Right click your desktop or file explorer window in an empty space and click on New -> Shortcut.Create RUNAS ShortcutĪnother way to launch your console as another user is to create a shortcut. This creates a batch file that you can double click to launch your window asking for your credentials for that program. To do this, create a text file with notepad and include your command prompt command from above. One easy solution to this is to create a script that you can launch to run the command for you. Other popular management consoles that can be launched this way are: RUNAS Group Policy Management Console runas /netonly “%windir%\system32\gpmc.exe” RUNAS DNS runas /netonly “%windir%\system32\ dnsmgmt.msc” RUNAS DHCP runas /netonly “%windir%\system32\ dhcpmgmt.msc” RUNAS Active Directory Domains and Trusts runas /netonly “%windir%\system32\ domain.msc” Script RUNASĪdmittedly, launching a command line window and typing out a command every time you want to launch a console is time consuming and annoying. Or the PowerShell equivalent: runas /netonly "mmc $env:windir\system32\dsa.msc" If you wanted to open the classic Active Directory Users & Computers (ADUC) as another user you could use the following command: runas /netonly "mmc %windir%\system32\dsa.msc" Or this command in an elevated PowerShell window: runas /netonly “$env:windir\system32\dsac.exe” You could run the following command inside of an elevated command prompt window: runas /netonly “%windir%\system32\dsac.exe” The simplest of which is the RUNAS command.Īs an example, lets suppose you want to launch ADAC (Active Directory Administrative Center) as your privileged account. If you don’t have the ability to run separate secure workstations then you can use commands to launch your tools as your priviledged account. Using the RUNAS Command with Command Prompt and PowerShell Lock down your management consoles to only accept connections from this server (such as vcenter web console, Cisco ISE web console, etc.).Use multi-factor authentication to access this server.
Deny open access to the internet from this server.
#Firefox profile manager run command install#
#Firefox profile manager run command how to#
One conundrum that comes up under this model is how to run your admin tools, such as Active Directory Administrative Center and other RSAT tools, as a privileged account. Microsoft refers to this as the Least-Privilege Administrative Model which you can read more about here. They would have their regular user accounts for logging into workstations, a user account for administrative tasks, and a just-in-time user account for performing high level AD tasks that is a member of the Domain Admins, Enterprise Admins, or Schema Admins while special tasks are being performed. In an ideal world administrators would have three sets of credentials. Those credentials get cached into workstations, mobile devices, email portals, etc… You’re essentially risking the keys to the kingdom for the sake of convenience. I’ve worked in many environments where the SysAdmins and Network Admins only had one account and it was part of the Domain Admins group in AD.
For security reasons, it’s important that you don’t use the same account for daily tasks (like logging into your workstation and work on documents and email) as you do for admin tasks (like managing accounts in Active Directory or administrating vSphere).