Runas Run This Program With Restricted Access
Workaround for software that won't run in restricted accounts: In. One way to access 'Run as' is through the right. Windows Server Hacks: Disable 'Run As'.
I am having a problem on one of my servers that was recently hit with a virus. It seems, when logged on as administrator, I cannot access any of the applications in administrative tools by just clicking on them.

I have to Right Click - Runas - then uncheck the option 'Run this program with restrictive access' and then the applications (Computer Management, DNS, ADUC) will run normally. My first thought is that the virus (w32.sillyFDC) changed a reg key and turned the restricted access option on under Runas for all applications. Has anyone ever come across this or know of a way to shut this option off by default? Any help is appreciated!
Is there any way that I can force a program that normally requires administrator privileges (via UAC) to run without them? (ie: no UAC prompt and no system-wide access.) Added: Without modifying the executable itself. In spite of James's answer, I have found a few ways that it can almost be done:.
By modifying the executable I can remove the trustInfo entry from the manifest (or the manifest entirely, so I can use an external one), allowing the program to start without UAC. Unfortunately this modifies the executable, so it exits shortly after due to an internal checksum test. By using Process Explorer I can launch it as a Limited User. However this seems to limit it significantly more than I would like (it runs like Protected Mode IE and so can access significantly less than what my standard un-elevated user can).
I hope I'm not too late to the party, but I was looking for a similar question and without seeing an answer here I found out that Windows' builtin RunAscommand, when run as administrator, can do that with /trustlevel switch. RUNAS /trustlevel: program /showtrustlevels displays the trust levels that can be used as arguments to /trustlevel. /trustlevel should be one of levels enumerated in /showtrustlevels.

This worked in my case. Ironically, starting a program explicitly without elevation requires an elevated command prompt. Go figure.:) I hope it helps you.
Admissions office uh hilo. While in his question Andrew stated that the following did not quite work: By modifying the executable I can remove the trustInfo entry from the manifest (or the manifest entirely, so I can use an external one), allowing the program to start without UAC. Unfortunately this modifies the executable, so it exits shortly after due to an internal checksum test. I was able to modify an external.manifest file for the software I was using and change to Turns out the software I was using did not really require administrator rights so I was able to run it on a Standard User account without UAC or administrator passwords. No, if a program requires UAC then it is trying to access something outside of its sandbox.
See More On Stackoverflow
The program will not correctly run without the elevated access. If you just want to get rid of the notification, you can disable UAC. Disable UAC on Windows Vista: Start, type 'user'. Click on 'User Accounts'. On the window that pops up, click on 'User Account Control Settings' and then Turn off UAC. Disable UAC on Windows 7: Start, type 'user'. Click on 'User Account Control Settings'.

Give More Feedback
Drag the choice bar all the way to the bottom to 'Never Notify.'