Nuisance or Necessity? UAC and VMS

By: Sarit Williams, Published on May 27, 2013

User Access Control (aka UAC) is Windows' attempt at thinking for and proactively protecting users. However, this can become a nuisance and a time hog when this feature works against you, especially when installing VMS software. Network administrators and IT departments are notorious for locking down an environment making it difficult to do your job. In this note, we explain why UAC is implemented, how it impacts VMS and what to do about it.

Background of UAC

User Access Control is an added security feature available on a myriad of Windows Operating Systems to better protect your PC; it was initially introduced in Vista (and who uses that OS anyway?) and can be found in Windows 7, 8, and Server 2008. This feature is turned on by default and prevents non-administrators from installing new software or making any changes to the PC that may compromise its security. So in essence, UAC helps IT departments and network administrators to lock down their network and ensure people are not installing Skype, instant messenger, etc.

UAC's Impact on VMSes

The UAC “feature” at the Operating System layer is simply an ON/OFF switch that allows or prevents changes to the registry. This is important because most, if not all applications require their installer to write some files to the registry so the application functions properly as well as remains as an available program after a reboot.

When installing VMS software, UAC settings should be considered, unless the VMS vendor has automated these configuration steps in their installer. The reason is that the software itself usually saves user specific settings (such as Layout behavior, Auto Login, User Interface customizations, etc) in the Registry of the machine.

This is not an inherent function of UAC but rather the architecture of the VMS Software itself. In order for software settings and the application files to be saved to the computer during installation the user must have permissions to do that. UAC blocks many.

However, some settings such as cameras, path to recorded video and motion zones are stored in the database. This does not require UAC, but does need database administrator level credentials (typically provided as part of the setup).

The VMS Server

If the VMS software installation is attempted without turning off UAC cryptic pop-up messages during the installation process will appear. Messages like “Unable to write iac32.dll” or something similar is an indication the installer is not able to apply the files needed. Additionally, the pop-ups will offer the user the ability to  Skip, Ignore, or Try Again, but none of these options are recommended. They simply ignore the issue or skip important files from being installed causing the software to not function.

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

The VMS Client

On client machines, an end user may find that each time their VMS client is launched their prior settings (for example, a list of servers) are missing. This is another indication that UAC is on OR the user logged in to the machine is not an administrator because in order for the list of servers to be saved it requires access to modify the registry.

What To Do

Those deploying VMS servers have two options:

  • Get the Network Administrator: They will have to enter their password each time you need to install and configure new software.
  • Ask your Network administrator to turn off UAC or simply give you an administrator level access at which point you can turn off UAC yourself.

Here's how to turn UAC off:

  • Log in as a local Administrator user.
  • In the search field, type UAC.
  • Select the “Change User Account Control Settings”
  • Lower the slider from Always Notify to Never Notify
  • Click OK
  • Restart the machine for changes to take effect

This video shows it in action:

Conclusion

As a guideline, it is recommended that UAC is temporarily turned off completely prior to beginning the installation process even when you are using a local administrator user login. Installing the VMS without security constraints will ensure the software writes the necessary registry keys to  their proper location and will ensure the software functions as intended. Lastly, once the VMS software is installed, if UAC was disabled, make sure to re-enable it.

 

Comments (3) : PRO Members only. Login. or Join.

Related Reports

Anyvision Facial Recognition Tested on Aug 21, 2019
Anyvision is aiming for $1 billion in revenue by 2022, backed by $74 million in funding. But does their performance live up to the hype they have...
Dahua 4K Camera Shootout on Aug 20, 2019
Dahua's new Pro Series 4K N85CL5Z claims to "deliver superior images in all lighting and environmental conditions", but how does this compare to...
ZK Teco Atlas Access Control Tested on Aug 20, 2019
Who needs access specialists? China-based ZKTeco claims its newest access panel 'makes it very easy for anyone to learn and install access control...
Installation Course - Register Now on Aug 15, 2019
Register Now for the September 2019 Video Surveillance Install Course. This is a unique installation course in a market where little practical...
Proactive CCTV "Only Affordable Video Archiving Solution" Profile on Aug 12, 2019
Proactive CCTV is claiming to offer "the only affordable video archiving solution on the market", reducing the storage typically required for H.265...
Milestone "GDPR-ready" Certification Claim Critiqued on Aug 12, 2019
Milestone is touting that its latest XProtect VMS is "GDPR-ready" with a 'European Privacy Seal'. However, our investigation raises significant...
Axis Door Station A8207-VE Tested on Aug 07, 2019
Axis newest door station, the A8207-VE, claims to deliver "video surveillance, two-way communication, and access control" in a single device. But...
Avigilon Blue VSaaS Tested on Aug 05, 2019
Avigilon says Blue is a "powerful integrator cloud service platform", easy to set up and configure, quickly scale business, by leveraging cloud...
Hikvision 4K Camera Shootout on Aug 02, 2019
With their latest Smart Series 5 cameras, Hikvision is claiming cameras "fully loaded" with "state-of-the-art technology for high performance and...
Cisco Settles False Claims Act Suit For Video Surveillance Vulnerabilities on Aug 01, 2019
Cisco entered the video surveillance market in 2007 and suffered for many years through a variety of its own errors and arrogance. The conclusion...

Most Recent Industry Reports

TMA Apologizes to Amazon / Ring on Aug 23, 2019
Not only is Amazon / Ring making major incursions into the residential security market, the organization representing the biggest incumbents, The...
China Dahua Replaces Their Software With US Pepper on Aug 22, 2019
What does a US government banned company do to improve its security positioning in the US? Well, Dahua is unveiling a novel solution, partnering...
Security Integrators Outlook On Remaining Integrators In 2025 on Aug 22, 2019
The industry has changed substantially in the last decade, with the rise of IP cameras and the race to the bottom. Indeed, more changes may be...
First GDPR Facial Recognition Fine For Sweden School on Aug 22, 2019
A school in Sweden has been fined $20,000 for using facial recognition to keep attendance in what is Sweden's first GDPR fine. Notably, the fine is...
Anyvision Facial Recognition Tested on Aug 21, 2019
Anyvision is aiming for $1 billion in revenue by 2022, backed by $74 million in funding. But does their performance live up to the hype they have...
JCI Sues Wyze on Aug 21, 2019
The mega manufacturer / integrator JCI has sued the fast-growing $20 camera Seattle startup Wyze. Inside this note: Share the court...
Dahua 4K Camera Shootout on Aug 20, 2019
Dahua's new Pro Series 4K N85CL5Z claims to "deliver superior images in all lighting and environmental conditions", but how does this compare to...
ZK Teco Atlas Access Control Tested on Aug 20, 2019
Who needs access specialists? China-based ZKTeco claims its newest access panel 'makes it very easy for anyone to learn and install access control...
Uniview Beats Intel In Trademark Lawsuit on Aug 19, 2019
Uniview has won a long-running trademark lawsuit brought by Intel, with Beijing's highest court reversing an earlier Intel win, centered on...
Suprema Biometric Mass Leak Examined on Aug 19, 2019
While Suprema is rarely discussed even within the physical security market, the South Korean biometrics manufacturer made global news this past...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact