Every Windows computer has an Administrator account (SID S-1-5-domain-500, display name Administrator). The Administrator account is the first account created during the Windows installation.
The Administrator account has full control of the files, directories, services, and other resources on the local device. The default Administrator account can’t be deleted or locked out, but it can be renamed or disabled. An Administrator account can’t be removed from the Administrators group.
The best practice is to use a non-administrator account to log on to the PC and elevate to an administrator account when required e.g. to install any applications or perform any configuration tasks on your device. It’s best to avoid using a local administrator account to Sign in to the device.
However, if you are using Windows LAPS and managing a built-in Administrator account, It must be enabled before you can deploy LAPS policy to the device.
In this blog post, we’ll explore two methods for enabling the built-in local administrator account. The first approach involves using a Device Configuration Profile, and the alternative method is through Intune device Remediations.
Table of Contents
Enable built-in Administrator account using Intune
Let’s Enable a built-in Administrator account on Windows 10/11 devices using Intune by creating a Device configuration profile.
- Login on Microsoft Intune admin center
- Go to Devices > Configuration profiles
- Click on + Create Profile
- Select Platform as Windows 10 and later
- Profile type: Settings Catalog
Provide a Name and Description for the Profile. Click on Next.
Click on the Add settings link, and search for Local Policies Security Options and Check the policy setting “Accounts Enable Administrator Account status“. Use the Toggle switch to Enable.
The OMA-URI setting which is used in the background for managing built-in local Administrator account is: ./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatusPolicy CSP – LocalPoliciesSecurityOptions
Click on Add group to add an Azure AD group containing users or devices. You can also click on Add all users or Add all devices.
Review + Create
Review the deployment and click on Create to start the deployment process.
Let’s check the result of this policy from one of the target devices:
- Go to Start > search for Computer Management.
- Then go to Local Users and Groups > Users.
- Check the status of the Administrator Account, it should now be Enabled.
Even after applying this policy, If built-in Administrator account may still not be enabled. The status of the deployment may show an Error Code 65000. Event Viewer logs also show that deployment has failed.
- Go to the Device and then Click on Start > Search for Event Viewer.
- Go to Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostics-Provider > Admin.
MDM ConfigurationManager: Command failure status. Configuration Source ID: (7CCD9C30-BFE5-4CE3-97C8-FC5E16474D01), Enrollment Name: (MDMDeviceWithAAD), Provider Name: (Policy), Command Type: (Add: from Replace or Add), CSP URI: (./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus), Result: (Unknown Win32 Error code: 0xc000006c).Error Event ID 404
The error message provided doesn’t offer a clear indication of the problem’s location. On the device itself, we observed an Error Event ID 404, and in the Intune admin center, the Error code is 65000.
Upon re-checking Microsoft’s documentation, it was discovered that if the local built-in Administrator account doesn’t meet password complexity requirements, it won’t be enabled.
To fix this issue, you can refer to the blog post: Enable/Disable Local Admin Account Using Intune Remediations which shows a different way of Enabling a built-in Administrator account by setting a complex password first to meet the password complexity requirements.
In this blog post, we have seen how to Enable or Disable a built-in local administrator account. If you are enabling a local administrator account, make sure that the built-in local administrator meets password complexity requirements otherwise you may get Error 65000 shown on the Intune admin center after you deploy the device configuration profile.