This issue occurs if User Account Control (UAC) is enabled while you are trying to install the Converter Standalone Agent on the source machine.
Resolution
To resolve this issue, log in to the Windows machine as the local administrator and disable UAC.
To disable UAC on Windows Vista or Windows 2008:
Open Control Panel.
Click User Accounts.
In User Accounts window, click User Accounts.
In the User Accounts tasks window, click Turn User Account Control on or off. If UAC is configured, you see a message.
Click Continue.
Deselect the Use User Account Control (UAC) to help protect your computer option and then click OK.
Restart the system for the changes to take effect.
To disable UAC on Windows 7 or Windows 2008 R2:
Open Control Panel.
Click User Accounts.
In the User Accounts window, click User Accounts.
In the User Accounts tasks window, click Change User Account Control settings.
Drag the slider in the next window to Never notify.
Restart the system for changes to take effect.
To disable UAC on Windows 10 follow the below steps:
Type control panel in the search bar of Windows 10 and click this app in the result to open it.
Go to User Accounts > Change User Account Control settings.
Drag the slider control to Never notify
Click OK to apply the change.
If after disabling UAC and the issue is still present, perform the following:
Run gpedit.msc
Computer Configuration
Windows Settings
Security Settings
Local Policies
Security Option
Network Access:Ssharing and security model for local accounts
Change setting to "Classic - local users authenticate as themselves."
To disable UAC on Windows 10 follow the below steps:
Step 1: Access Group Policy Management Console
Open GPMC by searching for “Group Policy Management” in the Start menu or by executing gpmc.msc.
Step 2: Create or Edit a Group Policy Object
To create a new GPO, right-click on the desired domain or OU and select “Create a GPO in this domain, and Link it here…”.
To modify an existing GPO, locate it under the appropriate domain or OU, right-click on it, and choose “Edit”.
Step 3: Navigate to UAC Settings
In the Group Policy Management Editor, go to: Computer Configuration → Policies → Windows Settings → Security Settings → Local Policies → Security Options.
Step 4: Configure UAC Policy
Locate and open the policy “User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode”.
Set this policy to “Prompt for consent” or “Prompt for credentials” based on your organizational security policy.
Prompt for consent: This option will prompt administrators to approve elevation requests without entering a password.
Prompt for credentials: This requires administrators to enter their credentials to approve elevation requests.
Step 5: Apply and Enforce the GPO
Click “OK” or “Apply” to enforce the new settings.
Link the GPO to the relevant OU(s).
The policy will be applied at the next Group Policy refresh cycle. To apply it immediately, use gpupdate /force on the client machines.
Advanced Configuration and Use Cases
High-Security Environments: In environments where security is paramount, such as in financial or government sectors, enforcing admin approval for UAC can significantly enhance security.
Compliance and Regulatory Standards: Certain regulatory frameworks may require stringent user account control settings. This configuration can help in meeting those compliance standards.
Different Policies for Different User Groups: You might need more stringent UAC settings for users with access to sensitive data, while others may have standard settings.
Additional Information
Security Considerations
Balancing Security and Usability:
Ensure that UAC settings do not hinder productivity. Overly aggressive UAC prompts can lead to ‘click fatigue’, causing users to approve prompts without proper scrutiny.
Regular Policy Review:
Continually evaluate the effectiveness of the UAC settings and make adjustments as needed to align with evolving security practices and organizational needs.