Created
February 21, 2017 10:29
-
-
Save aleksandrzak-rafal/5a8a202e6f93a7ffaf7e10ba15962362 to your computer and use it in GitHub Desktop.
Code to get elevated command prompt for script execution
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Get the ID and security principal of the current user account | |
| $myWindowsID=[System.Security.Principal.WindowsIdentity]::GetCurrent() | |
| $myWindowsPrincipal=new-object System.Security.Principal.WindowsPrincipal($myWindowsID) | |
| # Get the security principal for the Administrator role | |
| $adminRole=[System.Security.Principal.WindowsBuiltInRole]::Administrator | |
| # Check to see if we are currently running "as Administrator" | |
| if ($myWindowsPrincipal.IsInRole($adminRole)) | |
| { | |
| # We are running "as Administrator" - so change the title and background color to indicate this | |
| $Host.UI.RawUI.WindowTitle = $myInvocation.MyCommand.Definition + "(Elevated)" | |
| $Host.UI.RawUI.BackgroundColor = "DarkBlue" | |
| clear-host | |
| } | |
| else | |
| { | |
| # We are not running "as Administrator" - so relaunch as administrator | |
| # Create a new process object that starts PowerShell | |
| $newProcess = new-object System.Diagnostics.ProcessStartInfo "PowerShell"; | |
| # Specify the current script path and name as a parameter | |
| $newProcess.Arguments = $myInvocation.MyCommand.Definition; | |
| # Indicate that the process should be elevated | |
| $newProcess.Verb = "runas"; | |
| # Start the new process | |
| [System.Diagnostics.Process]::Start($newProcess); | |
| # Exit from the current, unelevated, process | |
| exit | |
| } |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment