Request for working example implementation of psexec to escalate to Admin privileges during BigFix action execution

This is a request for a working example fixlet implementation of psexec to escalate to Admin privileges during BigFix action execution.

For some context of my request, please read the following Q&A:

Please share if anyone has developed a working example.

Thank you.

We use this all the time. This is the basic format:

psexec.exe /accepteula -h -u domain\user -p password cmd /C path\script_to_run.bat

We usually incorporate into a batch script. It works with either local or domain users. In our process, we pipe in a decrypted password. This also assumes that the user you are running as has appropriate rights on the target machines (typically via GPO).

Generally this works well. There are some known issues with certain version of PSexec and certain OSes. You may need to experiment using either older or newer versions to meet your needs.

2 Likes

Thank you!

CR: Can a BigFix action be run as a user other than the SYSTEM user and the current logged in user, such as an Administrator user?

Not directly. On Windows, an alternative way (in addition to the psexec approach already discussed) we have found is to create a scheduled task to run with whatever credentials are needed. Credentials for either a local or domain account can be used.