A client connecting to my Windows Terminal Server (2008 R2) somehow managed to activate the EOA button.
After reading a million forums - I finally decided to do the following:
Took ownership on the file: c:\windows\system32\utilman.exe
Renaming the file to utilman999.exe
Now the user don't have access to that file and it CAN'T be called up.
How annoying............
Let's do it the brutal way:
ReplyDeleteFor Windows Server 2008 R2, open the admin command prompt and run:
takeown /a /f %windir%\system32\sethc.exe
takeown /a /f %windir%\system32\utilman.exe
cacls %windir%\system32\sethc.exe /C /D Everyone
cacls %windir%\system32\utilman.exe /C /D Everyone
sethc.exe responsible for the sticky key dialog after hit shift 5 times.
utilman.exe responsible for the dialog after pressing ease of access button.