Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Microsoft

Slideshow: Access the real Administrator account in Windows 7

By greg shultz January 19, 2011, 11:31 PM PST

Image
1
of 6

1-21_Fig_A.png
1-21_Fig_A.png
Slideshow: Access the real Administrator account in Windows 7

Select the Administrator account

Select the Administrator account

As you know, the User Account Control (UAC) system is the heart and soul of the security system in Microsoft Windows 7. It is designed to protect your system from inadvertent or malicious incidents that could compromise stability or security while you are logged on using an account with administrative privileges, where you have full access to the system. Of course, you can perform administrative operations simply by working through the UAC prompt. Or, if you totally dislike the UAC system, you can also easily disable it. For example, you can select the Never Notify setting on the User Account Control Setting window.

However, there certainly are times when it would just be nice to log on to your Windows 7 system with a good old fashioned full-fledged Administrator account. When you do, you’ll never encounter a UAC prompt.

In this edition of the Windows Desktop Report, I’ll explain how you can activate and use the real Administrator account in Windows 7.

Caveat: Now keep in mind that Microsoft has gone to great lengths to prevent you from using the real Administrator account and as you can imagine, strongly discourages the technique I’m about to show you here. As such, I must emphasize that you should use the real Administrator account very sparingly – never make it your default modus operandi! With that being said, I also have to say that you use this technique at your own risk.

Activating the account
While you might think that since Microsoft discourages the use of Windows 7’s Administrator account, that it is hidden deep within the bowels of the operating system. However, that’s not the case at all. In fact, to find the Administrator account you have to look no further than the Local Users and Groups tool.

To begin, open the Start menu, right-click the Computer icon, and select Manage from the context menu. When you see the Computer Management console, go to the navigation panel on the left and click the arrow next to Local Users and Groups to expand the branch. Then, click the Users folder. At this point you can see and select the Administrator account as shown.

This gallery is also available as a TechRepublic blog post and download.

Slideshow: Access the real Administrator account in Windows 7

More Actions menu

More Actions menu

With the Administrator account selected, click More Actions under Administrator in the Actions panel on the right and select Properties from the menu, as shown.

This gallery is also available as a TechRepublic blog post and download.

Slideshow: Access the real Administrator account in Windows 7

The Administrator account is disabled by default

The Administrator account is disabled by default

When you see the Administrator Properties dialog box, just clear the Account is Disabled check box, as shown.

Keep in mind that now that the Administrator Account is activated you can also work with the account in the User Accounts tool in the Control Panel.

This gallery is also available as a TechRepublic blog post and download.

Slideshow: Access the real Administrator account in Windows 7

Set Password

Set Password

Setting the password
By default, the Administrator account has a blank password, so the first order of business after activating the account is to set a password – preferably a complex password consisting of at least eight characters and using uppercase, lowercase, and numbers or special symbols.

With the Administrator account selected, click More Actions under Administrator in the Actions panel and select the Set Password command. You will be shown a warning that explains that resetting a password from outside the account itself can cause irreversible loss of information, as shown.

This gallery is also available as a TechRepublic blog post and download.

Slideshow: Access the real Administrator account in Windows 7

Enter new password

Enter new password

However, since the Administrator Account has never been used, you can click Proceed with impunity. When you do, you’ll see the Set Password dialog box, as shown, and then you can type the new password in both text boxes. Then, click OK.

This gallery is also available as a TechRepublic blog post and download.

Slideshow: Access the real Administrator account in Windows 7

Administrator account available

Administrator account available

Now that you’ve activated the Administrator Account and set the password, using the account is as simple as logging off. When the Log Off operation completes, you’ll see the Welcome screen and you will see a user icon for the Administrator Account. To log on as the Administrator, just click the icon and provide the correct password.

When you do, you’ll never encounter a UAC prompt.

Again, I must emphasize that you should use the real Administrator account sparingly and never make it your default mode of operation!

This gallery is also available as a TechRepublic blog post and download.

  • Microsoft
  • Account Information

    Share with Your Friends

    Slideshow: Access the real Administrator account in Windows 7

    Your email has been sent

Share: Slideshow: Access the real Administrator account in Windows 7
Image of greg shultz
By greg shultz
My first computer was a Kaypro 16 \"luggable\" running MS-DOS 2.11 which I obtained while studying computer science in 1986. After two years, I discovered that I had a knack for writing documentation and shifted my focus over to technical writing.
  • Account Information

    Contact greg shultz

    Your message has been sent

  • |
  • See all of greg's content

TechRepublic Premium

  • TechRepublic Premium

    Shadow IT policy

    Shadow IT is a concept whereby an organization’s employees use technology, services or systems without the knowledge of or approval from the IT department. It has arisen due to several reasons: Advances in cloud computing, which involve the usage of applications or sharing of data in public environments previously owned by IT. The evolution of ...

    Published:  February 2, 2023, 11:00 AM EST Modified:  February 3, 2023, 2:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Auditing and logging policy

    Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data. From the policy: Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various ...

    Published:  February 2, 2023, 11:00 AM EST Modified:  February 3, 2023, 3:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Vendor contract renewal planner

    Determining how and when to renew support contracts can be tedious and time-consuming. Our vendor contract renewal planner will help you schedule support renewals and budget the related costs. From the planner: Some companies schedule their support contract renewals to take effect all at once, such as on January 1. This provides a convenient renewal ...

    Published:  February 1, 2023, 11:00 AM EST Modified:  February 2, 2023, 12:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Access management policy

    Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company. The purpose of this policy ...

    Downloads
    Published:  February 1, 2023, 11:00 AM EST Modified:  February 2, 2023, 4:00 PM EST Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice