Bobcares

Enable Built-in Administrator Account on Windows 10

by | Apr 1, 2021

Wondering how to Enable Built-in Administrator Account? We can help you.

Windows 10 installation creates a user account and grants local administrator privileges to this account.

However, it creates another built-in (hidden) administrator account, which is disabled for security reasons.

As part of our Server Management Services, we assist our customers with several Windows queries.

Today, let us see the built-in Windows 10 Administrator account, its use, how to enable or disable it and reset the password.

 

Built-in Administrator Account on Windows

We saw that the creation of an Administrator account happens automatically during Windows installation.

This is to initialize the operating system. However, it is then disabled and the user has to create their own account.

The built-in administrator account has full unlimited privileges on a computer.

We can enable UAC using the Group Policy option User Account Control: Admin Approval Mode for the Built-in Administrator account.

The built-in Administrator is disabled by default in Windows 10 and Windows Server 2016.

We cannot remove or exclude these accounts from the Administrators group. However, a boot in Safe or Recovery Mode can enable the administrator account.

For security reasons, our Support Techs recommend renaming the built-in administrator account.

This can be done manually, using LAPS or the GPO parameter Accounts: Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Security Options.

Make sure to only enable the “Administrator” account if absolutely necessary to perform a specific task or troubleshoot.

 

How to Enable the Built-in Administrator Account on Windows 10

The quickest and easiest way to activate the administrator account is from the command prompt with advanced privileges.

To do this, we run:

net user administrator /active:yes
The command completed successfully.

Also, we can use the PowerShell cmdlet to manage local accounts:

Get-LocalUser -Name “Administrator” | Enable-LocalUser

If our computer has a domain password complexity policy, we may see the following message when we try to enable the administrator account:

The password does not meet the password policy requirements. Check the minimum password length, password complexity, and password history requirements.

In this case, before enabling the administrator account, we need to set a password for it:

net user administrator *

If we again come across “The user name could not be found”, most likely there was a renaming of the administrator account on the computer.

We can find it by its known SID. Use the command:

wmic useraccount where “SID like ‘S-1-5-%-500′” get name

In this case, the name is admin. To enable it, run:

net user admin /active:yes
In order to list all local accounts:
net user

If we get a “System error 5 has occurred. Access is denied” when we try to enable the built-in Windows administrator, make sure that the cmd.exe or powershell.exe console is running as an administrator.

In addition, check that the account is a member of the local Administrators group.

net user administrator /active:yes ACCESS IS DENIED

Then to list the groups our account is a member of:

whoami /all

We can display a list of users in the local administrator’s group in Windows using:

net localgroup administrators

This method to activate the built-in administrator account works in all Windows 10 editions.

However, the below methods are not applicable to Home editions of Windows 10.

  1. Enter lusrmgr.msc in the search bar or in the command prompt to open the MMC snap-in Local Users and Groups.
  2. In the console window, expand the Users section.
  3. Find the account named Administrator and double-click it, then uncheck Account is Disabled.
  4. Eventually, save the changes.

We can enable the built-in administrator account through the local GPO.

  1. Open the Local Group Policy Editor gpedit.msc (or secpol.msc).
  2. Go to Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options.
  3. Find Accounts: Administrator account status policy and set it to Enable.
  4. Then update the Group Policy settings with the command: gpupdate /force or just reboot the computer.

Once done, it will display on the Windows logon screen.

To disable the built-in administrator account, use the command:

net user administrator /active:no

 

Lost Administrator Privileges (Password) on Windows 10

We might accidentally disable our user account with administrator privileges or remove the account from the local admin group.

Moving ahead, let’s see how to enable the built-in Administrator or add our account to the local Administrators group.

On a domain computer, we can manage the list of users with administrator permissions using a GPO.

We need to boot our computer from a LiveCD or a Windows 10 install media. The easiest way to create a bootable USB stick with a Windows 10 install image is using the Media Creation Tool.

A command prompt will open when we hit Shift + F10 on the Windows Setup screen.

Here we need to determine which drive our Windows is installed on. Run diskpart and enter list vol.

For instance, suppose it is on the C: drive. Type exit to close the diskpart session.

Run the following commands to create a copy of utilman.exe and replace it with the executable cmd.exe:

copy c:\windows\System32\utilman.exe c:\
copy c:\windows\System32\cmd.exe c:\windows\System32\utilman.exe

Then reboot the computer:

wpeutil reboot

Boot Windows normally. On the Windows login screen, press the Win + U keys combination.

A command prompt window will open. To add our account, enable the built-in Windows administrator and reset its password, run the commands:

net localgroup administrators user1 /add
net user Administrator /active:yes
net user administrator *

Now we can log in to Windows under the built-in Administrator or our user account, which has the local administrator permissions.

Make sure to replace the original utilman.exe file. Boot from the install media again and run the command:

copy c:\utilman.exe c:\windows\System32\utilman.exe

[Need help with the procedures? We’d be happy to assist]

 

Conclusion

In short, an easy way to activate the administrator account is from the command prompt with advanced privileges.

PREVENT YOUR SERVER FROM CRASHING!

Never again lose customers to poor server speed! Let us help you.

Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.

GET STARTED

var google_conversion_label = "owonCMyG5nEQ0aD71QM";

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Never again lose customers to poor
server speed! Let us help you.

Privacy Preference Center

Necessary

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

PHPSESSID - Preserves user session state across page requests.

gdpr[consent_types] - Used to store user consents.

gdpr[allowed_cookies] - Used to store user allowed cookies.

PHPSESSID, gdpr[consent_types], gdpr[allowed_cookies]
PHPSESSID
WHMCSpKDlPzh2chML

Statistics

Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

_ga - Preserves user session state across page requests.

_gat - Used by Google Analytics to throttle request rate

_gid - Registers a unique ID that is used to generate statistical data on how you use the website.

smartlookCookie - Used to collect user device and location information of the site visitors to improve the websites User Experience.

_ga, _gat, _gid
_ga, _gat, _gid
smartlookCookie
_clck, _clsk, CLID, ANONCHK, MR, MUID, SM

Marketing

Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

IDE - Used by Google DoubleClick to register and report the website user's actions after viewing or clicking one of the advertiser's ads with the purpose of measuring the efficacy of an ad and to present targeted ads to the user.

test_cookie - Used to check if the user's browser supports cookies.

1P_JAR - Google cookie. These cookies are used to collect website statistics and track conversion rates.

NID - Registers a unique ID that identifies a returning user's device. The ID is used for serving ads that are most relevant to the user.

DV - Google ad personalisation

_reb2bgeo - The visitor's geographical location

_reb2bloaded - Whether or not the script loaded for the visitor

_reb2bref - The referring URL for the visit

_reb2bsessionID - The visitor's RB2B session ID

_reb2buid - The visitor's RB2B user ID

IDE, test_cookie, 1P_JAR, NID, DV, NID
IDE, test_cookie
1P_JAR, NID, DV
NID
hblid
_reb2bgeo, _reb2bloaded, _reb2bref, _reb2bsessionID, _reb2buid

Security

These are essential site cookies, used by the google reCAPTCHA. These cookies use an unique identifier to verify if a visitor is human or a bot.

SID, APISID, HSID, NID, PREF
SID, APISID, HSID, NID, PREF