Local Administrator Accounts allow a user to install software, make system setting changes, and perform other “administrator” actions on their university computer. These accounts provide the highest level of security privileges, but they can be vulnerable to viruses or malware if not managed properly. Since a compromised computer is a danger to the entire network, the following procedures allow approved users the opportunity to have to temporary administrative accounts while also protecting individual computers and the University.
Information Technology recognizes the need for select users across campus to have temporary administrative rights to their individual or department computers. The following guidelines are for administrative rights to Windows-based computer systems.
Higher education is an attractive target for several key reasons:
Individuals that have been granted local administrator rights are responsible for the integrity of each computer. If a computer under the control of the local administrator is compromised with or without the loss of University data, granting additional accounts administrative rights, or unsecure computing, IT reserves the right to notify the users supervisor and limited access to administrative privileges in the future.
As Windows has evolved through the years, the way that Microsoft thinks about User Accounts has as well. As standard access user accounts are now empowered to perform most tasks, most users will not notice any difference to their daily routines.
Should an instance be encountered where user account elevation is required, Windows will display a pop-up similar to the example below. Your TrojanPass credential will not work.
Many commonly used applications are available for install from the Software Center application installed on all domain-joined Troy University PCs. This application resides in the Start Menu under the Microsoft System Center folder.