Creating Plans to Protect Data › How to Create and Manage an Instant Virtual Machine › Create an Instant Virtual Machine › Select a VM Location › How to Disable a Remote UAC for a non-built-in Administrator
How to Disable a Remote UAC for a non-built-in Administrator
Additional administrative account refers to those accounts that are not default administrators. Such accounts are also referred as non-built-in administrative accounts. To import virtual machine from a Hyper-V host, you can either use the built-in administrator account of the Hyper-V host, or a domain account which is in the local administrators group of the Hyper-V host, or a non-built-in administrative user.
The user with additional administrative account can use the procedures to disable UAC remote access.
Notes:
- This procedure is not similar to disabling UAC. Using this procedure, you can disable some of the functionalities of UAC.
- Considering that remote Windows Management Instrumentation (WMI) technology is used for import, ensure that WMI is not blocked by the firewall.
Follow these steps:
- Click Start, type regedit in the Search programs and files field, and then press Enter.
The Windows Registry Editor opens.
Note: You may need to provide administrative credentials to open Windows Registry Editor.
- Locate and click the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
- From the Edit menu, click New, and then click DWORD (32-bit) Value.
- Specify LocalAccountTokenFilterPolicy as the name for the new entry and then press Enter.
- Right-click LocalAccountTokenFilterPolicy and then click Modify.
- Specify 1 in the Value data field and then click OK.
- Exit the Registry Editor.
For more information about the Windows behavior, see the Microsoft documentation.
Copyright © 2016 .
All rights reserved.
|
|