{"id":1319,"date":"2017-02-17T10:46:25","date_gmt":"2017-02-17T14:46:25","guid":{"rendered":"http:\/\/mikemartinezonline.com\/blog\/?p=1319"},"modified":"2018-04-23T12:10:23","modified_gmt":"2018-04-23T16:10:23","slug":"fix-elevated-applications-not-having-access-to-mapped-drives","status":"publish","type":"post","link":"https:\/\/mikemartinezonline.com\/blog\/2017\/02\/17\/fix-elevated-applications-not-having-access-to-mapped-drives\/","title":{"rendered":"Fix Elevated applications not having access to mapped drives"},"content":{"rendered":"<h3>Fix Elevated applications not having access to mapped drives<\/h3>\n<p>One of the side effects of UAC is the inability to access the mapped (over net use) network drives from the applications running in privileged mode (Run As Administrator). This means that when you run the command prompt or an application (like SpecWin) with elevated privileges, they won\u2019t display the disk letters of the mounted network shares.<\/p>\n<p>A quick way to show what this looks like. Open command prompt, <b><u>as a regular user<\/u><\/b>, not an administrator and run\/enter:<\/p>\n<p>net use<\/p>\n<p>Your screen should look something like this:<\/p>\n<p><a href=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2017\/02\/clip_image002.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"clip_image002\" style=\"border-top: 0px; border-right: 0px; background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; display: inline; padding-right: 0px\" border=\"0\" alt=\"clip_image002\" src=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2017\/02\/clip_image002_thumb.jpg\" width=\"433\" height=\"224\" \/><\/a><\/p>\n<p>And if you change directories and looked at what\u2019s there, it would look something like this<\/p>\n<p><a href=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2017\/02\/clip_image004.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"clip_image004\" style=\"border-top: 0px; border-right: 0px; background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; display: inline; padding-right: 0px\" border=\"0\" alt=\"clip_image004\" src=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2017\/02\/clip_image004_thumb.jpg\" width=\"426\" height=\"219\" \/><\/a><\/p>\n<p>If you run the command prompt \u2018As Administrator\u2019 the prompt will look something like this:<\/p>\n<p><a href=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2017\/02\/clip_image006.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"clip_image006\" style=\"border-top: 0px; border-right: 0px; background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; display: inline; padding-right: 0px\" border=\"0\" alt=\"clip_image006\" src=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2017\/02\/clip_image006_thumb.jpg\" width=\"420\" height=\"215\" \/><\/a><\/p>\n<p>If you try and change drives you will get something like this:<\/p>\n<p><a href=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2017\/02\/clip_image008.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"clip_image008\" style=\"border-top: 0px; border-right: 0px; background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; display: inline; padding-right: 0px\" border=\"0\" alt=\"clip_image008\" src=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2017\/02\/clip_image008_thumb.jpg\" width=\"426\" height=\"218\" \/><\/a><\/p>\n<p><b>This behavior of the system can lead to some inconveniences when trying to run apps elevated often.<\/b><\/p>\n<p><b><\/b><\/p>\n<p>Why does it happen? This peculiarity is connected with UAC mechanism for a user with the local administrator privileges. The matter is that when this user signs in, two access tokens are created: the first token provides access without the administrator privileges (the filtered access token, with which most apps are run) and the second is the administrator token with full privileges in the system (all apps approved elevated in UAC are run using it).<\/p>\n<p>When connecting shared network folders, they are associated with the current session for the current process access token and are <i>not available<\/i> with another token.<\/p>\n<p>There is a solution. To implement it, you have to make some changes to the registry:<\/p>\n<p>Open the registry editor (regedit.exe)<\/p>\n<p>Go to HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System<\/p>\n<p>Create a new parameter (DWORD type) with the name EnableLinkedConnections and the value 1<\/p>\n<p><a href=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2017\/02\/clip_image010-1.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"clip_image010\" style=\"border-top: 0px; border-right: 0px; background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; display: inline; padding-right: 0px\" border=\"0\" alt=\"clip_image010\" src=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2017\/02\/clip_image010_thumb-1.jpg\" width=\"484\" height=\"230\" \/><\/a><\/p>\n<p>Restart your computer<\/p>\n<p>After the computer has been restarted, make sure that you have access to the network drives from the apps run with the administrator privileges.<\/p>\n<p>How it works. After you enable <b>EnableLinkedConnections<\/b> parameter of the registry, LanmanWorkstation and LSA will check if there is the second access token associated to the session of the current user. If this token is found, the list of the mounted network drives will be copied from one token to another. Thus, the network drives mounted elevated will be seen in the standard mode, and vice versa.<\/p>\n<p>Ref:<\/p>\n<p><i><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/3035277\/mapped-drives-are-not-available-from-an-elevated-prompt-when-uac-is-configured-to-prompt-for-credentials-in-windows\">https:\/\/support.microsoft.com\/en-us\/help\/3035277\/mapped-drives-are-not-available-from-an-elevated-prompt-when-uac-is-configured-to-prompt-for-credentials-in-windows<\/a><\/i><\/p>\n<p><i><\/i><\/p>\n<p><i><a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/ee844140(v=ws.10).aspx\">https:\/\/technet.microsoft.com\/en-us\/library\/ee844140(v=ws.10).aspx<\/a><\/i><\/p>\n<p><i><\/i><\/p>\n<p><i><a href=\"https:\/\/social.technet.microsoft.com\/Forums\/en-US\/49e551df-8e18-45fa-b4bf-923b5a317337\/windows-8-issue-with-drive-mapping-and-uac-enabled-enablelinkedconnections?forum=w81previtpro\">https:\/\/social.technet.microsoft.com\/Forums\/en-US\/49e551df-8e18-45fa-b4bf-923b5a317337\/windows-8-issue-with-drive-mapping-and-uac-enabled-enablelinkedconnections?forum=w81previtpro<\/a><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fix Elevated applications not having access to mapped drives One of the side effects of UAC is the inability to access the mapped (over net use) network drives from the applications running in privileged mode (Run As Administrator). This means that when you run the command prompt or an application (like SpecWin) with elevated privileges, &hellip; <a href=\"https:\/\/mikemartinezonline.com\/blog\/2017\/02\/17\/fix-elevated-applications-not-having-access-to-mapped-drives\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Fix Elevated applications not having access to mapped drives&#8221;<\/span><\/a><\/p>\n","protected":false},"author":587,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[13,11,256,15,218],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/1319"}],"collection":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/users\/587"}],"replies":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/comments?post=1319"}],"version-history":[{"count":1,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/1319\/revisions"}],"predecessor-version":[{"id":1320,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/1319\/revisions\/1320"}],"wp:attachment":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/media?parent=1319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/categories?post=1319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/tags?post=1319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}