Run Outlook.exe on Remote System (as user currently logged into remote system)

How do I run Outlook.exe on a remote system as the user currently logged into that system?  (without entering their password)

0 Comments   [ + ] Show comments

Answers (3)

Posted by: JordanNolan 8 years ago
10th Degree Black Belt

You should be able to run one of the Online kScript commands to fire up Outlook.  Have it set to run as the currently logged on user.  That will start Outlook for them in their session.



  • Sorry, I'm not familiar with kScript or how that would work. Can you please elaborate or provide a link to some documentation? Thanks for your help. - blashmet 8 years ago
Posted by: anonymous_9363 8 years ago
Red Belt
Use PSExec. While you're there, you may as well download the entire SysInternals suite. There are so many usefukl tools therein, not the least of which are PSexec and ProcMon.

  • Yes, psexec was my first option. However, I haven't been able to get it to run Outlook as the currently logged in user (without entering their password).

    I can get it to run as any user if I know their password, but the tricky part is that I don't know it.

    I found a utility called RunAsCurrentUser.exe, which led me to believe something like this was possible (however, that utility doesn't work). - blashmet 8 years ago
Posted by: EdT 8 years ago
Red Belt
Are you using KACE for deployment?  Kscript is used in KACE so if you don't have KACE the above posting is not relevant, and if you are, you could of course read the documentation.

  • Not using KACE. Just trying to start the process on the remote system as the currently logged on user. - blashmet 8 years ago
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ