{"id":13044,"date":"2025-07-20T07:52:04","date_gmt":"2025-07-20T14:52:04","guid":{"rendered":"https:\/\/www.coretechnologies.com\/blog\/?p=13044"},"modified":"2025-07-23T05:52:20","modified_gmt":"2025-07-23T12:52:20","slug":"non-admins-control-services-remotely","status":"publish","type":"post","link":"https:\/\/www.coretechnologies.com\/blog\/windows-services\/non-admins-control-services-remotely\/","title":{"rendered":"Q&#038;A: Why Can&#8217;t Non-Admins Start\/Stop Windows Services Remotely?"},"content":{"rendered":"<div align=\"center\"><img loading=\"lazy\" decoding=\"async\" class=\"no-lazy-load\" src=\"\/blog\/images\/qa-non-admin-start-windows-service-remotely.webp\" style=\"margin-bottom:20px;\" title=\"Why Can't Non-Admins Start\/Stop Windows Services Remotely?\" alt=\"Why Can't Non-Admins Start\/Stop Windows Services Remotely?\" border=\"0\" width=\"380\" height=\"160\" \/><\/div>\n<div class=\"blog-qa-question-box\">\n<img loading=\"lazy\" decoding=\"async\" class=\"no-lazy-load\" src=\"https:\/\/cdn.coretechnologies.com\/images\/quotes-transparent-21x21.webp\" width=\"21\" height=\"21\" \/>&nbsp;&nbsp;I&#8217;ve used <a href=\"\/products\/ServiceSecurityEditor\/\">Service Security Editor<\/a> to give a group of non admins rights to start and stop services on a server. However when trying to do this remotely, access fails (they don&#8217;t have any other rights on the server). I assume they need rights to remotely access Service Control Manager?<\/p>\n<p>Do you have any relevant article that explains how to do this, giving them only the required rights? I don&#8217;t want to add them as Power Users or anything like that that might enable them to log in to the server using RDP.<\/p>\n<p align=\"right\">&mdash; Gordon<\/p>\n<\/div>\n<p>Hi Gordon, thanks for reaching out.<\/p>\n<p>You&#8217;re on the right track here. Even though you&#8217;ve used Service Security Editor to grant permissions on the service, there&#8217;s still one more obstacle to overcome for normal user accounts. Let&#8217;s recap and dig into the solutions available.<\/p>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption\">Service Security Editor enables local control&#8230;<\/h2>\n<p>As you&#8217;ve seen, Service Security Editor will do the heavy lifting. With a few clicks, you can quickly setup your users to start, stop or restart any service you choose. And after your changes, they can use the <a href=\"\/blog\/windows-services\/essential-tools-for-windows-services-net-command\/\">NET command<\/a>, the <a href=\"\/blog\/windows-services\/essential-tools-windows-services-sc-exe\/\">SC command<\/a> or the <a href=\"\/blog\/windows-services\/essential-tools-windows-services-msc\/\">Services application<\/a> &mdash; whatever they like.<\/p>\n<p>In our experience, most folks stop here because local control is all they need. But you require remote access as well, and that raises security concerns &mdash; especially for accounts without admin rights.<\/p>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption\">&#8230;But Microsoft established additional restrictions on remote access<\/h2>\n<p>Starting in Windows 10 version 1709 and Windows Server 2016 version 1709, <b>only users who are local administrators on a remote computer can start or stop services on that computer<\/b>. This <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/block-remote-callers-who-are-not-local-administrators-from-starting-stopping-services-c5f77f8e-09e6-57e6-72d1-2c4423627a24\" target=\"_blank\">technical article<\/a> discusses the situation.<\/p>\n<p>To overcome this restriction and allow your users control a service remotely, you have a couple of options. You can either:<\/p>\n<ol style=\"margin-bottom:24px\">\n<li>\n<p>Promote your users to administrators on the remote computer. Since the remote access restriction only applies to non-admins, they will no longer be rejected when they come in as an administrator; or<\/p>\n<\/li>\n<li>\n<p>Add your service to the <b>remote access check exemption list<\/b> &mdash; the set of services that bypass the remote access restrictions and can be controlled remotely by normal users.<\/p>\n<\/li>\n<\/ol>\n<p>The first option may be the quickest and most familiar because it&#8217;s easy to switch a normal user to an administrator. However, going that route may have unintended security implications. Do you really want to empower your users to do anything they want on the remote server?<\/p>\n<p>The second approach involves editing the registry, which, of course, brings its own concerns. But at least it doesn&#8217;t come with hidden security consequences. We recommend going that way, so let&#8217;s take you through it in the next section.<\/p>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption\">How to add your service to the remote access check exemption list<\/h2>\n<p>Fortunately, Microsoft makes it fairly easy to add a service to the remote access check exemption list. And once the service is there, your non-admin folks will be able to control the service as desired.<\/p>\n<p>To add your service to the list, step by step:<\/p>\n<ol style=\"margin-bottom:24px\">\n<li>\n<p>Start the Windows Registry Editor (&#8220;Regedit&#8221;) on the remote computer. Since it&#8217;s an admin tool, you&#8217;ll need to be an administrator to run Regedit:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/start-registry-editor.png\" class=\"zoomPopup\" title=\"Start the Windows Registry Editor\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/start-registry-editor.png\" title=\"Start the Windows Registry Editor (click to enlarge)\" alt=\"Start the Windows Registry Editor\" border=\"0\" width=\"520\" \/><\/a><\/div>\n<\/li>\n<li>\n<p>Navigate to this key:<\/p>\n<blockquote><p><b>Computer\\HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\SecurePipeServers\\SCM<\/b><\/p><\/blockquote>\n<div align=\"center\"><a href=\"\/blog\/images\/regedit-go-to-scm-key.png\" class=\"zoomPopup\" title=\"Go to the SCM registry key\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/regedit-go-to-scm-key.png\" title=\"Go to the SCM registry key (click to enlarge)\" alt=\"Go to the SCM registry key\" border=\"0\" width=\"520\" \/><\/a><\/div>\n<p>If you don&#8217;t see a <b>SCM<\/b> key &mdash; which is normal on some systems &mdash; create it by right-clicking the <b>SecurePipeServers<\/b> key on the left and selecting <nobr><b>New &gt; Key<\/b><\/nobr>.<\/p>\n<\/li>\n<li>\n<p>In the left panel, right-click the SCM key and select <nobr><b>New &gt; Multi-String Value<\/b><\/nobr>:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/create-new-multi-string-scm-value.png\" class=\"zoomPopup\" title=\"Create a new Multi-String Value\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/create-new-multi-string-scm-value.png\" title=\"Create a new Multi-String Value (click to enlarge)\" alt=\"Create a new Multi-String Value\" border=\"0\" width=\"520\" \/><\/a><\/div>\n<\/li>\n<li>\n<p>In the new value that gets created on the right, set the name to <b>RemoteAccessCheckExemptionList<\/b>:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/set-remote-access-check-exemption-list-name.png\" class=\"zoomPopup\" title=\"Set the name to RemoteAccessCheckExemptionList\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/set-remote-access-check-exemption-list-name.png\" title=\"Set the name to RemoteAccessCheckExemptionList (click to enlarge)\" alt=\"Set the name to RemoteAccessCheckExemptionList\" border=\"0\" width=\"520\" \/><\/a><\/div>\n<\/li>\n<li>\n<p>Double-click <b>RemoteAccessCheckExemptionList<\/b> to edit its value. In the window that comes up, add the name of your service. But be sure to use your service&#8217;s &#8220;real&#8221; name and not its display name, which may be different.<\/p>\n<p>For example, here&#8217;s what that looks like when we added Print Spooler, where the service name is Spooler:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/add-service-name-spooler.png\" class=\"zoomPopup\" title=\"Add the name of your service to the list\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/add-service-name-spooler.png\" title=\"Add the name of your service to the list (click to enlarge)\" alt=\"Add the name of your service to the list\" border=\"0\" \/><\/a><\/div>\n<p>Feel free to add multiple services if you like. Just hit the return key, enter another name and keep going.<\/p>\n<p>Click <b>OK<\/b> once you&#8217;re done.\n<\/li>\n<li>\n<p>Back in the main Registry Editor window, you should now see your service(s) in the RemoteAccessCheckExemptionList value:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/spooler-service-added-to-remote-access-check-exemption-list.png\" class=\"zoomPopup\" title=\"RemoteAccessCheckExemptionList value set\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/spooler-service-added-to-remote-access-check-exemption-list.png\" title=\"RemoteAccessCheckExemptionList value set (click to enlarge)\" alt=\"RemoteAccessCheckExemptionList value set\" border=\"0\" width=\"520\" \/><\/a><\/div>\n<\/li>\n<li>\n<p>Finally, close Registry Editor.<\/p>\n<\/li>\n<\/ol>\n<p>And with your service on the remote access check exemption list, your non-admin users with rights to the service shouldn&#8217;t have any trouble manipulating the service. The dreaded &#8220;access denied&#8221; error will be a relic of the past.<\/p>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption\">Coming soon: Service Security Editor will update the remote access check exemption list for you<\/h2>\n<p>Our team has already started sketching how to enable non-admin remote access with Service Security Editor. And once that new version of our free software is out, you won&#8217;t have to read technical articles from Microsoft or mess with the Windows Registry &mdash; unless you really, really want to. \ud83d\ude42<\/p>\n<div style=\"margin-top:30px\" align=\"center\">\n<div class=\"cta-button-1\">\n<table role=\"presentation\" cellspacing=\"0\" cellpadding=\"0\" border=\"0\" align=\"left\">\n<tbody>\n<tr>\n<td align=\"center\"><a href=\"\/blog\/tag\/windows-services-2\/\" title=\"More about Windows Services\"><span><nobr>Read more about Windows Services\u2026<\/nobr><\/span><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<!-- relpost-thumb-wrapper --><div class=\"relpost-thumb-wrapper\"><!-- filter-class --><div class=\"relpost-thumb-container\"><style>.relpost-block-single-image, .relpost-post-image { margin-bottom: 10px; }<\/style><h3>You may also like...<\/h3><div style=\"clear: both\"><\/div><div style=\"clear: both\"><\/div><!-- relpost-block-container --><div class=\"relpost-block-container relpost-block-column-layout\" style=\"--relposth-columns: 3;--relposth-columns_t: 2; --relposth-columns_m: 2\"><a href=\"https:\/\/www.coretechnologies.com\/blog\/alwaysup\/run-service-after-start\/\"class=\"relpost-block-single\" ><div class=\"relpost-custom-block-single\"><img decoding=\"async\" loading=\"lazy\" class=\"relpost-block-single-image\" alt=\"Q&amp;A: How do I Launch a Service after AlwaysUp Starts my Application?\"  src=\"https:\/\/www.coretechnologies.com\/blog\/wp-content\/uploads\/gears-working-together-150x150-1.webp\" style=\"aspect-ratio:1\/1\" style=\"aspect-ratio:1\/1\"><\/img><div class=\"relpost-block-single-text\"  style=\"height: 75px;font-family: Arial;  font-size: 12px;  color: #333333;\"><h2 class=\"relpost_card_title\">Q&amp;A: How do I Launch a Service after AlwaysUp Starts my Application?<\/h2><\/div><\/div><\/a><a href=\"https:\/\/www.coretechnologies.com\/blog\/alwaysup\/version-17-enterprise-security\/\"class=\"relpost-block-single\" ><div class=\"relpost-custom-block-single\"><img decoding=\"async\" loading=\"lazy\" class=\"relpost-block-single-image\" alt=\"AlwaysUp 17: Hang Protection, Enterprise Security Improvements &amp; Much More\"  src=\"https:\/\/www.coretechnologies.com\/blog\/wp-content\/uploads\/alwaysup-v17-hang-protection-enterprise-security-improvements-150x150-1.webp\" style=\"aspect-ratio:1\/1\" style=\"aspect-ratio:1\/1\"><\/img><div class=\"relpost-block-single-text\"  style=\"height: 75px;font-family: Arial;  font-size: 12px;  color: #333333;\"><h2 class=\"relpost_card_title\">AlwaysUp 17: Hang Protection, Enterprise Security Improvements &amp; Much More<\/h2><\/div><\/div><\/a><a href=\"https:\/\/www.coretechnologies.com\/blog\/windows-services\/essential-tools-for-windows-services-process-explorer\/\"class=\"relpost-block-single\" ><div class=\"relpost-custom-block-single\"><img decoding=\"async\" loading=\"lazy\" class=\"relpost-block-single-image\" alt=\"Essential Tools for Windows Services: Process Explorer\"  src=\"https:\/\/www.coretechnologies.com\/blog\/wp-content\/uploads\/process-explorer-150x150.png\" style=\"aspect-ratio:1\/1\" style=\"aspect-ratio:1\/1\"><\/img><div class=\"relpost-block-single-text\"  style=\"height: 75px;font-family: Arial;  font-size: 12px;  color: #333333;\"><h2 class=\"relpost_card_title\">Essential Tools for Windows Services: Process Explorer<\/h2><\/div><\/div><\/a><\/div><!-- close relpost-block-container --><div style=\"clear: both\"><\/div><\/div><!-- close filter class --><\/div><!-- close relpost-thumb-wrapper -->","protected":false},"excerpt":{"rendered":"<p>&nbsp;&nbsp;I&#8217;ve used Service Security Editor to give a group of non admins rights to start and stop services on a server. However when trying to do this remotely, access fails (they don&#8217;t have any other rights on the server). I &hellip; <a href=\"https:\/\/www.coretechnologies.com\/blog\/windows-services\/non-admins-control-services-remotely\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":13056,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[127,385,386,387,143,148,196],"class_list":["post-13044","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-windows-services","tag-qa","tag-remote-access-check","tag-remote-access-check-exclusion-list","tag-remote-access-check-exemption-list","tag-security","tag-service-security-editor-2","tag-windows-services-2"],"_links":{"self":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/13044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/comments?post=13044"}],"version-history":[{"count":15,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/13044\/revisions"}],"predecessor-version":[{"id":13064,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/13044\/revisions\/13064"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/media\/13056"}],"wp:attachment":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/media?parent=13044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/categories?post=13044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/tags?post=13044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}