Deleting folders is a simple task that even a novice user can handle. However, when deleting some files and folders, the system may issue a warning that permission must be requested from Trustedinstaller or an administrator to perform this operation. This is due to the fact that some system folders are protected by the administrator. Removing them is undesirable, as it can cause some applications and even the entire system to malfunction.

Problem Solving Method

Error: Ask permission from Trustedinstaller can occur not only when deleting a folder or file, but also when changing it. Therefore, the essence this method fixing the problem will come down to making the folder or file the owner of the computer user. To do this, you need to follow a few simple steps:

  • A new window will open. Go to the "Security" tab and click "Advanced".

  • The Advanced Security Settings window will appear. Here you should pay attention to the "Owner" tab. Because the folder is protected, it will be owned by "Administrator/User Group" or "TrustedInstaller". In this tab, click "Edit".

  • A window will appear. In it, click on the button "Other users or groups ...".

  • In the next window, click "Advanced".

  • Here you need to search for the account for which you want to grant owner rights. To do this, click "Search", select an account and click "OK".

  • So you get the rights to the folder. But now you also need to get editing rights. To do this, you need to return to the "Advanced Security Settings" window. There should be an item "Elements of extensions". We look at the position "Access" and set " Full access».
  • If there is no "Extension Items" button, you should go to the "Active Extensions" tab. Check the "Full access" box and click "OK".

  • We check the rights.

Important, in Windows 8 and above, some of the steps for granting access are different. Therefore, we recommend that you carefully watch what actions you perform.

To learn how to take ownership of a folder in Windows 10 and get full rights to it, see the video:

If you need to edit some files from the Windows directory, then you should definitely know what trustedinstaller is.

  • 1. Procedure for deactivating trustedinstaller

A traditional element of operating systems from Microsoft is layered system access to different accounts.

First of all, this implements the so-called "fool-proof" principle, which consists in limiting the capabilities of inexperienced users, whose actions can disrupt the normal operation of the system.

It can also become good element computer anti-virus protection, since the vast majority malware requires administrative rights to make changes to system files.

In addition to ranking the capabilities of accounts (administrator, user, guest), starting with seven, all versions of Windows have the trustedinstaller function.

It can be thought of as a separate superuser account, with powers that go beyond even administrator rights.

However, these features only apply to the most important system files.

Therefore, trustedinstaller, for example, does not allow you to delete the folder even from under the administrative account.

But it is quite possible to overcome this barrier, for which it is enough to change some access settings.

trustedinstaller deactivation procedure

In most cases, this remedy protects Windows folder, when you try to delete files from which, you will encounter this window:

In this case, repeatedly pressing the Repeat key will not give any results and this window will appear again and again.

This protection method is installed for a reason, and deleting or modifying trustedinstaller-related files may cause serious system malfunction.

However, sometimes you may need to edit these files in order to figure out, for example, what is so CPU-intensive, for which you can use the following algorithm:

  • Select the desired file and right-click on it, and in the opened context menu select Properties.

  • In the window that opens, switch to the Security tab, and then click on the Advanced button.

  • The menu that appears has a wide range of tools for editing file access conditions for various users.

We will not now understand the nuances of this case, but simply go to the necessary tab, where we press the Change button.

  • Now request this file for the Administrators user group. Why select in the area called Change owner to: select the item, what a surprise, Administrators and click OK.

  • If all the above operations were carried out correctly, then you should see the following system message (do not forget to click OK):

  • But this is not the end of the trustedinstaller deactivation procedure. Now we again need to go to Properties-Security, and then under the Groups or Users window, click on the Change button.

  • In this menu, select the Administrators group (it should be highlighted with a blue background), and in the Permission area for the Administrators group, in the Allow column, activate all checkboxes, namely Full access, Modification, Read and execute, Read and Write.

Now all users with administrative rights will also be able to delete and edit files under the protection of trustedinstaller.

Advice! After requesting permission from this function, it is highly recommended to return all settings to their original form, as unprotected system files can be easily damaged by viruses.

To restore the trustedinstaller.exe system protective process, you must perform almost the same steps as described above, only in reverse order:

  • The folder with the files is opened, and the actions Properties-Security-Administrators-Change are performed and we leave access only to the Read and Read and execute options

  • Then the actions from points 1-3 of the previous algorithm are completely repeated. And in the Advanced security settings window, go to the Other users and groups section.

  • In the Select "User" or "Group" menu, nothing should be changed, but you only need to enter the command NT SERVICE\TrustedInstaller in the Enter the names of the objects to select field.

In this way, we will re-create a user for the trustedinstaller.exe process for the file being edited.

  • It remains only to press the check name button, as a result of which the entered command will turn into the more familiar “TrustedInstaller” entry.

At the end of our article, it is worth noting that if a process called trustedinstaller loads the processor or does not allow you to delete a folder that is clearly not related to system ones, then most likely it is a virus masquerading as it.

You should also take into account such a nuance that trustedInstaller identifies system files by their names, which means that text file, say named taskmgr will also be protected by this feature.

Thematic video:

How to modify Windows 7 system files - TrustedInstaller

What is trustedinstaller: How to request permission in Windows

There is an opinion among Windows users that the administrator on the computer can perform any operations with files and folders, but this is not entirely true. In Windows, there are objects and processes that have higher-level privileges. These, in particular, include the built-in hidden Administrator, System, Local Service and some other owners. Their main task is to manage key features Windows and just one of these objects, known as TrustedInstaller, will be discussed today.

What is TrustedInstaller for?

TrustedInstaller, what is it and why does it not allow you to delete and edit files? This is an important installation service software modules, which is also part of the Windows security system. In the first case, it manifests itself as a process trustedinstaller.exe in the Task Manager, in the second - as the owner of system folders and files. In Windows 7/10, the service performs two main tasks:

  • Protects important objects systems from unauthorized modification, for example, by the user or viruses;
  • Installs downloaded Windows Update components.

How to unlock TrustedInstaller from files and folders

Often when you try to delete or change system files or directories, Windows users 7/10 get "Request permission from TrustedInstaller to modify this file" notification.

This means that the owner of the object is a process that has higher rights than the administrator. You cannot remove it from under a running system, but you can change the access rights, thereby removing the lock.

You can do this with special utilities, for example, TakeOwnershipEx or manually in the properties of the object. Let's consider the second option. For example, let's remove the lock from the executable file of the registry editor regedit.exe. Right-click on the file, select "Properties".

Switch to the "Security" tab in the window that opens and click the "Advanced" button at the bottom.

This will open a new security settings window. If you look at the top of it, you will see that the TrustedInstaller is the current owner of the file. We take away access rights from him and transfer them to the user. Click on the "Change" link.

Enter your username in the name of the objects to select field and click Check Names.

In the event that the name was entered correctly, the computer name will be added to it, and the line itself will become underlined.

After that, in the advanced options window, click "Apply" -\u003e "OK".

Returning to the properties window, this time click the Edit button.

Select with the mouse the user or administrator to whom you want to transfer rights to manage the file, check all possible items in the "Allow" column and save the result by confirming the change request.

Now the rights to the file belong to you, and you can do whatever you want with it. blocking TrustedInstaller folders is removed in the same way, with the only difference that in order to change the access rights to nested files and directories in the window of additional security settings, you need to check the box "Replace the owner of subcontainers and objects".

And now attention. Transferring access rights to a user reduces the level of system protection, therefore, after working with a file or folder, it is desirable to restore the rights. The rights are restored in the same way as they were transferred, only in the field of the names of the selected objects, instead of the user name, you must enter the string NT Service/TrustedInstaller.


What to do if trustedinstaller.exe is consuming the processor

We figured out how to disable TrustedInstaller when working with locked files and directories, now let's look at one more nuance. From time to time, the service starts to become excessively active, loading the processor so much that the system begins to slow down. This is normal if the increased load is observed for a relatively short time. It is caused by the fact that, being responsible for installing program modules, the service periodically scans the computer for updates, thereby creating an additional load on the processor.

If TrustedInstaller loads the processor during the execution of user-priority tasks, it can be temporarily disabled. To do this, open the Task Manager, switch to the "Services" tab, find TrustedInstaller in the list, right-click on it and select the "Stop" option from the menu. Then, by clicking on the "Open Services" link, launch the Services Management snap-in.

Find "Windows Update", double-click to open its properties and click the "Stop" button in the window that opens.

You will also need to stop the Background Intelligent Transfer Service (BITS) service. These actions will allow you to free up the memory occupied by TrustedInstaller and reduce the load on the CPU and disk at the moment. Please note, however, that when you restart your computer, the Windows Update service will be restarted and it is possible that if TrustedInstaller becomes active again at the wrong time, you will have to stop it again.

Whether you like it or not, there are situations when the Windows 7 (and higher) operating system tries to use the so-called Trustedinstaller. What is this component in Windows systems, now let's see.

Standard translation

Trusted in translation from English or American means "confidential". But this occurs and not many users know in the form, because the fact is that in the installation process the distribution file itself third party program may ask for permission to install. Hence the problems.

It seems that Trust is translated as "trust", and installer - as "installer", however, sometimes the installer is exposed to viruses and malicious codes. And, by the way, the application itself is capable of making requests at its own level, considering them to be active virus codes.

Application history

The Trustedinstaller protection service was first used in Windows system 7. She was responsible for the ability to edit system files and system settings.

In fact, any user encounters the message "Request permission from Trustedinstaller" only in one case - when trying to edit the system configuration without administrator access rights.

What is it really?

The saddest thing is that the "seven" provides for the existence of two administrators. What local user or the owner of the PC has administrator privileges, still does not mean anything (even if you have a Microsoft account).

As it turns out, the entry of the so-called "Super Administrator" is activated in the system by default. Have you noticed that some processes have to be run as admin using the right-click menu?

Why this was needed is probably understandable: the developers thus tried to protect the system, however, leaving the user the ability to edit access rights.

Trustedinstaller: how to remove or disable this component?

To disable this service, you can use the standard system configurator, which is accessed in the "Control Panel". But there it is not the program section that is selected, but the component menu.

If we take into account that the Trustedinstaller.exe executable file is located in the system folder belonging to the operating system, any attempts to remove it will be nullified. The system simply won't allow it.

Let's see what needs to be done to remove the Trustedinstaller component. Windows 7 in this regard is a fairly "pragmatic" system, despite its capabilities.

The use of superadmin rights has simply repulsed many users. Indeed, for some reason, even the launch of an installer of any program in the system raises doubts, although in fact the program may have SSL certificate, and digitally signed.

In this regard, the Trustedinstaller Windows 7 module clearly loses. The main problem is that the system itself requires account confirmation, although, according to the employees of the corporation, this is not necessary (this is a generally accepted rule for the tenth version).

App Unlocker

In addition, if anyone noticed, in Windows 7 in the context menu there is a special Unlocker service that allows you to unlock system processes. But it is present only in limited modifications of the system itself.

In addition, according to Microsoft experts themselves, this utility is not official in the main release. That is why it is worth thinking about the question of its presence in the G7. In principle, understanding the topic “Trustedinstaller: what is it?”, You can put an end to it, if not for one but.

Naturally, you can install a third-party unlocker component. The price of the issue is the security of the system as a whole. If the user is tired of receiving messages like "Request permission from Trustedinstaller" to change the system configuration or a certain file, when unlocking the main functions and features, you can encounter a lot of things that can harm the system. In particular, this applies incorrect settings paging file size, backup free space to save copies of the system and hard drive etc.

Direct deactivation is performed by deactivation windows services resource protection. For example, for the system library termsrv.dll, you need to right-click on the file, and then use the properties and security menu. Next, the most important thing: in the new window, instead of the “principal” of Trustinstaller, select administrators and apply the changes. Next, in the Administrators group, simply check the boxes next to all existing permissions, and then click the "OK" button.

Outcome

Instead of an afterword, it is worth looking at the Trustinstaller module from the other side. What it is, I think, is already clear. It is better to turn it off in the "seven" (activation will not lead to anything good).

In this case, the issues of deactivating the superadmin account were not considered. This is a separate topic that has a solution in terms of using system registry keys. But understanding the operation of the service itself must exist.

If you give advice on installing the seventh Windows versions, to clarify: never use repacks or unofficial distributions! They may contain not only viruses, but also modified components of the system itself, which can lead to the complete inoperability of a laptop or a stationary computer terminal.

Then no optimizer program will help. By the way, it was in Windows 7 that this problem arose initially. By installing the "top ten" and disabling the corresponding service, you can get rid of it. Even autoplay editing will do command line msconfig in the Start menu (Win + R), if it is listed.

For the rest, it remains to be said that installing a "left" version of Windows can only lead to the fact that even "iron" components will fly, so it's better not to risk it.

And another look at Trustedinstaller. What it is is already clear, but if the request for confirmation of the operation being performed is still present, you need to deactivate the Superadmin account in or in system registry, and in such a way that the parameter permanent launch programs and applications on behalf of the administrator. But be prepared for the fact that if you disable this entry, the system may require a password after rebooting and re-logging in. If you do not remember it, it is better not to risk it and leave everything as it is.

Otherwise, it will not even be possible to log into the system under your account or when entering a valid password. Unfortunately, such cases have already taken place. Microsoft specialists prefer not to comment on such situations even in the case of official appeals. And the seventh version of Windows turns out to be pirated for many of our users.

With the release of the seventh version of Windows, absolutely all users encountered a problem when the system does not allow editing, viewing or performing other actions with certain files and folders, saying that this requires permission from TrustedInstaller Windows 7. What is this service, how to disable it and manipulate protected files, see below. So let's get started.

TrustedInstaller Windows 7 - what is it?

The component itself first appeared in Windows 7, after which it migrated to both the eighth and tenth modifications, so the proposed solutions can equally be applied to them. But first, let's focus on the service itself, shall we? In the simplest sense, TrustedInstaller is a kind of virtual user that “takes away” the rights from ordinary users and administrators to unauthorized intervention in the structure of system files, preventing accidental or intentional changes that affect the stability of the OS.

The service operates on the basis of WRP (Windows Resource Protection) technology, which protects system directories, DACLs and ACL folders, registry keys and related files from being changed even at the level of having administrator rights.

That is why when you try to access and a warning appears that the file or directory is protected, it is easy to understand if you turn to security policies. Roughly speaking, this is a component of self-defense operating system, which is a preventive means of keeping up when an intervention is attempted. However, despite all the restrictions, it is quite easy to bypass such a blocking. More on that later.

Why is the service consuming too many system resources?

Many users complain that the TrustedInstaller service is extremely CPU intensive, making it difficult for user processes to run.

Yes, indeed, the load on system resources for the active TrustedInstaller process can be observed. As a rule, these are two situations: windows update and viral infection.

If the user in the "Task Manager" sees that TrustedInstaller is loading the processor too much, first you should try to complete this process, and then perform a deep system scan for viruses, malicious codes and any other threats. To do this, it is best to use not an anti-virus package installed on the system, but independent portable utilities like Dr. Web Cure It! or Virus Removal Tool of Kaspersky Lab.

The best solution would be to check with disk utilities Rescue Disk that have their own GUI, and the verification module is loaded even before the operating system starts.

In the second case, in order to avoid increased load on system resources, you can simply disable the automatic system update in the Update Center. Whether it makes sense is up to you.

Component location

Now let's look at myself software component TrustedInstaller. Where is this service located? Standard location - system folder Windows, which has a servicing directory.

The TrustedInstaller.exe file located there is the executable component of the service. Often, it will not work to start it manually, change it, or perform any other actions with it. It has protection against deletion and substitution.

TrustedInstaller: how to disable a service?

Now directly about disabling this component. We assume that the user understands all the consequences of deactivating the TrustedInstaller service. How to turn it off? The whole process comes down to getting absolutely all the rights available in the system to change files and folders.

So by choosing desired file, right-click to call and go to the property bar, where in a new window on the security tab, click the "Advanced" button.

In the next window, use Extra options and go to the owner tab, where we use the change from TrustedInstaller to the administrator group. Confirm the changes by pressing the "OK" button. Do the same for the popup message.

This is only half the battle deactivate TrustedInstaller. How to disable the service for a specific file completely will be clear in the next step. To do this, return to the properties window and on the security tab, select the administrator group, click the "Edit" button.

In the permissions box, tick all the items on the list and confirm the changes. All necessary rights have been obtained. Accordingly, after that the file can be deleted, moved, copied or even changed its contents.

How expedient is a shutdown?

Finally, another important point related to the TrustedInstaller Windows 7 service. What it is, it is already clear how to deactivate the component, too. Naturally, a natural question arises: is it worth it?

By and large, it makes no sense for a user who never accesses system files to engage in such procedures. At best, you can only disable automatic update system so that TrustedInstaller does not load resources.

But when a specific software, which needs to be given access to change system files and configuration, this is where the understanding of the specifics of the TrustedInstaller Windows 7 module comes in. What is it? A permissive system, without obtaining rights from which the program simply will not work.

Instead of total

Finally, it can be noted that the TrustedInstaller component itself usually does not block user files or applications. Its main purpose is to protect system components. So there is not much point in deactivating the process. However, the load on the system is also short-term (only for the period of installing system update packages). In most cases, this will take a maximum of 5-10 minutes depending on the configuration and speed of your internet connection. So you can be patient.

As for the permissions for the installed software, you need to be extremely careful and know for sure that granting rights to perform any actions with system files won't do any harm. Among other things, viruses that infect this particular component very often disguise themselves as the original service and even have the same name with it in the process tree displayed in the Task Manager. But it is quite elementary to determine the viral process by the absence of a description or signature of the publisher, especially if there are several of them. But this is a rarity. If you have a sufficiently powerful anti-virus software at the entrance, you can not be afraid of infection. And the component itself has a fairly strong protection.