Is there a way I can delete a wlan profile created by Group policy on Windows 8.1 - windows-8.1

When I issue netsh wlan show profiles from command prompt on a Windows 8.1 box, it displays the following information. The account I logon this machine is an administrator role.
Profiles on interface Wi-Fi:
Group policy profiles (read only)
---------------------------------
gp
User profiles
-------------
All User Profile : Linuxs
Now I want to delete the profile gp by netsh wlan delete profile name="gp", and it tells me that
You do not have sufficient privileges or the profile "gp" on interface "Wi-Fi" is a group policy profile.
I tried google out a way to delete this wlan profile, but get no luck. I'd really appreciate if there is anyone who can shed a light on this issue for me.

Wireless connection profiles delivered by policy are stored in the \Windows\wlansvc\Policies folder.
To reset them, delete this folder, then restart the WLAN service.

This is happening because your not being accepted as the admin with the specified privileges for calling this action. It also seems as though you don't have access to changing group policy. This is something Windows won't allow unless you have direct administrative access especially with it being read only. It's like the same thing as needing root access, you would be able to change this, if your account is recognized as a administrator.

netsh wlan delete filter denyall infrastructure
netsh wlan delete filter denyall adhoc

Related

Stopping Domain Admin from seeing user profile/supplied pc

Silly question but i'm not sure if its possible.
I want to supply a PC to clients with a solution of mine that i don't want them to have access to, it needs to run certain tasks and scripts.
If i supply the PC to the client and load it onto their domain i don't event want the Administrator to be able to log into that PC.
Is there a way to block all access except for access by me to that PC on the domain with only my credentials?
I was thinking i could do it through "local users and group settings".
Regards
Gordon
No. The domain admin will have to join the PC to the domain, and thereby have full admin rights.
Local rights only apply to the PC and are trumped by domain.

How to access softwares installed by local user in domain user account

I have installed a lot of application and utility software on my laptop using my local windows 8.1 account. recently i have joined a company where i got a domain account, when i joined the company domain and logged in using domain account i couldn't find most of my application that is available when log in using local account. how can i make those software applications available in my domain account as well rather than to re-install all of them.
Another question is that I have administrative rights and even then when try to install any software on any client pc i need to provide the administrative user password. how can I make it so it do not ask me administrative user password when i install any software on any client.
I have the administrative rights with domain user account and i can modify my domain user account easily.
Thanks in Advance
You don't specify, I am assuming you are using the start menu & desktop (and NOT the metro tiles).
First task, make programs available to both local and domain logins. (Substitute your actual login names for local-user and domain-user.)
While logged in as domain-user, use Windows Explorer to browse to C:\Users\local-user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs
You will see there the shortcuts (and folders for shortcuts) for the programs you can't find logged in as domain-user. You should be able to double-click these shortcuts to launch the programs, no harm in trying it to verify.
You can then move these shortcuts (and shortcut folders) to be available to "all users" on the laptop by moving them to the folder: C:\ProgramData\Microsoft\Windows\Start Menu\Programs.
Second task, eliminate the annoying the administrator prompts.
Open Control Panel > Users > Change User Account Control settings (middle of window) --- move the slider at left all the way to the bottom "Never notify".
You will be prompted for administrator credentials to confirm you want to do this.

Limit access to Jenkins web dashboard

At the moment I'm running Jenkins on my Mac Mini and everybody in my local network can access the web dashboard at the address http://<JenkisIP>:8080. How can I setup username and password credentials to limit the access to it?
You want to check the enable security feature in the configure menu, select "Jenkins's own user database" as the security realm and then alter the security matrix to suit your requirements.
For the first run, give everyone full access. Allow users to sign up, create your own account (if you don't have one) and then give full privileges to that account and remove all privileges to anonymous.
All the information you need should be found here:
https://wiki.jenkins-ci.org/display/JENKINS/Standard+Security+Setup

SSRS and UAC problem

I have using SSRS 2008r2 on Windows2003 server and added Domain Users group as a System Administrator via report manager. However, when I mimic an ordinary user in report manager web interface on my computer(member of the domain) I get;
User 'usera' does not have required permissions. Verify that sufficient permissions have been granted and Windows User Account Control (UAC) restrictions have been addressed.
if I try with user a on the server by using FQDN, it it shows same error above.
If I type localhost instead, it does work. while using localhost, it I navigate to a folder and while I am in a folder and change the localhost to FQDN, it still works.
There are lots of solutions on the web, like the one on http://skamie.wordpress.com/2010/06/24/ssrs-and-uac/, but it did not work..
Does anyone have any idea?
Many Thanks
Regards
Have you tried right-clicking on IE and select Run as Administrator?
I have to do that from time to time on my development machine so it is sort of first solution that came to mind. Hope it helps.
Additional answer:
So the Domain Users group has System Admin role. You can try adding that group as Browser role or Content Manager role at the root folder.

Querying remote system via WMI returns access denied for non-administrator

I have a simple WMI query that runs fine locally, but querying a remote system gives an access denied error. When I add the local user to the remote system as member of the administrator group, the query works as expected, but I don't want to have that user as a member of that group.
I already tried the following things, unfortunately not successful so far:
I enabled RemoteAdmin for the firewall (netsh firewall set service RemoteAdmin enable)
I added the user with all possible access rights to the WMI Security settings (for the root name space, and I also checked that the settings are correctly propagated to the namespace I'm querying, root/cimv2) via wmimgmt.msc
I enabled remote access for the user in DCOM COM security
I still get the same error every time I run my query, is there anything else that I may have missed?
WMI rights are much tighter than typical, as the link provided by Uros describes in detail. In short, you will either need to enable the Active Directory right called "Trusted for Delegation", which is extremely powerful and not recommended, or add explicit credentials, as described in the MS link referenced by Uros.

Resources