Nuisance or Necessity? UAC and VMS

By: Sarit Williams, Published on May 27, 2013

User Access Control (aka UAC) is Windows' attempt at thinking for and proactively protecting users. However, this can become a nuisance and a time hog when this feature works against you, especially when installing VMS software. Network administrators and IT departments are notorious for locking down an environment making it difficult to do your job. In this note, we explain why UAC is implemented, how it impacts VMS and what to do about it.

Background of UAC

User Access Control is an added security feature available on a myriad of Windows Operating Systems to better protect your PC; it was initially introduced in Vista (and who uses that OS anyway?) and can be found in Windows 7, 8, and Server 2008. This feature is turned on by default and prevents non-administrators from installing new software or making any changes to the PC that may compromise its security. So in essence, UAC helps IT departments and network administrators to lock down their network and ensure people are not installing Skype, instant messenger, etc.

UAC's Impact on VMSes

The UAC “feature” at the Operating System layer is simply an ON/OFF switch that allows or prevents changes to the registry [link no longer available]. This is important because most, if not all applications require their installer to write some files to the registry so the application functions properly as well as remains as an available program after a reboot.

When installing VMS software, UAC settings should be considered, unless the VMS vendor has automated these configuration steps in their installer. The reason is that the software itself usually saves user specific settings (such as Layout behavior, Auto Login, User Interface customizations, etc) in the Registry of the machine.

This is not an inherent function of UAC but rather the architecture of the VMS Software itself. In order for software settings and the application files to be saved to the computer during installation the user must have permissions to do that. UAC blocks many.

However, some settings such as cameras, path to recorded video and motion zones are stored in the database. This does not require UAC, but does need database administrator level credentials (typically provided as part of the setup).

The VMS Server

If the VMS software installation is attempted without turning off UAC cryptic pop-up messages during the installation process will appear. Messages like “Unable to write iac32.dll” or something similar is an indication the installer is not able to apply the files needed. Additionally, the pop-ups will offer the user the ability to  Skip, Ignore, or Try Again, but none of these options are recommended. They simply ignore the issue or skip important files from being installed causing the software to not function.

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

The VMS Client

On client machines, an end user may find that each time their VMS client is launched their prior settings (for example, a list of servers) are missing. This is another indication that UAC is on OR the user logged in to the machine is not an administrator because in order for the list of servers to be saved it requires access to modify the registry.

What To Do

Those deploying VMS servers have two options:

  • Get the Network Administrator: They will have to enter their password each time you need to install and configure new software.
  • Ask your Network administrator to turn off UAC or simply give you an administrator level access at which point you can turn off UAC yourself.

Here's how to turn UAC off:

  • Log in as a local Administrator user.
  • In the search field, type UAC.
  • Select the “Change User Account Control Settings”
  • Lower the slider from Always Notify to Never Notify
  • Click OK
  • Restart the machine for changes to take effect

This video shows it in action:


As a guideline, it is recommended that UAC is temporarily turned off completely prior to beginning the installation process even when you are using a local administrator user login. Installing the VMS without security constraints will ensure the software writes the necessary registry keys to  their proper location and will ensure the software functions as intended. Lastly, once the VMS software is installed, if UAC was disabled, make sure to re-enable it.


Comments (3) : PRO Members only. Login. or Join.

Related Reports

ONVIF Video Surveillance Tutorial on Jan 29, 2019
ONVIF is well known within the surveillance industry as an interface to connect IP cameras and VMS systems. However, new users may find it...
Salient CompleteView 20/20 VMS Tested on Feb 27, 2019
In IPVM's last test of Salient 3 years ago, we found various problems and deficiencies. Now, Salient says their new CompleteView 20/20 "unified...
Genetec Security Center 5.8 Tested on Mar 19, 2019
Genetec has released Version 5.8. This comes after a wait of more than a year that caused frustrations for many Genetec partners. Our previous...
Milestone XProtect 2019 R1 Tested on May 15, 2019
For the past few years, Milestone has released quarterly software updates XProtect VMS platform. What is new and how much impact do the updates...
IndigoVision Control Center VMS Tested on May 30, 2019
IPVM's last test of IndigoVision's VMS was in 2010, which found enterprise VMS features and a simple client interface. but no 3rd party camera...
Exacq Remote Cloud Access Tested on Jun 20, 2019
Remote cloud access has been missing from most VMSes (including Exacq and Milestone). Now, Exacq, after releasing Cloud Drive Storage earlier in...
Avigilon ACC7 VMS Tested on Jul 22, 2019
Avigilon's Control Center 7 boldly claims it will "transform live video monitoring" with the new Focus of Attention "AI-enabled" interface. We...
Network Optix NxWitness 4.0 Tested on Oct 10, 2019
Network Optix released Nx Witness 4.0, proclaiming new features like a deep learning analytics metadata SDK, increased H.265 support, and UX...
Milestone XProtect 2019 R3 'Centralized Search' Tested on Oct 30, 2019
Milestone has had problems over the last few years releasing significant new software. Now, in XProtect 2019 R3, Milestone is touting "one search...
IP Camera Browser Support: Who's Broken / Who Works on Dec 10, 2019
For many years, IP cameras depended on ActiveX control, whose security flaws have been known for more than a decade. The good news is that this is...

Most Recent Industry Reports

Hanwha Wisenet X Plus PTRZ Tested on Feb 14, 2020
Hanwha has released their PTRZ camera, the Wisenet X Plus XNV-6081Z, claiming the "modular design allows for easy installation". We bought and...
PRC Warns Against China Video Surveillance Hacks, Hikvision Targeted on Feb 14, 2020
Hackers are targeting China video surveillance manufacturers and systems, according to the PRC's main cyber threat monitoring body. The hackers...
IPVM Conference 2020 on Feb 13, 2020
IPVM is excited to announce our 2020 conference. This is the first and only industry event that will be 100% sponsor-free. Like IPVM online, the...
Bosch Dropping Dahua on Feb 13, 2020
Bosch has confirmed to IPVM that it is in the process of dropping Dahua, over the next year, as both IP camera contract manufacturer and recorder...
BluB0X Alleges Lenel, S2, Software House Are Dinosaurs on Feb 13, 2020
BluB0X is running an ad campaign labeling Lenel, S2, Software House, Honeywell, AMAG and more as dinosaurs: In a follow-up email to IPVM,...
London Live Police Face Recognition Visited on Feb 13, 2020
London police have officially begun using live facial recognition in select areas of the UK capital, sparking significant controversy. IPVM...
Converged vs Dedicated Networks For Surveillance Tutorial on Feb 12, 2020
Use the existing network or deploy a new one? This is a critical choice in designing video surveillance systems. Though 'convergence' was a big...
Monitoreal "Completely Autonomous" Home AI Tested on Feb 12, 2020
Monitoreal claims to allow users to "see the things you want (people, vehicles, animals) and ignore the things you don’t”, using AI to distinguish...
Cisco Video Surveillance Is Dead, Long Live Cisco Meraki Video Surveillance on Feb 11, 2020
A dozen years ago much of the industry thought that Cisco was destined to dominate video surveillance. They stumbled repeatedly, failing. Now it is...
BICSI For IP Video Surveillance Guide on Feb 11, 2020
Spend enough time around networks and eventually someone will mention BICSI, the oft-referenced but only vaguely known standards body prevalent in...