elevation Enabled User Account Control: Only elevate UIAccess applications that are installed in secure locations Enabled User Account Control: Run all administrators in Admin Approval Mode Enabled User Account Control: Switch to the secure desktop when prompting for elevation Enabled User Account Control: Virtualize file and registry write failures to per-user locations Enabled
May 22nd, 2012 6:37am

I dont think that the UAC settings you show would necessary require you to be Administrators of the remote machine simply to connect via Remote Tools (but UAC may affect what happens when you do successfully connect). One know issue that is specific to x64 versions of Windows 7 is that the "ConfigMgr Remote Control Users" group may not always have the required Read and Execute rights to C:Windows\SysWOW64\CCM\clicomp\RemCtrl\RCLaunch.exe. There is a fuller description at http://blogs.technet.com/b/configurationmgr/archive/2011/04/14/configmgr-2007-quick-fix-remote-tools-fail-with-access-denied.aspx .
Free Windows Admin Tool Kit Click here and download it now
May 22nd, 2012 7:46am

I dont think thats the issue, as the machine CAN be remoted, just not by certain users. Coincidentally, the users do appear in the ConfigMgr Remote Control Users group locally on machines. I do see the connection in Windows Security Logs, I see: 1. An account was successfully logged on 2. A new process has been created (RCServer.exe), with TokenElevationTypeDefault (1) 3. An account was successfully logged on 4. An account was logged off, Logon Type 3, This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer. This all happens in the space of a few milliseconds...
May 22nd, 2012 8:54am

It may not be the issue but the fact that the machine can be remote controlled by some users (in your case Administrators) would be expected as the Administrators would have full control (and of course Read and Execute permissions) already. The only reason to explicitly grant permissions would be for the non-administrator users who currently cannot connect. The article linked above does not state this explicitly but logically the workaround described would only be necessary where you wanted to remote control using an account that was not an Administrator on the remote machine.
Free Windows Admin Tool Kit Click here and download it now
May 22nd, 2012 12:20pm

with UAC, you may be inherently causing issues or conflicts with the DCOM remote launch service as well.
May 23rd, 2012 10:47am

with UAC, you may be inherently causing issues or conflicts with the DCOM remote launch service as well.
Free Windows Admin Tool Kit Click here and download it now
May 23rd, 2012 10:48am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics