Windows Administrator Explained

Why you are and are not the administrator of your own computer.

Why will your computer sometimes tells you "access denied" when you're the only user? Windows has a system of administrator account types that are easy to misunderstand. I'll describe which type of account you likely have, and what the other options can and can't do.
An individual wearing a baseball cap labelled "Adminstrator capable". On a table next to him are baseball caps labelled "Administrator" and "Standard User".
(Image: Gemini)

The concept of the “administrator” in Windows is somewhat confusing. It’s not uncommon for people to be disallowed from doing something on their PC because they’re not the administrator, even though their account is the only one on the machine.

Administration has several forms. Let’s explore what they are and what it means to be administrator… even when you’re not.

TL;DR:

Administrator versus administrator-capable

Windows has three types of accounts.

  • Your everyday account is administrator-capable: it asks your permission (via a UAC dialog) before making big changes.
  • A standard account works similarly, but its UAC needs an admin’s password.
  • A hidden true administrator account exists, but it’s a security risk.

Administrator-capable

When you install Windows from scratch, the account you create is typically the one you end up using day-to-day. It’s what I call administrator-capable.

This means two things:

  1. As you go about your business, the account does not have administrative permissions.
  2. If you attempt to do something that requires administrative permission (say, install a new program), you’ll be prompted with the UAC, or User Account Control dialog. You have to say, “Yes, I want this change to happen.”
Standard UAC Dialog.
A standard UAC Dialog. (Screenshot: askleo.com)

In some cases, attempting to do something requiring administrative privileges will fail, saying “elevation required” or something similar. An administrator-capable account can then either run the program “as administrator” or run it from within a Terminal/Command prompt (Admin).

The rule of thumb is simple: the default user account created when you install Windows can run as administrator, but does not do so by default. This makes it more difficult for malware to do bad things should it attempt to run.

Standard or limited user account

The other common type of account is referred to as a standard or limited user account. The account is not administrator-capable, yet it can still run software requiring administrative privileges with an additional condition.

In fact, it’s amazingly similar to an administrator-capable account.

  1. As you go about your business, the account does not have administrative permissions.
  2. If you attempt to do something that requires administrative permission, you’ll typically be prompted with the UAC or User Account Control dialog, but with an additional requirement.
UAC as presented to a standard account.
A UAC as presented to a standard account. (Screenshot: askleo.com)

If you’re running a standard user account, UAC dialogs include the requirement that you provide the password for one of the administrator-capable accounts on the machine.

In other words, a standard user cannot perform administrative actions unless they also know or have been given the credentials for an administrative account.

These accounts might be given to someone who needs to use the computer, but shouldn’t be making administrative-level changes on the machine.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

The true administrator account

There is an account called administrator on every Windows machine.

  • It is disabled by default.
  • It can be enabled by any administrator-capable account.
  • When initially enabled, it has no password, meaning it’s a huge security risk until you set one.
  • When used, it runs “as administrator” at all times; no UAC prompts will appear.

It may sound nice to never have to deal with a UAC prompt and always be able to do whatever you want, whenever you want. The problem, of course, is that using the administrator account for day-to-day activity is a major security risk. Any malware that makes it onto your machine while you’re in administrator mode is also an administrator and won’t be stopped by any UAC notifications. Malware in this situation typically arrives and installs silently.

In reality, and for safety, there’s rarely a reason to enable this account. If enabled, it should not be used for normal activity.

Disabling UAC

One approach some people use to make their administrator-capable account more like the true administrator account is to turn off User Account Control completely.

Turning Off UAC. (Not recommended.)
Turning Off UAC. (Not recommended.) Click for larger image. (Screenshot: askleo.com)

With this set to “Never notify”, an administrator-capable account acts more like the true administrator account. You’ll never see a UAC prompt; actions requiring administrative access will simply work.

UAC “Never notify” is not recommended because it removes an important barrier that protects you from malware. With this setting, if malware makes it to your machine, it can run without notice. UACs force you to give permission for big changes to take place.

Linux equivalents

Since interest in Linux is increasing, it might be worthwhile to include that, with the exception of the UAC prompt, each of these types of administrator access has equivalents in the Linux world.

The administrator account is equivalent to the account called root in Linux. Sign in to Linux using the account root, and you have all administrative privileges all the time. Just like Windows, it’s not recommended to run as root all the time — not so much because of malware but because mistakes can have unexpected system-wide consequences.1 It’s sometimes referred to as the super user account.

Administrator-capable is equivalent to a Linux login that has been added to the “sudoers” files. This allows the account, normally running with restricted permissions, to “act as” root by invoking the “sudo” (“do as super user”) command and providing their own password (the one they already know and used to sign in the first place; this prevents other people from walking up to the machine and using sudo). Just like Windows, the initial account created by most Linux installers is administrator-capable and in the sudoers file.

Standard or limited user accounts are equivalent to a Linux login that is not in the “sudoers” file. They, to, can still perform administrative tasks, but only if they know the root (aka “super user”) password, using the “su” command.

UAC doesn’t have a direct equivalent in Linux. The closest equivalent is that if you attempt to do something requiring super user access, it’ll just fail. You’d then re-run the command with sudo if your account has that capability, or you’d use “su” to become root if you know the password.

Do this

Unless you have specific reasons to do otherwise, stick with using your administrator-capable account. The annoyance of a UAC interruption when you need to do something requiring administrative access is a very small price to pay for its additional security.

Subscribe to Confident Computing! Less frustration and more confidence, solutions, answers, and tips in your inbox every week.

Podcast audio

Play

Footnotes & References

1: The canonical example is the mistake of running “rm -fr /” in a Linux terminal by mistake. This command attempts to remove every file and folder on the hard disk. If you’re running as root, it’ll work, rendering your machine unbootable. If not running as root, you’ll just get an error.

Leave a reply:

Before commenting please:

  • Read the article.
  • Comment on the article.
  • No personal information.
  • No spam.

Comments violating those rules will be removed. Comments that don't add value will be removed, including off-topic or content-free comments, or comments that look even a little bit like spam. All comments containing links and certain keywords will be moderated before publication.

I want comments to be valuable for everyone, including those who come later and take the time to read.