Enable/Disable built-in Administrator account using Intune

Windows computers have an Administrator account (SID S-1-5-domain-500, display name Administrator), the first account created during the Windows installation.

The Administrator account has full control of the files, directories, services, and other resources on the local device. The default Administrator account can’t be deleted or locked out but can be renamed or disabled. An Administrator account can’t be removed from the Administrators group.

The best practice is to use a non-administrator account to log on to the PC and elevate to an administrator account when required, e.g., installing applications or performing configuration tasks on your device. It’s best to avoid using a local administrator account to Sign in to the device.

However, if you are using Windows LAPS and managing a built-in Administrator account, It must be enabled before you can deploy the LAPS policy to the device.

This blog post will explore two methods for enabling the built-in local administrator account. The first approach involves using a Device Configuration Profile, and the alternative method is through Intune device Remediations.

Local admin account status on Windows 10/11 device
Local admin account status on Windows 10/11 device

Enable built-in Administrator account using Intune

Enable a built-in Administrator account on Windows 10/11 devices using Intune by creating a Device configuration profile.

  • Sign in to the Intune admin center.
  • Go to Devices Configuration Create > New Policy.
Enable built-in Administrator account using Intune
Enable built-in Administrator account using Intune
  • Select Platform as Windows 10 and later
  • Profile type as Settings Catalog
  • Click on the Create button.
Enable built-in Administrator account using Intune
Enable built-in Administrator account using Intune

Basics Tab

Provide a name and description of the profile. Click on Next.

Configuration settings

Click on the Add settings link, search for Local Policies Security Options, and Check the Accounts Enable Administrator Account status policy setting. Then, toggle the switch to Enable.

The OMA-URI setting which is used in the background for managing built-in local Administrator account is: ./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus

Policy CSP – LocalPoliciesSecurityOptions
Configuration settings
Configuration settings

Scope tags

Scope tags can control which objects are visible to the admins. Currently, we do not have this requirement to restrict this deployment. Click on Next to proceed to the next step.

Assignments tab

Click Add groups and select the Entra security group containing Windows 10/11 test devices. Once testing proves successful, you can expand the deployment by including additional devices in the group.

Review + Create

Review the deployment and click on Create to start the deployment process.

Sync Intune Policies

The device check-in process might not begin immediately. If you’re testing this policy on a test device, you can manually kickstart Intune sync from the device itself or remotely through the Intune admin center.

Alternatively, you can use PowerShell to force the Intune sync on Windows devices. Restarting the device is another way to trigger the Intune device check-in process.

Monitoring Deployment Progress

To monitor the deployment progress of a Device configuration profile, follow the below steps:

  • Sign in to the Intune admin center.
  • Click on Devices and then click on Configuration.
  • Choose the Device Configuration profile you want to work with, and at the top of the page, you’ll see a quick view of the Success, Failure, Conflict, Not Applicable, and In Progress status.
  • Click on “View report” to access more detailed information.

End-user Experience

Let’s check the result of this policy from one of the target devices:

  • Go to Start > search for Computer Management.
  • Then go to Local Users and Groups > Users.
  • Check the status of the Administrator Account; it should now be Enabled.
End-user Experience
End-user Experience


Even after applying this policy, a built-in Administrator account may still not be enabled. The deployment’s status may show an Error Code 65000. Event Viewer logs also show that the deployment has failed.

  • Go to the Device and Click Start > Search for Event Viewer.
  • Go to Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostics-Provider > Admin.

MDM ConfigurationManager: Command failure status. Configuration Source ID: (7CCD9C30-BFE5-4CE3-97C8-FC5E16474D01), Enrollment Name: (MDMDeviceWithAAD), Provider Name: (Policy), Command Type: (Add: from Replace or Add), CSP URI: (./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus), Result: (Unknown Win32 Error code: 0xc000006c).

Error Event ID 404

The error message provided doesn’t offer a clear indication of the problem’s location. On the device itself, we observed an Error Event ID 404, and in the Intune admin center, the Error code is 65000.

Upon re-checking Microsoft’s documentation, it was discovered that it won’t be enabled if the local built-in Administrator account doesn’t meet password complexity requirements.

To fix this issue, refer to the blog post: Enable/Disable Local Admin Account Using Intune Remediations, which shows a different way of Enabling a built-in Administrator account by setting a complex password first to meet the password complexity requirements.

Windows Registry

In most scenarios, checking the Windows registry to verify policy deployment may not be necessary. The Intune admin center is the recommended place to monitor the policy. However, as an advanced troubleshooting step, you can inspect the Windows registry to confirm if the policy has been applied successfully.

  • Open the Registry Editor.
  • Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\providers\AdministratorGUID\default\Device\LocalPoliciesSecurityOptions
  • You will find a registry entry named Accounts_EnableAdministratorAccountStatus on the right-hand side with the value 1. This confirms that Intune successfully enabled the built-in administrator account.


In this blog post, we have seen how to Enable or Disable a built-in local administrator account. If you enable a local administrator account, ensure the built-in local administrator meets password complexity requirements; otherwise, you may get Error 65000 shown on the Intune admin center after you deploy the device configuration profile.

4 thoughts on “Enable/Disable built-in Administrator account using Intune”

  1. Hello,
    How did you set the password of local administrator account to meet the complexity requirement? Manually resetting it or by Intune? Is the complexity requirement of Local Security Policy or Intune?

    • I did changed the password manually on the device but if you have a perform this on devices in bulk then you could create a powershell script and using that change password of the Administrator account to meet complexity requirements. I believe its a local security policy which does not allow a simple password for Administrator account.

      [Update]: I have created a blog post on how to Enable/Disable built in Administrator account using Intune Proactive Remediations which used Powershell scripts. Hope this will help you to fix this issue: https://cloudinfra.net/enable-disable-local-admin-account-using-intune-remediations/

    • Under Local Policies Security Options you have to change “User Account Control Behavior of the Elevation Prompt for Standard Users” to “Prompt for credentials”.


Leave a Comment