/
/

How to Enable or Disable Built-in Administrator Account in Windows 11

How to Enable or Disable Built-in Administrator Account in Windows 11 blog banner image

A built-in administrator account is a hidden feature included in Windows 11. By default, it serves as the local system administrator with elevated rights, bypassing User Account Control (UAC) prompts. While this can be useful in some instances, it allows access to sensitive areas of the system, which can open up security vulnerabilities. That’s why the feature is disabled by default.

Scenarios such as troubleshooting, advanced configurations, or regaining access when other administrator accounts are unavailable may warrant enabling the built-in admin account. Meanwhile, some prefer to disable this feature to preserve system security. But whichever setting you choose, knowing how to enable or disable built-in Administrator account in Windows 11 gives you greater control over your system’s security and functionality.

In this article, we will guide you through configuring built-in administrator accounts in Windows 11. But before proceeding, it’s important to understand the key points:

  • Elevated privileges: The built-in admin account grants full access to system files, settings, and all user data.
  • Security risks: If not properly secured, it can become a significant target for malware or unauthorized access.
  • Use cases: It’s best suited for tasks like system maintenance, deep troubleshooting, or account recovery.

Prerequisites

Here are some requirements your system needs to meet first before continuing:

  • Administrative access: You’ll need admin rights on the current user account to make these changes.
  • Backup your system: Before modifying account settings, it’s a good idea to create a restore point or full system backup.
  • Windows edition: Some methods are only available on Windows 11 Pro, Enterprise, or Education editions.

Method 1: Using Command Prompt

This method is applicable across all Windows 11 editions.

  1. Press the Windows key + X and select Windows Terminal (Admin).
  2. To configure the built-in administrator account:
    • Type net user Administrator /active:yes to enable the account.
    • Type net user Administrator /active:no to disable the account.
  3. Hit Enter.
  4. Once enabled, the built-in admin account will appear on the login screen.

⚠️ Important: If your system uses a different language, replace “Administrator” with the localized account name.

Method 2: Using PowerShell

This method is also applicable across all Windows 11 editions.

  1. Press the Windows key and type PowerShell.
  2. From the search results, right-click PowerShell and choose Run as administrator from the context menu.
  3. To configure the built-in administrator account:
    • Type Enable-LocalUser -Name “Administrator” to enable the account.
    • Type Disable-LocalUser -Name “Administrator” to disable the account.
  4. Hit Enter.

⚠️ Important: Be sure to run PowerShell with administrative privileges to execute these commands successfully.

Method 3: Using Local Users and Groups

This method only applies to Windows 11 Pro, Enterprise, and Education editions.

  1. To open the Local Users and Groups management console, press Windows key + R, type lusrmgr.msc, and hit Enter.
  2. In the left pane, select Users.
  3. Double-click Administrator from the list of accounts.
  4. To enable the account, uncheck the box labeled Account is disabled.
  5. To disable it, check that box.
  6. Click Apply, then OK.
  7. The changes take effect immediately.

Method 4: Using Windows Recovery Environment (WinRE)

⚠️ Important: Editing the registry carries risk. Be sure you understand the changes you’re making, and always have a backup available.

If you cannot log into any user account, you can enable the built-in admin account through the Windows Recovery Environment.

  1. Restart your PC while holding the Shift key and select Restart from the Start menu.
  2. Navigate to Troubleshoot > Advanced options > Command Prompt
  3. In Command Prompt, type regedit to open the Registry Editor.
  4. In the Registry Editor, select HKEY_LOCAL_MACHINE and click File > Load Hive.
  5. Browse to C:\Windows\System32\Config\SAM
  6. Load the SAM file and name it TEMPHIVE.
  7. Navigate to:
    HKEY_LOCAL_MACHINE\TEMPHIVE\SAM\Domains\Accounts\Users\000001F4
  8. Double-click on the F binary value.
  9. Locate the value at offset 0x38 and change it from 11 to 10 to enable the account.
  10. Unload the hive from the File menu and restart your system.

Additional considerations

Enabling the built-in administrator account can be a valuable practice for some situations. However, users need to manage this feature carefully by considering the following factors:

  • Security risks: The built-in Administrator account has elevated privileges and is not subject to UAC prompts, making it a target for malicious activities.
  • Password protection: This account does not have a password by default. It’s crucial to set a strong password if you plan to enable it.
  • Usage recommendations: Enable the built-in Administrator account only when necessary and disable it afterward to maintain system security.

Configuring the built-in administrator account

Managing the built-in Administrator account in Windows 11 plays a critical role in both system administration and security. Multiple methods are available, ranging from Command Prompt and PowerShell to advanced tools like Local Security Policy, so administrators can choose the approach that best fits their Windows edition and situation.

While enabling the account can be useful for troubleshooting and maintenance, it should always be protected with a strong password and disabled when not actively in use to reduce potential security risks. This feature plays a vital role in system security. It must be managed carefully when enabled to prevent opening your system up to critical vulnerabilities.

You might also like

Ready to simplify the hardest parts of IT?
×

See NinjaOne in action!

By submitting this form, I accept NinjaOne's privacy policy.

NinjaOne Terms & Conditions

By clicking the “I Accept” button below, you indicate your acceptance of the following legal terms as well as our Terms of Use:

  • Ownership Rights: NinjaOne owns and will continue to own all right, title, and interest in and to the script (including the copyright). NinjaOne is giving you a limited license to use the script in accordance with these legal terms.
  • Use Limitation: You may only use the script for your legitimate personal or internal business purposes, and you may not share the script with another party.
  • Republication Prohibition: Under no circumstances are you permitted to re-publish the script in any script library belonging to or under the control of any other software provider.
  • Warranty Disclaimer: The script is provided “as is” and “as available”, without warranty of any kind. NinjaOne makes no promise or guarantee that the script will be free from defects or that it will meet your specific needs or expectations.
  • Assumption of Risk: Your use of the script is at your own risk. You acknowledge that there are certain inherent risks in using the script, and you understand and assume each of those risks.
  • Waiver and Release: You will not hold NinjaOne responsible for any adverse or unintended consequences resulting from your use of the script, and you waive any legal or equitable rights or remedies you may have against NinjaOne relating to your use of the script.
  • EULA: If you are a NinjaOne customer, your use of the script is subject to the End User License Agreement applicable to you (EULA).