Launching Tools Using Alternate Credentials from a Command Prompt Window
One of the easiest ways to launch tools using alternate credentials is to first launch a Command Prompt with the credentials you want to use. Once the Command Prompt is launched using the alternate credentials, all subsequent commands and tools run from that Command Prompt start using the elevated credentials you provided.
If you are starting from the Desktop in Windows Vista, Windows 7, or Windows Server 2008 and Windows Server 2008 R2, you can do the following:
As another example, assume that you are logged on as a typical domain user to a workstation in the domain, but you needed to run several tools using a more privileged account. You could do the following:
Note: Instead of opening two different Command Prompt windows, you could run the following command from the Run dialog box cmd /k runas /user:<domain\username> cmd. For example, to open a Command Prompt as cgreen from the domain cpandl.com, you could run the following command: cmd /k runas /user:cpandl\cgreen cmd. The snap-ins only exist when the specific role, administrative tool, or Remote Server Administration Tools (RSAT) have first been installed. If you try to run snap-in that is not installed, you will see a "cannot find" error message appear.
From here a new Command Prompt window opens with the credentials of the user account provided and you are prompted to type the password for the account. Once you enter the password for the account, you can run commands and launch additional tools from that Command Prompt window that will run using the credentials that you used to launch the window. For example, to run the Registry Editor, you could type regedit and press ENTER. To make use of the Command Prompt window to open graphical tools and snap-ins, you must know the name of the tools or their respective snap-ins. The following list provides the tool’s full name followed by the name to type from the Command Prompt to launch the tool:
Carsten Siemens edited Revision 14. Comment: Added tags: has comment
Ed Price - MSFT edited Revision 11. Comment: Title casing. Adding tags.
Kurt L Hudson edited Revision 8. Comment: Mentioned that you need the role installed in order to get the update.
Kurt L Hudson edited Revision 7. Comment: Added certification authority and certificate templates snap-in names
Ed Price MSFT edited Revision 3. Comment: Title casing.
Kurt Hudson MSFT edited Revision 2. Comment: updated steps to more accurately reflect the process
Kurt Hudson MSFT edited Revision 1. Comment: title update
Kurt Hudson MSFT edited Original. Comment: updated to cover the typical right-click the Command Prompt and Run as administrator scenario.
Interesting, but the real issue is running explorer.exe.
The old iexplore.exe hack no longewr works in Win 7.
--------------
I think you have them confused. To run Windows Explorer, you can type Explorer. To run Internet Explorer, you type iexplore. If you are at a Command Prompt, or even a Windows PowerShell prompt, you type Start iexplore and you are there.