Working around UAC (User Access Control) without running PowerShell elevated
We've all heard it and experienced the problem where you can't perform tasks such as stopping a service on the local machine with PowerShell unless your running PowerShell elevated. If the title bar doesn't say "Administrator" then you'll end up with these types of error messages:
1Stop-Service -Name BITS -PassThru
If PowerShell remoting is enabled on the local machine, you can simply remote back into it to perform the task without having to run PowerShell elevated:
1Invoke-Command -ComputerName $env:COMPUTERNAME {Stop-Service -Name BITS -PassThru} -Credential (Get-Credential)
This seems to be a great alternate instead of always requiring that PowerShell be run elevated since
if you happen to do something like opening a URL in Internet Explorer from an elevated PowerShell
session, your asking to Get-Pwned
since that would mean that Internet Explorer would be running
elevated as an admin and not protected by UAC.
µ