How to Enable the Hidden Built-in Administrator Account in Windows 10/11

Windows 10 includes a hidden built-in Administrator account that has elevated privileges, which can be useful for troubleshooting, performing administrative tasks, or gaining access to areas of the system that are otherwise restricted. By default, this account is disabled to protect the system from unauthorized changes. However, you can enable it when necessary. This guide explains how to enable and use the hidden built-in Administrator account in Windows 10.

Understanding the Built-in Administrator Account

The built-in Administrator account is a special account with full system access, bypassing User Account Control (UAC) prompts that regular administrator accounts encounter. Unlike a standard administrator account, this built-in account has unrestricted access to the entire system, which is why it’s disabled by default to prevent misuse or accidental damage.

How to Enable the Hidden Built-in Administrator Account

Enabling the built-in Administrator account can be done through several methods: using Command Prompt, PowerShell, or Local Security Policy. Here’s how to enable it using these methods:

1. Enable Built-in Administrator Account Using Command Prompt

  1. Open Command Prompt as Administrator

    • Press Windows + X and select "Command Prompt (Admin)" or "Windows Terminal (Admin)."
    • If prompted by User Account Control (UAC), click "Yes" to proceed.
  2. Run the Command to Enable the Administrator Account

    • In the Command Prompt window, type the following command and press Enter:
      net user administrator /active:yes
  3. Log in with the Administrator Account

    • The built-in Administrator account is now enabled. Log out of your current session, and you will see the Administrator account listed on the login screen. You can log in without a password (by default).

2. Enable Built-in Administrator Account Using PowerShell

  1. Open PowerShell as Administrator

    • Press Windows + X and select "Windows PowerShell (Admin)" or "Windows Terminal (Admin)."
    • Confirm the UAC prompt if it appears.
  2. Execute the Command to Enable the Account

    • Enter the following command in the PowerShell window and press Enter:
      Enable-LocalUser -Name "Administrator"
  3. Log in with the Administrator Account

    • The built-in Administrator account is now active. Sign out of your current account and select "Administrator" on the login screen.

3. Enable Built-in Administrator Account Using Local Security Policy

This method is available only in Windows 10 Professional, Enterprise, and Education editions.

  1. Open Local Security Policy

    • Press Windows + R to open the Run dialog, type secpol.msc, and press Enter.
  2. Navigate to Local Policies

    • In the Local Security Policy window, navigate to "Local Policies" and then select "Security Options."
  3. Find and Enable the Administrator Account

    • Scroll down to find the policy titled "Accounts: Administrator account status."
    • Double-click the policy and set it to "Enabled."
  4. Apply the Changes

    • Click "Apply" and then "OK" to save your changes.
  5. Log in with the Administrator Account

    • Sign out of your current user session. The Administrator account will now appear on the login screen.

Disabling the Built-in Administrator Account

For security reasons, it’s advisable to disable the built-in Administrator account after you’ve completed the necessary tasks.

1. Disable via Command Prompt

  • Open Command Prompt as Administrator.
  • Enter the following command to disable the account:
    net user administrator /active:no

2. Disable via PowerShell

  • Open PowerShell as Administrator.
  • Use this command to disable the account:
    Disable-LocalUser -Name "Administrator"

3. Disable via Local Security Policy

  • Open Local Security Policy.
  • Locate "Accounts: Administrator account status" and set it to "Disabled."

Security Considerations

While the built-in Administrator account can be helpful, it poses significant security risks if left enabled:

  • No UAC Prompts: The account bypasses UAC, meaning actions performed under this account are not subject to the usual security checks.
  • No Password by Default: By default, this account has no password, making it vulnerable to unauthorized access if not secured immediately after enabling.
  • Malware Target: Since the account has full system access, malware or malicious users can exploit it to compromise the entire system.

Conclusion

The hidden built-in Administrator account in Windows 10 can be a powerful tool for advanced users and IT professionals, allowing for unrestricted access to the system. However, it should be used with caution due to the associated security risks. Always disable the account after use and set a strong password if you plan to leave it enabled temporarily. By following the steps outlined above, you can safely enable and disable the built-in Administrator account as needed.