User Account Control (UAC) is a new security component of Windows Vista. UAC enables users to perform common day-to-day tasks as non-administrators. These users are called “standard users” in Windows Vista. User accounts that are members of the local Administrators group will run most applications by using the principle of “least privilege.” In this scenario, least-privileged users have rights that resemble the rights of a standard user account. However, when a member of the local Administrators group has to perform a task that requires administrator rights, Windows Vista automatically prompts the user for approval.
To disable UAC remote restrictions, follow these steps:
- Click Start, click Run, type regedit, and then press ENTER.
- Locate and then click the following registry subkey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
- If the LocalAccountTokenFilterPolicy registry entry does not exist, follow these steps:
- On the Edit menu, point to New, and then click DWORD Value.
- Type LocalAccountTokenFilterPolicy, and then press ENTER.
- Right-click LocalAccountTokenFilterPolicy, and then click Modify.
- In the Value data box, type 1, and then click OK.
- Exit Registry Editor.
Manual Registry Hack
Explore regedit.exe during the start menu search or run box, and after that navigate down to the below key, making another key if it doesn’t be present.
On the right hand side of window, place a new 32-bit DWORD figure known as LocalAccountTokenFilterPolicy and put the figure to 1.
To delete this tweak you will able to locate the value to 0 or just remove the key.
Now you will be able to map to the C$ share and also execute a few other administrative task distantly. You will require activating file sharing in the network and distributing center, and then make certain that your firewall configurations will permit sharing.