Please enable JavaScript to view this site.

dcsTools Audio Importer

Navigation: TroubleShooting

User Account Control (UAC) Issues

Scroll Prev Top Next More

Starting with the introduction of Windows Vista and subsequent operating system releases, Microsoft added a significant amount of additional security to these operating systems.

Generally referred to as UAC (User Account Control), the sum of these changes dramatically affect named users who might be categorized as "standard" or "general" users. Areas that previously had been quite open, allowing these users to modify, create and delete items like files and registry entries are now protected as default. Users with standard rights and privileges on these systems are now as a default prevented from making changes in such areas as the Program Files folder, the Windows folder and in the Windows registry area known as HKEY_LOCAL_MACHINE.

dcsTools Audio Import Service stores some of its basic configuration in the Windows Registry under HKEY_LOCAL_MACHINE. Normally, these registry settings do not need to be changed, but there may be a situation where one or more of the basic settings needs to be manually changed. If you are using a user name and password other than the default System account, make sure the assigned user name has read and write privileges in its base registry key and all sub-keys located under the base key. The base key is:

HKEY_LOCAL_MACHINE\Software\dcsTools (32-bit Windows) or

HKEY_LOCAL_MACHINE\Software\Wow6432Node\dcsTools (64-bit Windows)

For additional information, see the dcsTools Audio Import Service Registry Information topic.

The installation program for dcsTools Audio Importer also stores a minimal amount of information in the registry. The information is used for updating and uninstalling the product. The information is not used in day-to-day operations. Installation, updates and uninstalling require the logged-on user have administrative privileges.

In addition, Microsoft published numerous guidelines and usage information regarding these changes. Some of the guidelines would cause applications who require the end-user to be able to modify preference settings, etc., to place files in several locations on the PC. While these changes do enhance the overall security of the operating system, having files and information for a specific application spread all over the system in places not intuitive or easy to find creates a significant support burden for IT managers and the application vendor.

Over the years, we have chosen to try to keep all of our application's files, including those that store preferences, files containing run-time information like exception logging and activity detail, and small database files, in one location for ease in troubleshooting and housekeeping.

For these reasons, our applications are generally placed in a folder other than the Microsoft-recommended Program Files folder. As a default, these other folders historically have been "wide open" in the sense that any user could read, write and modify files.

However, depending on how tightly-secured a system is when running Vista or a later operating system, issues may arise that relate to user rights. The following points may assist you in locating problems with dcsTools Audio Import Manager when running one of these operating systems and the user reporting issues does not have administrative privileges.

1.Make sure that user having trouble with dcsTools Audio Import Manager has read, write, modify and delete privileges in the folder in which dcsTools Audio Import Manager is installed. These privileges might be assigned to an individual user but more commonly are assigned to a user group of which the user is a member.

2.If you are placing files in a location other than the dcsTools Audio Import Manager folder, file locations that are set up in the Preferences area, ensure that the named user has read, write, modify and delete privileges in that folder location.

3.One way that some issues can be overcome is to modify any dcsTools Audio Import Manager shortcuts to cause the application to be run under administrator privileges. [Right-Click] on the shortcut and select the menu item "Run as Administrator". A negative of this approach is that the end-user will more than likely have to enter an administrative password, which defeats the concept of administrative security as you'd have to provide the user with the password.

Another approach some people use is to disable UAC. While this action more or less returns user accounts to the sort of status they had in previous versions of Windows, this also defeats the idea of enhanced operating system security.

4.If an application uses the registry, particularly the portion known as HKEY_LOCAL_MACHINE, you may have to extend rights to specific keys that the application modifies or creates during normal usage. In order to add permissions to the registry, you will need to use regedt32.exe, the extended registry editor.

In order to extend additional privileges to a user or user group, either in the file system or registry, you need be be logged on to the operating system as an administrator.