ComputersSoftware

Trustedinstaller - what is it? How to get permission from Trustedinstaller? How to delete Trustedinstaller files?

The release of the seventh version of Windows OS was marked for users by an extremely unpleasant event. Not only did the super administrator appear on the system, but there was also a new service related to security components called TrustedInstaller. What kind of program is this? Not all users understand it. We will fill this gap, considering solutions for fixing problems in Windows 7 and above.

TrustedInstaller: what is it?

It is believed that the developers of Microsoft's operating systems pay great attention to security. True, the main emphasis is not on protecting against virus threats (although such elements are also present), but on the impossibility of changing system files, which can lead to a violation of the OS's performance until its complete failure. The TrustedInstaller component is responsible for this. What is this in the broadest sense?

In simple terms, this blocking service is something like a virtual user with administrator rights (not to be confused with a super administrator), which, by virtue of the authority granted by the system, selects from the user the right to modify critical system elements (files, folders, keys System registry, etc.).

That is why when you try to perform any actions with such objects, you receive messages that they are protected and require the permission from TrustedInstaller to perform the operations. What it is in terms of security, it is easy to understand. The user must have certain rights, without which interference in the operation of the system is simply impossible. Nevertheless, it is possible to easily circumvent such restrictions.

Of course, it is not possible to delete the executable itself, which is located in the servicing directory of the Windows root folder, by virtue of the current policy and the installed protection: the file TrustedInstaller.exe is protected from renaming, copying, moving, deleting and spoofing. But here you can give yourself the necessary permissions to carry out the above operations.

How to get permission from TrustedInstaller on operations with folders and files?

Let us consider the general case. First, you need to select the object with which you want to perform some actions blocked by this service (assume that TrustedInstaller does not allow to delete the folder or file).

Right click on the object in the usual "Explorer" call the drop-down menu and go to the property line. In the new window, go to the security tab and use the "Advanced" button to change the settings.

After that, once again select additional options, where we need the "Owner" tab. By default, TrustedInstaller is specified in the corresponding field. We change the owner to the administrative group and confirm the changes made.

Now there is one more aspect related to the TrustedInstaller component. How can I delete system-type files or a normal object blocked by the service? To do this, you need to make additional settings. We return to the security section, but now select the administrator group and use the privilege change button.

In the Permission window that appears on the right, in the first column, place the "birds" on all the items in the list, and then confirm the changes with the "OK" button again. The rights are received, and with the selected object you can work without problems with either a regular file or a standard folder that does not have protection.

Note: this method involves choosing a rights change for only one particular object selected. Mass gaining the necessary privileges is not provided. By the way, exactly the same actions can be performed by the branches of the registry by calling the appropriate menus on each of those for whom it is supposed to set full access rights.

Possible problems with the consumption of system resources

Very often, users complain that the service, while running in the background, consumes too much system resources. In part, this can be due to two reasons: the consequences of a viral infection and active automatic updating of the system.

Although it is believed that the executable file of the TrustedInstaller service is very secure, some threats still find security holes. First, you should look at the processes in the "Task Manager" (there may be several of the same name). An active process without the signature of the publisher or developer, apparently, is the same virus, disguised as the original service.

We check the system for viruses

Clean the system best with the help of third-party portable applications, and not installed a regular anti-virus.

Ideally, it's best to use disk utilities that are collectively called Rescue Disk. Their own interface can be downloaded from an optical media or a conventional flash drive before the initial start of the operating system, and then perform a deep scan. Such programs can detect deep-seated threats, even those that are in the form of processes loaded into the main memory.

Disable system update

When the system is updated, the TrustedInstaller service is also activated, checking the installed components for originality.

If too much load is observed, automatic updating can be disabled. This is done in the corresponding section of the Control Panel. After that, the process will not be activated. However, it's worth noting that when you try to find available updates and integrate them into the system in the manual mode, the service will start again, no matter how the user tries to turn it off.

Should I disable the TrustedInstaller service?

At last one more important question, concerning expediency of disconnection of service TrustedInstaller. What is this in terms of security and what can the deactivation of the component lead to? Here everything is simple. The user with his inept actions can accidentally delete or change the system component, which is fraught with complete crash for the system. So disabling this component is not recommended.

The necessary deactivation of TrustedInstaller can be called only in a situation where specialized software is installed on the computer, which will not work without obtaining the rights to change the system components. But such programs are not so much, and the average user is unlikely to install them.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.delachieve.com. Theme powered by WordPress.