Renaming the windows Administrator account as a good security measure

 

When a hacker tries to remotely break into a windows system, you can bet that one of the things they will try is to break into the default administrator account.

By renaming this account to something other than "Administrator" it will prevent a hacker from trying to guess your password to the account by sequence.

You should also make sure that any administrator account on your windows machine is password protected by a good password.

Tip 8 will describe 'good' passwords in my next tech-tip write up.

 

strComputer = "."

Set objWMIService = GetObject("winmgmts:\\" & strComputer & "\root\cimv2")
Set colAccounts = objWMIService.ExecQuery _
("Select * From Win32_UserAccount Where LocalAccount = True And Name = 'Administrator'")

For Each objAccount in colAccounts
objAccount.Rename "NotAdministrator"
Next
 

You can copy and paste this text above into notepad, and save the file as filename.vbs on the desktop, when you double-click it, it will run as a visual basic script without any messages.

You can also do or check this manually by right clicking my computer, manage, local users and groups, users. Right click on Administrator and change the name to anything you like.

If you need to log into the "Administrator" account after changing it, note that it will now be "NonAdministrator" or if you changed it manually, whatever you renamed it to.

You need to have local administrator rights to be able to change this manually or with a script.

And here is a direct link to the script file that you can run from my site, but you still need to be logged on with local admin rights for it to work:

http://www.glennroast.co.uk/renameadmin.vbs

 

Back to Technical Tips

Back To Main Page