Menu
CCMEXEC.COM – Enterprise Mobility
  • Home
  • General
  • Configuration Manager
  • Windows 10
  • Windows 11
  • Intune
  • GitHub
  • About
CCMEXEC.COM – Enterprise Mobility

Administrator protection in Windows 11 – First look

Posted on December 10, 2024December 10, 2024 by Jörgen Nilsson

Administrator Protection in Windows 11 was announced at Ignite a couple of weeks ago which adds a well needed more secure option than UAC to protect our accounts with Local Administrator permissions. Administrator Protection reminds a bit on how Microsoft Endpoint Privilege Management works with a separate virtual account. Instead of the traditional UAC elevation a separate user account is used, which means that the logged-on user session is never elevated. This is great, no more UAC Bypass

The first time you elevate a command using the “Run as administrator” option with Administrator Protection configured with using a user that is a member of the local administrator group, a separate “virtual” account is created on the device with the “Admin_” Prefix added to the username as shown below.

We also get a user profile created for each of the ADMIN_ accounts on first elevation

After elevating a command prompt we can check with Whoami which account is used to verify that Administrator Protection is configured and working correctly.

Configuration

Let’s go back to how we configure it. It will be possible to configure it using MDM, GPO or Settings in future releases. It can also be configured using the Local Settings policy.
There are two new settings (They also exist on Windows 11 24H2 version but has no effect)

And how we want the Account Protection o work either with credential or consent

End user experience

We get a new prompt for credentials in my test that prompts for the Windows Hello PIN if I registered for Windows Hello when logging on.

What is interesting is that I have signed in to the device with another user account than Jorgen but it still by default prompts me for the first account that was used to elevate a command on the device which has enrolled in Windows Hello for Business.
If I click on “Sign-in Options” I can select any account that has enrolled in Windows Hello for Business on the device.

What challenges can use a separate account have compared to using UAC? If we use it for application installation the application can make changes to the “wrong” user profile but it should be a small risk.
Developers is a challenge as they depending on what they develop and ow they test it has a need to run tools and debug as a local admin. Using Administrator protection will have the same challenges as when we use EPM, the tool used is run in the “wrong” context not allowing access to repositories for example.
For other purposed installing printers, software, make changes and troubleshoot the device to mention a few this will work great and is a great security enhancement.

Important:

1. If remediation scripts is being used to control which users are members of the local administrator group is used it must be configured to leave all accounts starting with “Admin_” otherwise it is impossible to elevate as the account is removed from the Local Administrator group.

2. If the Intune Local user group membership feature is used in “replace” mode to control who is a local administrator on the device, that policy will also delete all virtual accounts from the Local administrators group making it impossible to elevate.

All tests were done on Windows 11 Build 10.0.27758 (Insider).

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

My name is Jörgen Nilsson and I work as a Senior Consultant at Onevinn in Malmö, Sweden. This is my blog where I will share tips and stuff for my own and everyone elses use on Enterprise Mobility and Windows related topics.
All code is provided "AS-IS" with no warranties.

Recent Posts

  • Tip when troubleshooting unexpected reboots during Autopilot – event ID 2800
  • New settings in Intune Security Baseline Windows 11 24H2 -2504
  • Managing extensions in Visual Studio Code
  • Reinstall a required Win32app using remediation on demand
  • Administrator protection in Windows 11 – First look
©2025 CCMEXEC.COM – Enterprise Mobility | WordPress Theme by Superb Themes
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Reject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT