I can dig that it works and that you're happy with it.

But I can also dig that desipite the apparent effectiveness, this
solution involves introducing an un-vouched, un-documented, and
un-maintained black box executable to twiddle around with a computers
most private parts in an elevated and vulnerable state.

I'd feel better about it if MS actually took ownership of it and moved
it out of "beta" or at least codesigned it.

The customer executes and elevates your setup that's signed with your
company name. So the one that they're basically trusting with their
security is you.

The water is fine until it isn't.<g>

Jeff Slarve
www.jssoftware.com

you know what happens when you assuage