In our environment (2008R2/2012 AD Domain, w/ Win7/8 Enterprise), we logon to our systems with unprivileged accounts. We avoid using domain admin credentials entirely, instead relying on different privileged accounts for various categories of workstations and servers (they are basically compartmentalized by function and risk). System admins then run needed tools elevated to whichever account is needed for the target system. The accounts that have admin privs on the target system are not privileged on the desktop on which the tool is run. Prior to Windows 8, this has worked without any problems, though in some cases, steps were required to make the "Run as a different user" option available in the right-click menus used to launch the tools.
However, on Windows 8.1, attempts to work in this way fail. Ultimately, we are unable to run the various RSAT tools without providing an account that has admin privileges on the local desktop to run the MMC. I've done a good bit of googling (er.. binging) and have been unable to find any explanation or guidance on how to get this to work.
I can probably add all the server admin accounts to the local Administrators groups on the admin workstations and/or terminal servers and get this to work, but that's undesirable from a security perspective. We developed this scheme to segment our privileged credentials to improve domain security by thwarting an attackers ability to move laterally through the domain in the event a system is compromised. e.g. if a user workstation or laptop is compromised, privileged credentials that might be present on that system would not allow privileged access to any system in a different risk category ("compartment" in our vernacular).
Does anyone have any idea what I'm missing? This is issue is currently holding up broader adoption of Windows 8.1+ and I really need to get this working.
Thanks for any insight.