US English (US)
ES Spanish

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

  • Contact Us
English (US)
US English (US)
ES Spanish
  • Home
  • AutoElevate Knowledgebase
  • Managing Rules

CLSID Support

Learn how to use and understand CLSIDs to identify software components.

Written by Owen Parry

Updated at July 27th, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

  • AutoElevate Knowledgebase
    New to AutoElevate? START HERE General & Troubleshooting Managing Rules Integrations Announcements FAQ Sales & Marketing
  • Password Boss Knowledgebase
    Using Password Boss Business Administration Password Boss Partner Documents
  • Changelogs for Autoelevate and Password Boss
  • Current Status
  • Marketing Toolkit
    MSP Marketing & Education Toolkit
+ More

Table of Contents

What is CLSID? How it Works Now

Starting with Agent 1.8.0.0, CLSID UAC prompts are detected and handled by AutoElevate. In previous agent versions, if a UAC dialog (User Account Control) were generated (which referenced the source as being a CLSID), then the AutoElevate agent would ignore the request and allow the UAC to come up.
 

What is CLSID?


A CLSID is a com object reference. Some Windows UAC elevation requests reference a CLSID instead of a file. 

 CLSID-UAC-Blurred.png

Examples - A few Windows functions that require elevated privileges and reference a CLSID include:

  • Changing a network adapter setting
  • Installing a font
  • Un-installing certain types of applications 
     

How it Works Now


Starting with Agent 1.8.0.0, when a Windows UAC dialog box referencing a CLSID comes up, AutoElevate will process it in a similar fashion to how it currently handles other file-based requests.

When a CLSID is detected, AutoElevate will read the CLSID title and description and follow the registry reference to its corresponding file (ie, .dll, .cpl, etc.). A file hash will be generated and checked against the Virus-Total database to identify the source positively. The normal privilege evaluation process is then followed. 

If approved by the technician, the end-user will need to manually launch the function again, as AutoElevate is not able to do it automatically. They will be prompted with a new AutoElevate dialog message asking them to re-launch.

Once re-launched, the function will be elevated using the Admin Elevation method, causing the UAC to be filled in with a Local Admin credential.  

support clsid

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How to Automatically Remove Admin Privileges
  • Technician Mode Ticketing
  • VirusTotal Integration Enhancements
  • Firewall Whitelisting
  • Products
    • Privileged Access Management
    • Password Management
  • Solutions
    • For MSPs
    • For IT Pros
    • By Industry
  • Resources
    • Weekly Demos
    • Events
    • Blog
    • FAQ
  • Company
    • Leadership
    • Culture + Values
    • Careers
    • Awards
    • News & Press
    • Trust Center
    • Distributors
  • Get Pricing
  • Free Trial
  • Request a Demo
  • Support
  • Login
  • Contact
4925 Independence Parkway
Suite 400
Tampa, FL 33634
CALL US (813) 578-8200
  • Link to Facebook
  • Link to Linkedin
  • Link to Twitter
  • Link to Youtube
© 2023 CYBERFOX LLC ALL RIGHTS RESERVED  |  Privacy Policy

Knowledge Base Software powered by Helpjuice

Expand