🚀 Executive Summary
TL;DR: Standard domain users often require elevated privileges for specific legacy applications, posing a security challenge under the Principle of Least Privilege. This can be solved using temporary “runas /savecred” shortcuts, more secure Application Compatibility Shims, or robust Endpoint Privilege Management (EPM) solutions for scalable, auditable control.
🎯 Key Takeaways
- The “runas /savecred” command, while quick, stores admin credentials in Windows Credential Manager, creating a significant security hole that malware or savvy users can exploit.
- Application Compatibility Shims, implemented via the Microsoft Application Compatibility Toolkit (ACT) with fixes like “RunAsAdmin”, provide a secure, credential-free method to elevate specific applications by creating OS-level exceptions.
- Endpoint Privilege Management (EPM) tools represent the enterprise-grade solution, offering central policy management, cryptographic hash-based application identification, detailed auditing, and alignment with Zero Trust security models.
Struggling to grant a standard user admin rights for just one specific application without handing over the keys to the kingdom? I’ll walk you through the quick-and-dirty fixes, the proper IT solutions, and the modern cloud approach to solve this classic headache.
The Admin Permission Pickle: Letting a Standard User Run Just *One* App as an Admin
I remember it like it was yesterday. 9:30 PM on a Tuesday, and my phone buzzes. It’s the head of the finance department, sounding panicked. Their ancient, absolutely critical quarterly reporting tool—a piece of software so old it probably remembers dial-up—needed to run a data file update. The problem? The little shield icon on the executable. It needed admin rights, the user was standard, and the report was due to the board by 8 AM. This, my friends, is a classic IT trench warfare scenario: do you compromise security for immediate business need? It’s a question we’ve all faced.
So, Why Is This Even a Problem?
Before we dive into the fixes, let’s get on the same page about the “why”. This isn’t just Windows being difficult. It’s a core security concept called the Principle of Least Privilege. We give users the absolute minimum permissions they need to do their jobs. Why? Because a standard user can’t accidentally (or intentionally, via malware) wreak havoc on the OS, install unapproved software, or change critical system settings. User Account Control (UAC), that pop-up you see, is the gatekeeper. Our job isn’t to bulldoze the gate, but to build a specific, secure key for one specific person to use on one specific door.
The Solutions: From Battle-Tested to Best Practice
Alright, let’s get that user up and running. I’ve got three methods in my playbook, ranging from “I need this fixed two minutes ago” to “Let’s build a proper, scalable solution.”
Solution 1: The “Get It Done NOW” Shortcut (The `runas` Trick)
This is the down-and-dirty, battlefield fix. It involves creating a shortcut that uses the Windows `runas` command with a special, and frankly dangerous, switch: /savecred. This will store the admin credentials you enter *one time* and reuse them every time the shortcut is clicked, without a prompt.
Here’s how you’d set up the shortcut target:
runas /user:YourAdminAccount /savecred "C:\Program Files (x86)\LegacyApp\FinanceTool.exe"
You run this once on the user’s machine, type in the admin password when prompted, and from then on, the user can just double-click the shortcut. The app launches with elevated privileges. Problem solved, right?
A Stern Warning from the Trenches: I’m only showing you this because sometimes the building is on fire and you just need a bucket of water. The
/savecredswitch saves the credentials in the Windows Credential Manager. A savvy user (or a piece of malware running under their profile) can potentially access or abuse these stored credentials to do other things. This is a security hole. Use it to get through an emergency, then plan to replace it with a real solution immediately.
Solution 2: The “Proper SysAdmin” Shim
A much better, more permanent, and safer way is to use an Application Compatibility Shim. This is the classic, proper IT approach. You’re essentially creating a small configuration file (a “shim”) that tells Windows, “Hey, for this one specific application, I need you to apply a compatibility fix.” One of those fixes is `RunAsInvoker`, which forces the app to run with the standard user’s permissions, or `RunAsAdmin`, which elevates it without a UAC prompt.
You’ll need the Microsoft Application Compatibility Toolkit (ACT). The process looks like this:
- Install the ACT on a test machine.
- Use the Compatibility Administrator tool to create a new fix for your application (e.g.,
FinanceTool.exe). - Select the `RunAsAdmin` compatibility fix.
- Save the compatibility database (.sdb file).
- Deploy this .sdb file to the target machine(s) using a simple command:
sdbinst <path_to_your_sdb_file>. You can do this via a logon script, GPO, or your endpoint management tool.
This method is far more secure because no credentials are ever stored on the local machine. You are creating a specific exception in the OS for that one executable. It’s more work upfront, but it’s the right way to do it if you don’t have a budget for enterprise tools.
Solution 3: The “Modern DevOps & Zero Trust” Answer (EPM)
Welcome to the modern way of solving this: Endpoint Privilege Management (EPM), sometimes called Privileged Access Management (PAM) for endpoints. This is the enterprise-grade, cloud-architect-approved solution.
Tools like CyberArk EPM, BeyondTrust Privilege Management, or even capabilities within Microsoft’s own Intune suite are designed for exactly this. Instead of messing with shims or saved credentials, you create a central policy.
The policy would sound something like this:
“Allow any user in the ‘Finance Department’ Active Directory group to elevate the application
FinanceTool.exe(identified by its path and cryptographic hash) on any corporate finance workstation. Require them to enter a business justification, and log every single elevation event to our SIEM for auditing.”
This is the gold standard. It’s highly secure, completely auditable, and incredibly flexible. You can create rules for specific apps, command-line arguments, and users. It perfectly aligns with a Zero Trust security model. The downside? It’s not free. But for any organization with more than a handful of these legacy-app headaches, the investment pays for itself in security and operational sanity.
Comparing The Approaches
| Method | Speed | Security | Scalability |
| 1. The `runas` Shortcut | Very Fast (2 minutes) | Very Low (stored creds) | Low (manual setup per PC) |
| 2. The Application Shim | Medium (1-2 hours setup) | Good (no creds stored) | Good (deployable via GPO) |
| 3. The EPM Solution | Slow (requires infra/licensing) | Excellent (auditable, policy-based) | Excellent (centrally managed) |
My Final Take
Look, we’ve all been in that 9:30 PM firefight. Sometimes you have to use the `runas` trick to put out the fire and let the business function. I get it. But your responsibility as an engineer doesn’t end there. The very next morning, your job is to start planning the move to a proper shim or, better yet, make the business case for a real EPM solution. Don’t let a temporary fix become a permanent vulnerability. Choose the right tool for the job, and build for the long haul.
🤖 Frequently Asked Questions
âť“ How can a standard user run an application with admin rights without compromising system security?
A standard user can run a specific application with admin rights securely using an Application Compatibility Shim (e.g., “RunAsAdmin” fix via Microsoft ACT) or an Endpoint Privilege Management (EPM) solution. Both methods avoid storing admin credentials locally and allow for controlled elevation.
âť“ How do the ‘runas’ shortcut, Application Shims, and EPM solutions compare in terms of security and scalability?
The “runas” shortcut is very fast but offers very low security due to stored credentials and low scalability. Application Compatibility Shims provide good security and scalability via GPO deployment, with medium setup time. EPM solutions offer excellent security and scalability through central, auditable policy management, but require significant infrastructure investment and setup time.
âť“ What is the primary security risk associated with using the ‘runas /savecred’ command?
The primary security risk of “runas /savecred” is that it stores the admin credentials in the Windows Credential Manager. This allows a savvy user or malware running under their profile to potentially access and abuse these stored credentials for other unauthorized actions, compromising system security.
Leave a Reply