Enable/Disable built-in Administrator account using Intune

In this tutorial, we will look at the steps to enable and disable the built-in administrator account using Intune on Windows 10/11 devices.


It is widely known that the built-in administrator account on Windows devices is disabled. That is because the administrator account has complete control over the computer and can bypass all user access control (UAC) safeguards.


The built-in administrator account has a specific and well-known security identifier, and some attacks target that particular SID. As a security measure, Microsoft disables the Administrator account on new Windows installations. Read the following guide to find out the reasons why you should not enable the default administrator account.


Although you can manually enable the built-in administrator account on Windows devices, Intune can do it for you on multiple devices, which saves the time of your IT team. If your organization requires it, you can also disable the built-in administrator account either through Intune or Group Policy.

https://www.forum.vuwpgsa.ac.nz/viewtopic.php?t=5918

https://www.forum.vuwpgsa.ac.nz/viewtopic.php?t=35447

https://www.forum.vuwpgsa.ac.nz/viewtopic.php?t=35498

https://www.forum.vuwpgsa.ac.nz/viewtopic.php?t=35111

https://www.forum.vuwpgsa.ac.nz/viewtopic.php?t=850

https://www.forum.vuwpgsa.ac.nz/viewtopic.php?t=36883

https://www.forum.vuwpgsa.ac.nz/viewtopic.php?t=35976

https://www.forum.vuwpgsa.ac.nz/viewtopic.php?t=4995

http://junlinro520.gain.tw/viewthread.php?tid=1083919

http://junlinro520.gain.tw/viewthread.php?tid=1083827

http://junlinro520.gain.tw/viewthread.php?tid=1229859

http://junlinro520.gain.tw/viewthread.php?tid=1218885

http://junlinro520.gain.tw/viewthread.php?tid=1080391

http://junlinro520.gain.tw/viewthread.php?tid=1226617

https://zin.neverendless-wow.com/forums/topic/5a24f6ce-f07e-483c-8172-ff9eace242e2

https://bonuscloud.club/viewtopic.php?t=45732

https://bonuscloud.club/viewtopic.php?t=56229

https://bonuscloud.club/viewtopic.php?t=48905

https://bonuscloud.club/viewtopic.php?t=51950

https://bonuscloud.club/viewtopic.php?t=59300

On Intune-managed Windows 10/11 devices, there are three ways to enable or disable the built-in local administrator account: device configuration profile, OMA-URI settings, and device remediations. With each method, you need to make different changes, but the result stays the same.


Some organizations prefer to rename the local administrator account on Windows devices via Intune instead of disabling it. This is done to avoid creating an additional administrator account for the IT team for troubleshooting.


Table of Contents


When do you enable the administrator account on a Windows device?

So, in what situations does an organization use Intune to enable the built-in administrator account? If the organization has enabled Windows LAPS in Intune, it is important that the administrator account be enabled before utilizing the LAPS policies. You cannot manage the built-in administrator account password via LAPS if the account is in a disabled state.


Windows LAPS allows for the management of a single local administrator account per device. You can manage the Windows Local Administrator Password Solution (Windows LAPS) on Windows 10/11 devices you manage with Microsoft Intune.


Enable built-in administrator account using Intune

Use the following steps to create a new policy in Intune to enable the built-in administrator account on Windows 10/11 devices:

http://kick.gain.tw/viewthread.php?tid=1898325&extra=

http://kick.gain.tw/viewthread.php?tid=4106353&extra=

http://kick.gain.tw/viewthread.php?tid=2448362&extra=

http://kick.gain.tw/viewthread.php?tid=1591115&extra=

http://kick.gain.tw/viewthread.php?tid=4103106&extra=

http://kick.gain.tw/viewthread.php?tid=4103117&extra=

http://kick.gain.tw/viewthread.php?tid=3540313&extra=

https://www.forum.mybahaibook.com/showthread.php?tid=2694

https://www.forum.mybahaibook.com/showthread.php?tid=4043

https://datcang.vn/viewtopic.php?t=650740

https://datcang.vn/viewtopic.php?t=672208

https://datcang.vn/viewtopic.php?t=672165

https://datcang.vn/viewtopic.php?t=672337

https://datcang.vn/viewtopic.php?t=672167

https://datcang.vn/viewtopic.php?t=672182

https://datcang.vn/viewtopic.php?t=672322

https://muabanvn.net/threads/dell-r450.42217/#post-47607

https://muabanvn.net/threads/lam-dep-vung-bikini.42006/

https://muabanvn.net/threads/tay-trang-vung-bikini.41843/

Step 1: Create a device configuration profile

Sign in to the Intune admin center. Select Devices > Windows > Configuration Profiles. To create a new policy, select Create > New Policy.


On the Create a profile window, configure the following settings and select Create.


Platform: Windows 10 and later

Profile Type: Settings Catalog

Enable built-in administrator account using Intune

Enable built-in administrator account using Intune

Step 2: Configure the Profile Name and Description

In this step, you enter the basic details about the configuration profile. In the Basics tab, enter the following details:


Name: Enter a descriptive name for the profile that can be easily identified later. In the below example, we have set the profile name to “Enable built-in administrator account using Intune.”

Description: Enter a brief description of the profile. This setting is optional but recommended.

Click Next.


Enable built-in administrator account using Intune

Enable built-in administrator account using Intune

Step 3: Configure Accounts Enable Administrator Account Status

In the Configuration Settings section, under Settings Catalog, click Add Settings. In the Settings picker window, type “Enable Administrator Account” in the search box and click Search. From the search results, select “Local Policies Security Options.”


In the bottom pane, select the following setting: “Accounts Enable Administrator Account Status.” Close the Settings Picker.


Enable built-in administrator account using Intune

Enable built-in administrator account using Intune

The built-in administrator account will either be enabled or disabled based on the configuration of the following settings in the Intune admin center:


Accounts Enable Administrator Account Status = Enabled. This will enable the built-in administrator account on Windows devices.

Accounts Enable Administrator Account Status = Disabled. This will disable the built-in administrator account on Windows devices.

Set the Accounts Enable Administrator Account Status to Enabled. Click Next.


Enable built-in administrator account using Intune

Enable built-in administrator account using Intune

Step 4: Scope Tags and Profile Assignments

In Intune, Scope tags determine which objects admins can see. In the Scope tags section, you specify scope tags. Specifying scope tags is optional, and you may skip this step. Click Next.


In the Assignments window, select the device or user groups to which you want to assign this policy. We recommend deploying the profile to a few test groups first and then expanding it to more groups if the testing is successful. Select Next.

http://joscha.x10host.com/phpbb/viewtopic.php?f=1&t=79933

http://joscha.x10host.com/phpbb/viewtopic.php?f=1&t=567122

http://joscha.x10host.com/phpbb/viewtopic.php?t=762540

https://dev-forum.vmssoftware.com/viewtopic.php?t=27961

https://dev-forum.vmssoftware.com/viewtopic.php?t=29787

https://stock.talktaiwan.org/index.php?topic=479317.0

https://stock.talktaiwan.org/index.php?topic=479310.0

https://stock.talktaiwan.org/index.php?topic=453373.0

https://stock.talktaiwan.org/index.php?topic=185541.0

https://stock.talktaiwan.org/index.php?topic=200741.0

https://stock.talktaiwan.org/index.php?topic=435925.0

https://www.eediscuss.com/forum.php?mod=viewthread&tid=18710

https://www.eediscuss.com/forum.php?mod=viewthread&tid=15405

https://www.eediscuss.com/forum.php?mod=viewthread&tid=8862

Configuration Profile Assignments

Configuration Profile Assignments

Step 5: Review and Create Policy

On the Review + Create page, review all the settings that you have configured for enabling the built-in administrator account via Intune and select Create.


After you create a configuration policy in Intune, a notification appears: “Policy created successfully.” This confirms that the policy has been created and is being applied to the groups we chose. The profile that we created appears in Intune’s list of configuration profiles.


Create Intune Policy to enable built-in administrator account

Create Intune Policy to enable built-in administrator account

Synchronize Intune Policies

Once you have assigned a policy to your devices, you must wait for the policy to be applied to the targeted groups, and the devices will receive your profile settings once they check in with the Microsoft Intune service. To receive policies from Intune, the devices must be online. You can also force sync Intune policies using different methods, such as PowerShell, on your computers to get the latest policies and settings from Intune.


Monitor the policy deployment

To monitor the policy in Intune that you applied to Windows devices and users, select the policy and review the device and user check-in status.



Under the device and user check-in status, we see the total number of devices and users that succeeded in receiving the policy. In some cases, the policy may fail to apply to certain devices. To resolve the issues, you will need to troubleshoot the issue by reviewing Intune logs on computers.


As illustrated by the screenshot below, our groups have successfully applied the built-in administrator account policy that was assigned through Intune. Click on View Report to view all the Windows devices that have received the policy settings to enable the built-in administrator account.


Monitor the policy deployment

Monitor the policy deployment

Verify the built-in administrator account status

In this section, we will demonstrate several methods for determining whether the built-in administrator account has been successfully enabled as per the Intune policy applied to our Windows devices.


You can check to see if Intune has enabled the built-in administrator account on your Windows devices using one of three methods:


Local Users and Groups

Windows Event Viewer

Windows Registry

Local Users and Groups

Accessing the local users and groups is one of the simplest ways to check if Intune has enabled the built-in administrator account. Press the Win + R keyboard shortcut. Type “lusrmgr. msc” and press Enter to launch the Local Users and Groups window. Go to the Users directory, and you will notice that the Administrator account has been enabled, as per the Intune policy.


Verify the built-in administrator account status

Local Users and Groups: Verify the built-in administrator account status

Windows Event Viewer

The event viewer IDs 813 and 814 indicate whether Intune has successfully enabled the built-in administrator account policy settings. The Intune MDM event logs can be viewed on client devices using the Event viewer.


Launch the event viewer on the Windows device by running the shortcut command eventvwr. Next, browse the following path in the event viewer to view Intune MDM event logs:


Application and Services Logs: Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider/Admin

Once you have navigated to the above path in Event Viewer, you may filter the current log with ‘Event ID 813.’ This will give you quick access to the event logs that you’re looking for. In the screenshot below, the event ID 813 confirms that the Windows device has successfully received the Accounts_EnableAdministratorAccountStatus policy settings from Intune.


MDM PolicyManager: Set policy int, Policy: (Accounts_EnableAdministratorAccountStatus), Area: (LocalPoliciesSecurityOptions), EnrollmentID requesting merge: (A4A38B7F-5820-4F93-8981-DEB32C194D7B), Current User: (Device), Int: (0x1), Enrollment Type: (0x0), Scope: (0x0).

Verify the built-in administrator account status

Verify the built-in administrator account status using Event Viewer

Windows Registry

Check the Windows Registry on the client device to see if the Intune policy enabled the built-in administrator account. Run the regedit.exe command to open the registry editor on a Windows device. In the registry editor, navigate to the below path.

https://www.eediscuss.com/forum.php?mod=viewthread&tid=18365

https://www.eediscuss.com/forum.php?mod=viewthread&tid=15148

https://www.eediscuss.com/forum.php?mod=viewthread&tid=17527

https://www.eediscuss.com/forum.php?mod=viewthread&tid=8580

http://forum.infinite-soul.org/viewtopic.php?f=64&t=11374

http://forum.infinite-soul.org/viewtopic.php?f=64&t=11371

http://forum.infinite-soul.org/viewtopic.php?f=64&t=11013

Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\providers\AdministratorGUID\default\Device\LocalPoliciesSecurityOptions

Here you’ll see the Accounts_EnableAdministratorAccountStatus registry key with the value “1.” This confirms that you can use the Windows registry to check whether the administrator account was enabled as per the Intune policy.


Verify the built-in administrator account status

Verify the built-in administrator account status



Policy CSP – Accounts_EnableAdministratorAccountStatus

An alternate way to enable or disable the administrator account via Intune on Windows devices is to use the OMA-URI settings. The Policy CSP – Accounts_EnableAdministratorAccountStatus includes the settings to enable or disable the built-in administrator account with Intune.


./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus

Policy CSP - Accounts_EnableAdministratorAccountStatus

Policy CSP – Accounts_EnableAdministratorAccountStatus

You can enable or disable the built-in administrator account using the following OMA-URI settings in Intune.


Name: Enable Administrator Account

Description: Specify a brief description

OMA-URI: ./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus

Data type: Integer

Value:

Specify 1 to enable the administrator account

Specify 0 to disable the administrator account

Enable or disable built-in administrator account using Intune OMA-URI Settings

Enable or disable built-in administrator account using Intune OMA-URI Settings

Troubleshooting

After deploying the policy to enable the built-in administrator account using Intune on some Windows devices, the policy may fail to apply. To resolve the issues, we recommend reviewing Intune logs on Windows computers.


Listed below are some common errors that you may encounter during the process of enabling the administrator account via Intune.


Error code 65000: When you apply the policy to enable the administrator account via Intune, the policy settings may fail to apply on some Windows devices. During our testing on one of our devices, we encountered the error code 65000 in the Intune admin center. This error code appears either because the current Windows device does not accept the policy settings or because the current Administrator password doesn’t meet the password requirements. You’ll need to first configure the password requirements policy via Intune and then enable the administrator account.

Error code 0x87D1FDE8: This is a known issue in Microsoft Intune. Microsoft says this error is a temporary error that appears in the Intune admin center and goes away after the device checks in again.

Comments

Popular posts from this blog

The Different Ways to Enter Text on Your Apple TV

2020 Cord Cutting Guide: Best Cable TV Alternatives to Save Money

Instructions to Install Norton Antivirus