wjr said:
Is there a way to prevent MS updates from changing a specified
registry setting? For one of the text converters, we point to a
specific one we install, but for some reason, MS recently has
started to set that entry back to the default setting. I don't
want to see that setting changed from our custom setting.
FYI, we are a vendor at the site and the site is responsible for
admin of their AD. We have little/no say over what can happened in
their AD. So any AD solution will have to run to the Admin group
get approved then go through an executive committee and the
security group before it can be deployed. Individual users do not
get admin rights.
First off - if the entry is being changed to default by a patch - it must be
in some place the patch writers deems it important to change. Which patch?
All patches?
You say you are a vendor and this is a 'text converter' and a 'specific one
we install' <-- is that your resistance in giving the name of said
converter? Or the registry key location? Or the patch that supposedly
changes the registry value?
Also - I caught your, "I don't know the specific key as I am waiting for
details from the on-site engineer..." reply. So you are not one of the
trouble-shooters or the people who do the actual work on the product in
question - I assume? And if you are - couldn't you recreate the issue
easily enough and thus 'know the specific key'?
Here's a simple set of facts - as you seem resistant to exposing your
product to ridicule and/or to pointing out the registry key(s) in question
and/or even specifying what patch(es) are supposedly changing the registry
key(s) in question - that should be fairly obvious...
- If someone/something has administrative rights on a system - that
someone/something can (in the end) do just about anything they want to said
system (excluding cracking into encryption that is not theirs in most cases
without subterfuge and returning at a later date.)
- Windows/Microsoft Updates are not installed with 'lesser' priviledges.
They are installed with administrative level priviledges (and/or as
"system".) Thus - they can, using logic, "do just about anything they want
to said system."
That being said, just like malware writers, you could change the permissions
on the registry entry(ies) in question so that everyone could read it but no
one can write/change it without taking ownership and changing the
permissions first. Not saying you are a malware writer - just using them as
an example, you see. In theory - that would prevent a patch from changing
said registry key - however it would also prevent (most likely) the patch
from being reported back as 'installed successfully' and - you have a whole
new problem because - well - you have become an annoyance (*at least) in the
eyes of those who probably will, sooner or later, discover the issue.
So - other than the above (permissions change) possibility (it is not a
certainty that it could not be changed - as I pointed out - administrative
level accounts can do just about anything) - the answer to your generic
question (barring any specifics you brave to put out such as the specific
patch(es) you believe do this, the specific product (text converter?)
installed or the location of the registry key/value that gets changed) is,
"No."