Access to Admin Shares may be required to remotely administer the device, deploy software, and this section covers two suggestion when an Access Denied message is returned when attempting to connect to the admin share on a workgroup computer.

Local Administrator account Remote Restrictions
There are two access tokens assigned to accounts in the local Administrator group, standard user and administrator. When actions are performed under an administrator account, UAC access filtering will automatically run this under the standard user token unless specified to run as an Administrator in elevated privileges mode (or if using the in-built administrator account as above). Please note that where the computer is part of a domain UAC access control filtering will not affect any actions performed by a domain administrator account, although if using a local non-domain administrator account UAC access filtering will again run this under the standard user token.

When using a local administrator account (apart from the in-built administrator account) the LocalAccountTokenFilterPolicy registry entry may be created to disable UAC remote restrictions.

Log into the target device
Open the Registry Editor (Start/Run/regedit)
Backup the Registry. As changes are immediately applied with no automatic backup, in line with best practice we suggest backing up the Windows registry before amending the registry.
The required steps are covered in the Windows Microsoft Technet article How to back up and restore the registry
Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
If the LocalAccountTokenFilterPolicy does not exist the key must be created:
Right-click on System
From the context menu choose New, DWORD (32-bit) Value
Enter LocalAccountTokenFilterPolicy as Value Data
Select then right-click on LocalAccountTokenFilterPolicy
Choose Modify
Set the Value Data to 1
OK to save changes

Exit out of the Registry Editor

After this change, remote connections to the Admin Share using a local account in the administrators group are accepted and will not generate an Access Denied message.


Use the built-in administrative account
The built-in administrator account provides full unrestricted access rights and permissions on the computer, as this runs in an elevated state it is not prompted by User Access Control (UAC) to provide confirmation of any changes. Depending on the version of Windows the built-in administrator account is disabled by default.

Login to the target device

To enable the administrator account, launch an elevated command prompt (Start, Run, cmd right-click cmd.exe in the returned results and Run as administrator) then enter:

net user administrator /active:yes

This created the administrator account without a password, so it cannot be used to access the network share, and the next step is to create a password for this administrative account.

In Local Users and Groups, (Start, Run, lusrmgt.msc) expand Users and right-click on Administrator (Built-in account for administering the computer/domain) and Set Password

To confirm these changes, log off of the computer then log back in using the Administrator account.

If this was successful the the Admin Shares will become remotely accessible when using the built-in Administrator account.

Important: the in-built administrator account provides unrestricted access to the computer, as such it is advisable not to leave this always enabled or use for everyday tasks.

To disable this account simply open an elevated command prompt then enter:

net user administrator /active:no