Nuisance or Necessity? UAC and VMS

By: Sarit Williams, Published on May 27, 2013

User Access Control (aka UAC) is Windows' attempt at thinking for and proactively protecting users. However, this can become a nuisance and a time hog when this feature works against you, especially when installing VMS software. Network administrators and IT departments are notorious for locking down an environment making it difficult to do your job. In this note, we explain why UAC is implemented, how it impacts VMS and what to do about it.

Background of UAC

User Access Control is an added security feature available on a myriad of Windows Operating Systems to better protect your PC; it was initially introduced in Vista (and who uses that OS anyway?) and can be found in Windows 7, 8, and Server 2008. This feature is turned on by default and prevents non-administrators from installing new software or making any changes to the PC that may compromise its security. So in essence, UAC helps IT departments and network administrators to lock down their network and ensure people are not installing Skype, instant messenger, etc.

UAC's Impact on VMSes

The UAC “feature” at the Operating System layer is simply an ON/OFF switch that allows or prevents changes to the registry [link no longer available]. This is important because most, if not all applications require their installer to write some files to the registry so the application functions properly as well as remains as an available program after a reboot.

When installing VMS software, UAC settings should be considered, unless the VMS vendor has automated these configuration steps in their installer. The reason is that the software itself usually saves user specific settings (such as Layout behavior, Auto Login, User Interface customizations, etc) in the Registry of the machine.

This is not an inherent function of UAC but rather the architecture of the VMS Software itself. In order for software settings and the application files to be saved to the computer during installation the user must have permissions to do that. UAC blocks many.

However, some settings such as cameras, path to recorded video and motion zones are stored in the database. This does not require UAC, but does need database administrator level credentials (typically provided as part of the setup).

The VMS Server

If the VMS software installation is attempted without turning off UAC cryptic pop-up messages during the installation process will appear. Messages like “Unable to write iac32.dll” or something similar is an indication the installer is not able to apply the files needed. Additionally, the pop-ups will offer the user the ability to  Skip, Ignore, or Try Again, but none of these options are recommended. They simply ignore the issue or skip important files from being installed causing the software to not function.

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

The VMS Client

On client machines, an end user may find that each time their VMS client is launched their prior settings (for example, a list of servers) are missing. This is another indication that UAC is on OR the user logged in to the machine is not an administrator because in order for the list of servers to be saved it requires access to modify the registry.

What To Do

Those deploying VMS servers have two options:

  • Get the Network Administrator: They will have to enter their password each time you need to install and configure new software.
  • Ask your Network administrator to turn off UAC or simply give you an administrator level access at which point you can turn off UAC yourself.

Here's how to turn UAC off:

  • Log in as a local Administrator user.
  • In the search field, type UAC.
  • Select the “Change User Account Control Settings”
  • Lower the slider from Always Notify to Never Notify
  • Click OK
  • Restart the machine for changes to take effect

This video shows it in action:

Conclusion

As a guideline, it is recommended that UAC is temporarily turned off completely prior to beginning the installation process even when you are using a local administrator user login. Installing the VMS without security constraints will ensure the software writes the necessary registry keys to  their proper location and will ensure the software functions as intended. Lastly, once the VMS software is installed, if UAC was disabled, make sure to re-enable it.

 

Comments (3) : PRO Members only. Login. or Join.

Related Reports

Camera Focusing Tutorial on Oct 14, 2019
Camera focus is fundamental to quality imaging. Mistakes can significantly reduce details, making cameras less effective. In this guide, we...
Axis HD Analog Encoder Tested on Oct 11, 2019
Two years after declaring "Everything is IP", Axis has released their first HD analog encoder, the P7304, with support for AHD, CVI, TVI, and SD...
Last Chance - Register Now - October 2019 IP Networking Course on Oct 10, 2019
Last Chance - Register Now - Fall 2019 IP Networking Course. The course starts next week. This is the only networking course designed...
Network Optix NxWitness 4.0 Tested on Oct 10, 2019
Network Optix released Nx Witness 4.0, proclaiming new features like a deep learning analytics metadata SDK, increased H.265 support, and UX...
Crisis At China's Largest VMS Provider, Netposa, Now State-Controlled on Oct 07, 2019
NetPosa, which bills itself as the PRC's largest VMS provider, is in a crisis. The firm is pursuing huge unpaid bills from clients, and its...
Camera Cable Whip Guide on Oct 02, 2019
Cable whips are one of integrator's least favorite camera features but seem to be unavoidable, now commonplace on dome, turret, and bullet cameras...
Vivotek 4K S-Series Camera Tested on Sep 30, 2019
Vivotek's highest-end S-series camera claims "Supreme Night Visibility", "Smart IR II", "Smart Stream II", "WDR Pro for unparalleled visibility in...
RealNetworks SAFR Facial Recognition Profile on Sep 25, 2019
RealNetworks entered the surveillance market by giving away their analytics to schools for free, and is now targeting large commercial users with...
Hikvision Acusense Analytics Tested on Sep 23, 2019
Hikvision touts "The Magic Behind It All" in their new Acusense line are 'deep learning algorithms' inside these cameras and recorders. But how...
Axis Perimeter Defender Improves, Yet Worse Than Dahua and Wyze on Sep 19, 2019
While Axis Perimeter Defender analytics improved from our 2018 testing, the market has improved much faster, with much less expensive offerings...

Most Recent Industry Reports

Camera Focusing Tutorial on Oct 14, 2019
Camera focus is fundamental to quality imaging. Mistakes can significantly reduce details, making cameras less effective. In this guide, we...
"UL Has Blood On Their Hands" Alleges The Interceptor / Keith Jentoft on Oct 14, 2019
"UL has blood on their hands" alleges Keith Jentoft of "The Interceptor Project". We examined The Interceptor in-depth last year, see: The...
Access Control Course Fall 2019 - Save $50 Last Chance on Oct 14, 2019
Register Now - Fall 2019 Access Control Course. Save $50 through October 10th. Thursday, October 17th is the last day to register. IPVM offers...
Axis HD Analog Encoder Tested on Oct 11, 2019
Two years after declaring "Everything is IP", Axis has released their first HD analog encoder, the P7304, with support for AHD, CVI, TVI, and SD...
Dahua Celebrates PRC 70th Wearing Communist Party Hammer and Sickle on Oct 11, 2019
Dahua celebrated the PRC's 70th anniversary with a video of various Dahua employees wearing China Communist Party hammer and sickle pins as shown...
Last Chance - Register Now - October 2019 IP Networking Course on Oct 10, 2019
Last Chance - Register Now - Fall 2019 IP Networking Course. The course starts next week. This is the only networking course designed...
Network Optix NxWitness 4.0 Tested on Oct 10, 2019
Network Optix released Nx Witness 4.0, proclaiming new features like a deep learning analytics metadata SDK, increased H.265 support, and UX...
HID Fingerprint Reader Tested on Oct 09, 2019
HID has released their first access reader to use Lumidigm optical sensors, that touts it 'works with anyone, anytime, anywhere'. We bought and...
Hikvision And Dahua Sanctioned For Human Rights Abuses on Oct 07, 2019
In a groundbreaking move that will have drastic consequences across the video surveillance market, Dahua and Hikvision have been sanctioned by the...