Working around UAC (User Access Control) without running PowerShell elevated

We've all heard it and experienced the problem where you can't perform tasks such as stopping a service on the local machine with PowerShell unless your running PowerShell elevated. If the title bar doesn't say "Administrator" then you'll end up with these types of error messages:

1Stop-Service -Name BITS -PassThru

uac1b.jpg

If PowerShell remoting is enabled on the local machine, you can simply remote back into it to perform the task without having to run PowerShell elevated:

1Invoke-Command -ComputerName $env:COMPUTERNAME {Stop-Service -Name BITS -PassThru} -Credential (Get-Credential)

uac2a.jpg

This seems to be a great alternate instead of always requiring that PowerShell be run elevated since if you happen to do something like opening a URL in Internet Explorer from an elevated PowerShell session, your asking to Get-Pwned since that would mean that Internet Explorer would be running elevated as an admin and not protected by UAC.

µ