mirror of
https://github.com/amidaware/tacticalrmm.git
synced 2026-04-26 06:55:52 +03:00
[GH-ISSUE #1724] Certain service checks return error "access denied" #1076
Labels
No labels
In Process
bug
bug
dev-triage
documentation
duplicate
enhancement
fixed
good first issue
help wanted
integration
invalid
pull-request
question
requires agent update
security
ui tweak
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/tacticalrmm#1076
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Aidan-abss on GitHub (Jan 2, 2024).
Original GitHub issue: https://github.com/amidaware/tacticalrmm/issues/1724
Server Info (please complete the following information):
Installation Method:
Agent Info (please complete the following information):
Describe the bug
Services like: RPCSS, Distributed Transaction Coordinator, and Dcom Server Process Launcher which are running on the agent system can not be checked and return an error "access denied". Those services do not show up when creating a check for a specific agent. The service does not appear in remote background.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
We should see that the check reports that services are running when they are running (confirmed by logging into the system and checking the services MMC snap-in). We should see the check tell us the service is stopped when it is stopped
Screenshots


Additional context
Add any other context about the problem here.
@silversword411 commented on GitHub (Jan 9, 2024):
This has been discussed before, can't find where ATM.
Pretty sure you are using windows server 2019/2022.
There's some kind of security or special permission where some services are protected in a new/different way for security.
If you find more info and/or a pattern please post info.
@silversword411 commented on GitHub (Jan 9, 2024):
Found it. Discord discussion
https://discord.com/channels/736478043522072608/1138917739835166843
Are the problem services running as "NETWORK SERVICE"?
@Aidan-abss commented on GitHub (Jan 11, 2024):
Yes. They do run as network service.
But not all services that are running as "network Service" experience this issue, such a s RPC locator service.
@silversword411 commented on GitHub (Jan 13, 2024):
So it's something else along with that.
Is there any Microsoft documentation on the topic?