How to Apply Local Group Policy to Administrators in Windows 11 & 10

How to Apply Local Group Policy to Administrators in Windows 11 & 10 blog banner image

This step-by-step tutorial demonstrates how to apply Local Group Policy to administrators in Windows 11 and Windows 10. It also includes information about Windows system administration, Local Group Policy, troubleshooting tips, and best practices for managing multiple Windows devices.

Applying Local Group Policy settings only to administrators allows you to enable or disable features only for administrative users, giving you more control over who can make changes to your PC configuration and perform certain actions.

Local Group Policy in Windows Explained

Group Policy is a Windows feature that is available in Pro, Enterprise, and Server variants of the operating system. It allows for the administration and configuration of Windows devices, including system and user settings, as well as configuring third-party applications. It is the way to manage Windows’ security policies, user permissions, network configuration, and user profiles.

Group Policies are made up of Group Policy Objects (GPOs). Each individual GPO contains a number of configuration options that change how the associated Windows feature or application functions. GPOs are applied as either a Computer Configuration which applies to a specific Windows device and any user who is logged in to it, or User Configuration, which applies to a single user account while they are logged in, regardless of which device they are logged in to.

Some configurations that are commonly implemented using Windows Group Policies and Group Policy Objects include:

  • Automatically configuring network shares and shared printers.
  • Setting login and logoff scripts.
  • Automatically configuring web browser settings like proxies and whether scripts are allowed or not.
  • Configuring anti-malware and firewall rules.
  • Blocking access to certain applications or Windows features.

Windows Group Policy GPOs can be one of two types:

  • Local Group Policy: Local group policies apply only to the specific device they are configured on. Importantly, Local Group Policy Objects are overridden by domain Group Policy Objects from Group Policy in Active Directory.
  • Group Policy in Active Directory: Group Policy Objects can be created in a Windows Active Directory domain. These policies are scoped based on the user or device Organizational Unit within Active Directory. Active Directory is usually deployed to manage Windows devices and users in an enterprise environment.

Group Policy to administrators: Required versions

Home editions of Windows do not let you manage Local Group Policy. To use Local Group Policy or Group Policy in Active Directory you will need to be running one of the following versions of Windows:

  • Windows 10 Pro, Enterprise, or Education.
  • Windows 11 Pro, Enterprise, or Education.
  • Windows 7/8 Pro, Enterprise, or Ultimate (note that you should no longer be using these versions of Windows as they are obsolete and no longer receive updates).

You will also need your own administrator user account.

Step-by-step tutorial: applying Local Group Policy to administrators in Windows

To manage Group Policy for administrators, you can create a custom Microsoft Management Console (MMC) window that edits group policies only for users in the Administrators group:

  • Right-click on the Start button, then select Run.
  • Enter mmc, click OK, and click Yes on the User Account Control Prompt to open the MMC.
  • Click on File in the menu bar, and then select Add/Remove Snap-In…
  • Choose Group Policy Object Editor from the list of Available snap-ins.
  • Click the Add > button to add it to the list of Selected snap-ins.

Click the Add button to add it to the list of Selected snap-ins.

  • Click on the Browse button in the Select Group Policy Object window.
  • Select the Users tab and then select the Administrators user group (or alternatively, any other user group you want to specifically apply a policy to) and then press OK.

Select the Users tab and then select the Administrators user group

 

  • Click Finish in the Select Group Policy window and then press OK in the Add or Remove Snap-ins window.
  • The MMC window will now show your Local Group Policy Editor for administrative users in the navigation pane.
  • Select File then Save As, and save this custom MMC view to the desktop as Group Policy Editor for administrative users.
  • Now, you can skip all of the above steps whenever you want to manage user policies and use the MMC file saved to your desktop to go directly to the Group Policy Editor for administrators.

Any changes to group policy you make in this MMC window will apply only to administrative users on the local system. For example, you could configure a group policy that hides the desktop Internet Explorer icon for Administrators:

  • Open the MMC using the file you created above.
  • Navigate to Local Computer/Administrators Policy/User Configuration/Administrative Templates/Desktop.
  • Double-click on Hide Internet Explorer icon on desktop setting.
  • Select Enabled in the setting window and then click OK.
  • To apply the changes, reboot or run the command gpupdate /force from PowerShell or the command prompt.

To reverse this, repeat the above process, but instead of selecting Enabled in the Hide Internet Explorer icon on desktop setting, select Disabled or Not Configured. Thoroughly test any Local Group Policy Objects after configuring them, to ensure that they are having the intended effect.

Troubleshooting common Local Group Policy issues

If the settings configured in Local Group Policy do not have any effect, you can troubleshoot by:

  • Checking the policies are assigned to the Administrators user group.
  • Making sure that the users you want the settings to apply to are Administrators on the local machine.

If the settings are being applied to non-administrative users instead of (or in addition to) administrative users, check that:

  • You’re not assigning the group policy to the machine (which covers all users on it) instead of a user group.
  • Your group policy targets the intended user group.

To list all group policies that are in effect, run gpresult /r from the command line. If there are conflicting group policies the most restrictive policy is always applied.

If you make an error when configuring group policies (and can’t figure out which specific policy to undo to put things right), you can revert all group policies by running the following commands as an administrator:

gpupdate /force

secedit /configure /cfg %windir%\inf\defltbase.inf /db defltbase.sdb /verbose

You’ll need to restart your device to complete the process. The command above resets both the computer configuration and user configuration policies.

Why apply Local Group Policy to administrators only?

Usually, Group Policy is used in larger Windows deployments as part of an Active Directory domain for centralized control of multiple Windows devices. However, administrators of smaller deployments for businesses and home users can benefit from creating and managing group policies, as it allows them to do things such as:

  • Prevent administrator accounts from being used for non-administrative purposes by blocking apps.
  • Prevent administrative users from being able to execute scripts.
  • Prevent end users who need administrator accounts for other reasons (like legacy app compatibility) from changing system settings and breaking their machines or disabling critical features such as firewalls or antivirus.
  • Prevent users from accessing mail clients or other potential malware vectors while logged in as an administrator.

How to effectively manage Windows Group Policy for multiple devices

Administering a fleet of Windows devices requires central management over a network so that each device is properly configured, changes can be enforced, and so that each device doesn’t have to be manually set up. Windows Group Policy in Active Directory allows you to configure and oversee thousands of Windows machines and users and apply group policies depending on a device’s location, type, or the user’s role.

While Windows’ built-in management tools are robust and proven to be reliable, you can further guarantee the security of your Windows networks by implementing remote management and endpoint protection. This is increasingly critical in the modern cybersecurity landscape: you cannot leave gaps in your network and device configuration that can be exploited.

NinjaOne is a comprehensive end-to-end endpoint management solution for Windows domains. It includes a unified management interface for deploying and managing Windows 11 devices and integration with endpoint protection that helps you manage group policies and ensures that they are fully deployed across your Windows infrastructure.

Next Steps

Building an efficient and effective IT team requires a centralized solution that acts as your core service deliver tool. NinjaOne enables IT teams to monitor, manage, secure, and support all their devices, wherever they are, without the need for complex on-premises infrastructure.

Learn more about Ninja Endpoint Management, check out a live tour, or start your free trial of the NinjaOne platform.

You might also like

Ready to become an IT Ninja?

Learn how NinjaOne can help you simplify IT operations.

×

See NinjaOne in action!

By submitting this form, I accept NinjaOne's privacy policy.

NinjaOne Terms & Conditions

By clicking the “I Accept” button below, you indicate your acceptance of the following legal terms as well as our Terms of Use:

  • Ownership Rights: NinjaOne owns and will continue to own all right, title, and interest in and to the script (including the copyright). NinjaOne is giving you a limited license to use the script in accordance with these legal terms.
  • Use Limitation: You may only use the script for your legitimate personal or internal business purposes, and you may not share the script with another party.
  • Republication Prohibition: Under no circumstances are you permitted to re-publish the script in any script library belonging to or under the control of any other software provider.
  • Warranty Disclaimer: The script is provided “as is” and “as available”, without warranty of any kind. NinjaOne makes no promise or guarantee that the script will be free from defects or that it will meet your specific needs or expectations.
  • Assumption of Risk: Your use of the script is at your own risk. You acknowledge that there are certain inherent risks in using the script, and you understand and assume each of those risks.
  • Waiver and Release: You will not hold NinjaOne responsible for any adverse or unintended consequences resulting from your use of the script, and you waive any legal or equitable rights or remedies you may have against NinjaOne relating to your use of the script.
  • EULA: If you are a NinjaOne customer, your use of the script is subject to the End User License Agreement applicable to you (EULA).