/
/

Hide Account Protection in Windows Security in Windows 10 and Windows 11

Hide Account Protection in Windows Security in Windows 10 and Windows 11 blog banner image

This tutorial demonstrates how to hide Account Protection in Windows 10 and Windows 11. This removes the Account Protection section from Windows Security, preventing users from seeing and altering the settings in it.

How to hide account protection for all users using the Local Group Policy Editor

The Local Group Policy Editor is only available in the Pro, Enterprise, and Education editions of Windows 10 and Windows 11 (you’ll need to use the Registry Editor method detailed below if you’re running Windows 10/11 Home). Before you begin, you should back up your Local Group Policy in case you need to restore it later.

You will need to be logged in as an administrator to use the Local Group Policy Editor. The steps below will work unmodified on both Windows 10 and Windows 11:

  • Right-click on the Start button and select Run
  • Enter the command gpedit.msc and click OK to open the Local Group Policy Editor
  • Go to Computer Configuration\Administrative Templates\Windows components\Windows Security\Account protection
  • Double-click on the Hide the Account protection area setting to edit it
  • Change the setting to Enabled to hide the Account Protection area for all users, or Not configured to show it (this is the default)
  • Click OK to apply the change and close the Local Group Policy Editor

Hide the account protection are dialog box
You may need to re-open Windows Security to see the change applied.

How to hide Account Protection for all users using the Windows Registry Editor

The Registry Editor can be used to hide the Account Protection of Windows Security in all versions of Windows 10 and Windows 11 (including Home editions). Before you start, you should back up the Windows Registry, so any changes can be reverted if you make a mistake.

  • Right-click the Start button and click Run
  • Type regedit.exe and then press the Enter key to open the Windows Registry Editor
  • Navigate to the registry key Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Account protection
  • If the Account protection sub-key doesn’t exist at this location, highlight the Windows Defender Security Center key and then select Edit > New > Key from the menu bar and rename the new key Account protection
  • With the Account protection key highlighted, select Edit > New > DWORD (32-bit) Value and name it UILockdown
  • Double-click on the UILockdown and set its value to 1 to hide the Account Protection area for all users
  • Delete the UILockdown value to restore access to the Account Protection area (the default behavior)

Edit DWORD (32-bit) Value dialog box

You will need to restart your Windows PC to apply this change.

What is Account Protection in Windows Security?

The Account Protection area of Windows Security allows users to change several settings, including their Microsoft Account, Windows Hello, and Dynamic Lock.

Windows Security can be opened from the Start menu (either under ‘W’ in the list of apps, or by searching for it).

Account protection dialog box
Other settings that can be configured via Windows Security are Virus & threat protectionApp & browser controlDevice securityFirewall & network protection, and Device performance & health. You can also view Protection history and manage parental controls through Family options.

Why disable the Account Protection area in Windows 10 and Windows 11?

When hidden using one of the above methods, the Account Protection area cannot be accessed from Windows Security at all.

Before hiding Account Protection in Windows Settings:

Security at a glance dialog box

After hiding Account Protection in Windows Settings:

Security at a glance dialog box

Disabling access to this area may be done for a number of reasons: in home environments, it can prevent novice users from accidentally making changes to their account that could lock them out of their Windows devices. In business scenarios, it may be preferable to limit what security settings users can change, either to prevent accidental changes or to prevent security features from being disabled (for example, disabling dynamic lock).

Note that disabling access to the Account Protection area in Windows Security is not a security feature itself: it does not prevent these settings from being altered through other areas of the settings app, and does not disable the features that are configurable through it. If you want to enforce individual security settings consistently in an enterprise scenario, you should use Group Policy in Active Directory.

Disabling access to Account Protection does not hide related notifications, which must be disabled by navigating to Settings > Notifications within Windows Security and toggling Get account protection notifications to off.

Remotely deploying Windows security settings

Mobile device management (MDM) by NinjaOne builds on the built-in Windows management features, allowing you to deploy policies to both domain-connected workstations and mobile devices. This can be used for hiding access to Account Protection in Windows Security, and enforcing user account and security policies.

Using NinjaOne MDM and its single view into your IT infrastructure, you can ensure the integrity and ongoing security of your IT infrastructure. It lets you deploy and enforce a consistent configuration, and monitor all of your employees’ devices (including Windows 10/11, Apple, Android, and Linux devices) for suspicious activity, whether they are on-site or working rem

You might also like

Ready to simplify the hardest parts of IT?
×

See NinjaOne in action!

By submitting this form, I accept NinjaOne's privacy policy.

NinjaOne Terms & Conditions

By clicking the “I Accept” button below, you indicate your acceptance of the following legal terms as well as our Terms of Use:

  • Ownership Rights: NinjaOne owns and will continue to own all right, title, and interest in and to the script (including the copyright). NinjaOne is giving you a limited license to use the script in accordance with these legal terms.
  • Use Limitation: You may only use the script for your legitimate personal or internal business purposes, and you may not share the script with another party.
  • Republication Prohibition: Under no circumstances are you permitted to re-publish the script in any script library belonging to or under the control of any other software provider.
  • Warranty Disclaimer: The script is provided “as is” and “as available”, without warranty of any kind. NinjaOne makes no promise or guarantee that the script will be free from defects or that it will meet your specific needs or expectations.
  • Assumption of Risk: Your use of the script is at your own risk. You acknowledge that there are certain inherent risks in using the script, and you understand and assume each of those risks.
  • Waiver and Release: You will not hold NinjaOne responsible for any adverse or unintended consequences resulting from your use of the script, and you waive any legal or equitable rights or remedies you may have against NinjaOne relating to your use of the script.
  • EULA: If you are a NinjaOne customer, your use of the script is subject to the End User License Agreement applicable to you (EULA).