software vendor requires users to have "administrator" rights on their own pc, the is not a very secure way to do things. I've got to prepare a report to the CIO on why we cannot allow. just want to run the list by you all for additional input. these are primarily from the local policy and domain policy editors.
Probable on local machine
Backup directories
Create/manipulate page file
Debug programs
Force shutdown of remote systems
Increase quotas
Increase scheduling priorities
Load and unload device drivers
Manage auditing and security logs
Modify firmware environment variables
The user can modify system environment variables (not user environment variables).
The user can use Windows NT profiling capabilities to observe the system.
Restore files and directories
Take ownership of files or other objects
Allowed to eject removable NTFS media
Possible within the domain
Access any computer on the network
Add new computers to the domain
Change system time
--
please add your input, thanks.
Probable on local machine
Backup directories
Create/manipulate page file
Debug programs
Force shutdown of remote systems
Increase quotas
Increase scheduling priorities
Load and unload device drivers
Manage auditing and security logs
Modify firmware environment variables
The user can modify system environment variables (not user environment variables).
The user can use Windows NT profiling capabilities to observe the system.
Restore files and directories
Take ownership of files or other objects
Allowed to eject removable NTFS media
Possible within the domain
Access any computer on the network
Add new computers to the domain
Change system time
--
please add your input, thanks.