How to set up smartphones and PCs. Informational portal
  • home
  • In contact with
  • The administrator does not allow the printer to be installed. Methods for Installing Drivers by Non-Administrative Users

The administrator does not allow the printer to be installed. Methods for Installing Drivers by Non-Administrative Users

Good afternoon, dear readers and subscribers of the blog, today we will talk about how to open msc windows snap-ins through the command line, why you might need it and how it will help in the daily practice of a system administrator. Believe the knowledge gained in this article, in the future you will be able to save a huge amount of time and nerve cells, not to mention the opportunity to show off your zadrot knowledge in front of your colleagues, just if you actively use linux systems and know the basic commands in the console, then you will be interested and these. Always, if possible, strive to explore, in addition to GUI interfaces, also alternative configuration methods, since when setting up Windows Server, more and more often they choose the core mode with a minimalist interface.

What is msc snap

And so msc in Windows stands for Microsoft System Console, even simpler are windows, or as they are also called snap-ins, to control certain functions of the operating system. Earlier, I already introduced you to the method of creating a convenient mmc snap-in, in which we added everything that a system administrator needs for everyday administration.

And you probably ask, what does the command line and all that have to do with it, but what does it have to do with it. Imagine a situation where you have an Active Directory domain in your organization, ordinary users do not have local administrator rights on their workstations, everything goes and works like clockwork, a situation happens that, for example, you need to change some user settings, and you need to do it now , so there is no time to look for these settings in group policy. What to do to go under yourself is not an option, since you need to make changes in another user profile, and how to open, for example, the Computer Management or System snap-in.

This is where knowing the name of the msc windows snap-ins and the command line will help us. All you have to do is open a command prompt as an administrator and type in the name of the msc snap-in. Below is a list. As you can see, by opening the cmd.exe command line, for example, I entered the value that opens the control panel with system administrator rights.

Elements of the msc Management Console snap-in

  • appwiz.cpl- The installing and deleting of programms
  • certmgr.msc- Certificates
  • ciadv.msc- Indexing Service
  • cliconfig- SQL network client program
  • clipbrd- Clipboard
  • compmgmt.msc- Computer management
  • dcomcnfg- DCOM component management console
  • ddeshare- DDE shares (does not work on Win7)
  • desk.cpl- Screen properties
  • devmgmt.msc- Device Manager
  • dfrg.msc- Disk defragmenter
  • diskmgmt.msc- Disk management
  • drwtsn32- Dr. Watson
  • dxdiag- DirectX Diagnostic Service
  • eudcedit- Personal character editor
  • eventvwr.msc- View events
  • firewall.cpl- Windows firewall settings
  • gpedit.msc- Group Policy
  • fsmgmt.msc- Shared folders
  • fsquirt- Bluetooth File Transfer Wizard
  • chkdsk- Check disks (usually starts with parameters drive letter: /f /x /r)
  • control printers- Printers and Faxes - does not always start
  • control admintools- Computer administration - does not always start
  • control schedules- Scheduled tasks (scheduler)
  • control userpasswords2- Account Management
  • compmgmt.msc- Computer management ( compmgmt.msc /computer=pc- remote computer control pc)
  • lusrmgr.msc- Local users and groups
  • mmc- creating your own equipment
  • mrt.exe- Malware removal
  • msconfig- System setup (autostart, services)
  • mstsc- Remote Desktop Connection
  • ncpa.cpl- Network connections

  • ntmsmgr.msc- Removable memory
  • mmsys.cpl- Sound
  • ntmsoprq.msc- Removable RAM operators requests (for XP)
  • odbccp32.cpl- Data Source Administrator
  • perfmon.msc- Performance
  • regedit- Registry Editor
  • rsop.msc- Resulting policy
  • secpol.msc- Local Security Settings (Local Security Policy)
  • services.msc- Services
  • sfc /scannow- Restore system files
  • sigverif- File Signature Verification
  • sndvol- volume control
  • sysdm.cpl- Properties of the system
  • syskey- Account database protection
  • taskmgr- Task Manager
  • utilman Utility Manager
  • verifier Driver Check Manager
  • wmimgmt.msc- WMI Management Infrastructure

List of msc snap-ins for Windows Server

Let's look at how the Windows Administrative Snap-ins are launched from the cmd.exe command line

  • domain.msc - Active Directory domains and trusts
  • dsa.msc - Active Directory Users and Computers (AD Users and Computers)
  • tsadmin.msc - Terminal Services Manager
  • gpmc.msc - Group Policy Management Console (GPO)
  • gpedit.msc - Group Policy Object Editor
  • tscc.msc - Terminal Server Configuration (TS Configuration)
  • rrasmgmt.msc - Routing and Remote Access
  • dssite.msc - Active Directory Sites and Trusts
  • dompol.msc - Domain Security Settings
  • dсpol.msc - Domain controller security policy (DC Security Settings)
  • dfsgui.msc - Distributed File System (DFS)
  • dnsmgmt.msc - DNS
  • iscsicpl.exe - iSCSI Initiator
  • odbcad32.exe - 32 bit ODBC Data Source Administrator
  • odbcad64.exe - 64 bit ODBC Data Source Administrator
  • powershell.exe -noexit -command import-module ActiveDirectory - Powershell Active Directory Module
  • dfrgui.exe - Disk optimization
  • taskschd.msc /s - Task Scheduler
  • dsac.exe - Active Directory Administrative Center
  • printmanagement.msc - Print Management
  • vmw.exe - Volume License Activation Tool
  • eventvwr.msc /s - Event Viewer
  • adsiedit.msc - ADSIedit editor
  • wbadmin.msc - Windows Server Backup
  • ServerManager.exe - Server Manager

As you can see, the msc windows snap-in is a very useful system administration tool. It's even faster for me to open some snap-ins than to click on a bunch of windows, especially if the server or computer slows down or there is no mouse. And in any case, knowing such things is always useful. Most of everything we use is stored in c:\Windows\System32. If you go into this folder, you can find a lot of interesting things.

nbtstat -a pc- username of the remote machine pc
net localgroup group user /add- Add to group group, user user
net local groupgroup user/delete- Remove user from group
net send pc "" text "" - send a message to the user of the pc computer
net sessions- a list of users
net session /delete- closes all network sessions
net use l: \\computer name\folder\- connect network drive l: folder on the remote computer
net user name /active:no- block user
net user name /active:yes- unblock user
net user name /domain- information about the domain user
net user Name /add- add user
net user Name /delete- delete user
netstat -a- list of all connections to the computer
reg add- Add a parameter to the registry
reg compare- Compare parts of the registry.
reg copy- Copies from one partition to another
reg delete- Deletes the specified option or section
reg export- Export part of the registry
reg import- Respectively import part of the registry
reg load- Loads the selected part of the registry
reg query- Displays the values ​​of the specified registry branch
reg restore- Restores the selected part of the registry from a file
reg save- Saves the selected part of the registry
reg unload- Unloads the selected part of the registry
shutdown- shutdown a computer, you can remotely turn off another one.
SystemInfo /s machine- will show a lot of useful information about the remote machine

List of command items in the Windows Control Panel

  • control /name Microsoft.AutoPlay - Autoplay
  • control /name Microsoft.OfflineFiles - Offline Files
  • control /name Microsoft.AdministrativeTools - Administration
  • control /name Microsoft.BackupAndRestore - Backup and Restore
  • control /name Microsoft.WindowsFirewall - Windows Windows Firewall
  • control /name Microsoft.Recovery - Recovery
  • control /name Microsoft.DesktopGadgets - Desktop Gadgets
  • control /name Microsoft.DateAndTime - Date and Time
  • control /name Microsoft.DeviceManager - Device Manager
  • control /name Microsoft.CredentialManager - Credential Manager
  • control /name Microsoft.HomeGroup - Homegroup
  • Windowscontrol /name Microsoft.WindowsDefender - Windows Defender
  • control /name Microsoft.Sound - Sound
  • control /name Microsoft.NotificationAreaIcons - Notification area icons
  • control /name Microsoft.GameControllers - Game Controllers
  • Keyboardcontrol /name Microsoft.Keyboard - Keyboard
  • control /name Microsoft.Mouse - Mouse
  • control /name Microsoft.TaskbarAndStartMenu - Taskbar and Start Menu
  • control - Control panel
  • control /name Microsoft.Fonts - Folder "Fonts"
  • control /name Microsoft.IndexingOptions - Indexing Options
  • control /name Microsoft.FolderOptions - Folder Options
  • control /name Microsoft.PenAndTouch - Pen and touch devices
  • control /name Microsoft.Personalization - Personalization
  • control /name Microsoft.RemoteAppAndDesktopConnections - Remote Desktop Connections
  • control /name Microsoft.GetPrograms - Get programs
  • control /name Microsoft.GettingStarted - Getting Started
  • control /name Microsoft.ProgramsAndFeatures - Programs and Features
  • control /name Microsoft.DefaultPrograms - Default programs
  • control /name Microsoft.SpeechRecognition - Speech recognition
  • control /name Microsoft.ParentalControls - Parental control
  • control /name Microsoft.InternetOptions - Internet Options
  • control /name Microsoft.TextToSpeech - Speech properties
  • control /name Microsoft.System - System
  • control /name Microsoft.ScannersAndCameras - Scanners and cameras
  • control /name Microsoft.PerformanceInformationAndTools - Performance counters and tools
  • control /name Microsoft.PhoneAndModem - Phone and modem
  • control /name Microsoft.ColorManagement - Color Management
  • control /name Microsoft.Troubleshooting - Troubleshooting
  • control /name Microsoft.DevicesAndPrinters - Devices and Printers
  • control /name Microsoft.UserAccounts - User accounts
  • control /name Microsoft.MobilityCenter - Mobility Center
  • control /name Microsoft.WindowsUpdate - Update Center
  • control /name Microsoft.ActionCenter - Action Center
  • control /name Microsoft.SyncCenter - Synchronization Center
  • control /name Microsoft.EaseOfAccessCenter - Ease of Access Center
  • control /name Microsoft.NetworkAndSharingCenter - Network and Sharing Center
  • control /name Microsoft.BitLockerDriveEncryption - Drive encryption
  • control /name Microsoft.Display - Screen
  • control /name Microsoft.PowerOptions - Power Options
  • control /name Microsoft.RegionAndLanguage - Regional and Language

If you have something to add to the list of msc canonical names, then please write in the comments and I will add them.

On July 29, 2015, a free upgrade to Windows 10 was launched, and many have already taken advantage of this opportunity, because Windows 10 promised increased performance, new features, and most importantly, the most painless transition. However, not all users have upgraded smoothly. For example, an unpleasant surprise could be the blocking of the old printer driver when the new one is simply not yet released. User Account Control (UAC) can now not only ask for your permission to install, but also preventively block an application or publisher, prompting you to contact the computer administrator. If the administrator of your personal PC is yourself, and you have no one to contact, then this article is for you. We offer several options for a possible solution to the problem so that you can find the method that works in your case.

If the program fails to start by double-clicking the file, the easiest way is to try opening it with administrator rights.


Disabling UAC

Annoying User Account Control can be disabled. In some cases, this can help launch the problematic program. To most fully limit the functionality of User Account Control, we recommend that you use the Registry Editor.

Command line

You can try to give the command to install from the command line.


Launching the program from the built-in administrator account

This method also helped us, it can be used instead of disabling UAC if the previous simple manipulations did not help.

  1. We discussed the inclusion of the built-in administrator account in the corresponding article (LINK) earlier. Choose a convenient method and activate the administrator profile.
  2. Log in with an administrator account.
  3. Just run the desired setup file. Due to the exceptionally wide rights of this account, User Account Control will not interfere with your actions. The installation will most likely be successful.
  4. Log out. Log in with your account. Disable the administrator account following our article (LINK). Under no circumstances should you use the built-in administrator account for daily work - this puts your computer at risk. In addition, in this mode it is impossible to launch Metro-applications.

Removing a file signature

In fact, User Account Control blocks those installation files that have an invalid electronic signature or an expired signature. To solve the problem, the signature of the corrupted signature of the file can be deleted altogether. However, this cannot be done using the built-in Windows tools, and the process of using additional software (for example, FileUnsigner) is beyond the scope of this article. In general, this process is quite simple:

  1. Download software to remove the file signature.
  2. the desired exe file.
  3. Run the setup file. User Account Control will not block the installation.

Let's find out how a normal user can install drivers if he does not have administrative rights. We will not consider options for hacking the admin account. And let's go through more cultural methods.

What is a driver?

These are programs that run at the kernel level of the system. That is, they have full access to the computer, or rather to any device. Naturally, the rights to install such programs cannot be trusted to the first person you meet. That is why only computer administrators can install drivers. But running every time to establish a connection for a webcam or phone is also not a thing - the administrator has enough of his own worries. Let's try to solve this dilemma.

Methods for installing drivers by users without administrative rights

Several methods will be announced below, thanks to which users without administrative rights will be able to install drivers.

Adding a Driver to the Driver Store

Let's remember what is installed automatically! This is because the drivers for such devices are already stored in A, which means that the driver data has already been verified and that installing them will not entail undesirable consequences. Therefore, when a PnP device is installed, the driver files are copied from the repository to the system location. But in fact, we see that we have picked up the right driver automatically and the device is ready to go. Everyone has the right to do so. That is, the user can install the printer if the required driver is in the driver store.

This theory should suffice to suggest a device driver installation option for a normal user. You need to add the necessary drivers to the driver store on your computer! In order to place the required driver in the driver store, you need to execute the following on the command line:

Pnputil -a c:\newdrives\mydrive.inf

Naturally, the path and name of the inf-file will be whatever you need.

But the device will be installed from the account of a simple user only if it is available. Even if you have added an unsigned driver to the repository, you will need administrative rights to initialize it. To solve such problems, you can create certificates for these drivers. But they will operate only within the organization. Creating certificates is a matter of server machines, so we will not consider this for now.

Specify folders with allowed drivers

If open Registry Editor(Run and enter regedit) and proceed along the way hkey_local_machine\software\microsoft\windows\current version, you will find the parameter there Device Path, which has the default value %SystemRoot%\inf. This parameter specifies the location where the driver is searched for the newly attached device. Through a comma, you can add any other paths to search for a driver. Well, unless of course you have drivers somewhere on your computer, although a more serious step would be to specify a network folder with drivers. Using this method, you will add a few more places from where PnP can pull drivers, which means that ordinary users can install drivers for the device.

Give access to install some drivers

And the last option is to allow users for given device classes. The bottom line is to allow users to install drivers for their phones, cameras, webcams and other miscellaneous small peripherals. But at the same time, do not give them access to work with kernel or video card drivers, because inept actions with drivers, for example, video cards, can lead to quite. What needs to be done for this?

Open Device Manager, expand the class of the desired device, select any device and open it Properties. Go to tab Intelligence and select an item from the list Device class GUID a. In field Values to appear GUID, right click on GUID and Copy. After that, in the menu Run recruiting gpedit.msc and click OK. Will open Local Group Policy Editor. Here we select sequentially: Local Computer Policy -> Computer Configuration -> Administrative Templates -> System-> Driver Installation and open the option Allow non-admin users to install drivers for these device installation classes. First of all, we activate this function: switch to Turn on. Then, below we find the button Show and in the field Meaning paste the GUID we copied. And in the same way we allow the installation of all classes of devices that you consider necessary. In order for all changes to be made to the system, you must restart the computer, or. After that, users without administrative rights will be able to install drivers for non-selected hardware classes.

The last, third installation option is the most effective. Usually, such permissions will be issued to configure phones, cameras and other small nonsense, which basically automatically grabs the necessary drivers. And here the main thing is not to interfere with this. And at the same time close access to the installation of more important drivers.

This is how you can give users rights, and throw off extra work from yourself.

Top Related Articles