Windows OS Hub
  • Windows
    • Windows 11
    • Windows Server 2022
    • Windows 10
    • Windows Server 2019
    • Windows Server 2016
  • Microsoft
    • Active Directory (AD DS)
    • Group Policies (GPOs)
    • Exchange Server
    • Azure and Microsoft 365
    • Microsoft Office
  • Virtualization
    • VMware
    • Hyper-V
  • PowerShell
  • Linux
  • Home
  • About

Windows OS Hub

  • Windows
    • Windows 11
    • Windows Server 2022
    • Windows 10
    • Windows Server 2019
    • Windows Server 2016
  • Microsoft
    • Active Directory (AD DS)
    • Group Policies (GPOs)
    • Exchange Server
    • Azure and Microsoft 365
    • Microsoft Office
  • Virtualization
    • VMware
    • Hyper-V
  • PowerShell
  • Linux

 Windows OS Hub / Windows 10 / Managing Administrative Shares (Admin$, IPC$, C$) on Windows

March 15, 2024 Windows 10Windows 11Windows Server 2019

Managing Administrative Shares (Admin$, IPC$, C$) on Windows

Windows administrative shared folders are used for remote access and computer management. By default, the following administrative shares are created by Windows:

  • Admin$ – Remote Admin (refers to %SystemRoot% directory). Used for remote computer management;
  • IPC$ – Remote IPC, used to communicate with programs via named pipes;
  • C$ – Default Share. Shared system drive. If there are any other drives on the computer that have letters assigned to them, these will also be automatically published as admin shares (D$, E$, etc.);
  • Print$ – published when you share your printer (opens access to the printer drivers directory C:\Windows\system32\spool\drivers);
  • FAX$ –  for shared fax server access.

Contents:
  • What are Hidden Administrative Shares on Windows?
  • How to Remove Administrative Shares on Windows
  • Restore or Enable Admin Shares on Windows
  • Enable Remote Access to $Admin Shares on Windows

What are Hidden Administrative Shares on Windows?

You can view a list of administrative folders on your computer in the Computer Management snap-in compmgmt.msc (System Tools -> Shared Folders -> Shares), or by running the net share command.

view a list of hidden administrative shares on windows 10 (Admin$, IPC$, C$, D$)

The names of the administrative shares end with a $ sign. The LanmanServer service hides shared folders with the $ symbol in the network environment. Administrative shares are not displayed when you open the list of available shared network folders on a remote computer in File Explorer (\\computername).

shared folder on windows 10

This command lists available admin shares on a remote computer:

net view \\computername /all

view admin shares on remote computer cmd: net view \\computername /all

Most third-party file managers for Windows have an option that allows you to automatically view the administrative resources that are available on a remote computer.

You must specify the full name of an administrative share to open its contents from File Explorer. Press Win+R and run the command \\computername\c$

open admin share on remote windows computer

This command opens the contents of the local C drive, giving you full access to the file system of the remote computer’s system drive.

Administrative shares can only be accessed by members of the computer’s local Administrators Administrators group (and the Backup Operators group), provided that you have SMB protocol enabled, turned on file and printer sharing, and access to TCP port 445 is not blocked by Windows Defender Firewall rules.

view contents of the admin share c$

How to Remove Administrative Shares on Windows

While Windows administrative shares are convenient for managing computers remotely, they also present additional security risks. You can completely prevent Windows from creating these hidden admin shares. This will not disrupt the operation of the Windows computer used as the client but will limit its remote administration capabilities.

To remove a shared admin folder, select the Stop sharing option in the Computer Management snap-in (or use the net share Admin$ /delete command). This will remove the admin share, but Windows will automatically re-create the Admin$ share when you restart your computer.

stop sharing hidden admin shares on windows 10

To prevent Windows from creating administrative shares, you must open the registry editor (regedit.exe), go to the registry key HKLM\System\CurrentControlSet\Services\LanmanServer\Parameters, and add a Dword parameter named AutoShareWks (for desktop versions of Windows) or AutoShareServer (for Windows Server) with a value of 0.

AutoShareWks - reg key to disable / enable default windows administrative shares

You can create this registry entry manually by using the reg add command:

reg add HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters /f /v AutoShareWks /t REG_DWORD /d 0

or with PowerShell:

New-ItemProperty -Name AutoShareWks -Path HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters -Type DWORD -Value 0

To deploy this registry parameter to the computers in your domain, you can use the GPO.

Now after rebooting the administrative shares will not be created. In this case, remote computer management tools, including psexec, will stop working.

If you are on a domain network, you can use Group Policy to prevent the local hard drives of the computers from being published as admin shares:

  1. Create a new GPO using the Group Policy Management snap-in. Go to Computer Configuration -> Preferences -> Windows Settings -> Network Shares;
  2. Select Action: Delete and check the option Delete all administrative drive-letter shares.GPO: delete administrative drive letter shares

Restore or Enable Admin Shares on Windows

If you want to enable admin shares on Windows, you need to change the parameter value to 1 or delete it:

Set-ItemProperty -Name AutoShareWks -Path HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters -Value 1

How to enable c$ admin share on Windows 10 and Windows Server 2016

The LanmanServer service creates administrative shares on Windows. Remote users cannot access shared resources on this computer if this service is stopped.

Get-Service LanmanServer

check lanmanserver service state

Windows can automatically recreate the hidden admin shares, simply restart the LanmanServer service with the command:

Get-service LanmanServer | restart-service -verbose

restart LanmanServer to recreate admin shares

Run the Get-SmbShare PowerShell command and check that admin shares are available.

Enable Remote Access to $Admin Shares on Windows

On computers joined to the AD domain, remote access to administrative shares is allowed to users who are members of the local Administrators group.

However, by default, Windows blocks remote access to administrative shares on workgroup computers. If you try to open a list of files on such a computer in the Explorer using the command \\win10_pc\C$, you will be prompted for user credentials. After entering the credentials of a local user who is in the local Administrators group, an access denied error is displayed. Only the built-in Windows Administrator account can remotely access administrative shares.

Can't access ADMIN$ share remotely under admin accounts

In this case, remote access to administrative shares is blocked by the Remote UAC (Remote User Account Control). Remote UAC blocks remote administrative access to folders by filtering local and Microsoft account access tokens. If you access the admin shares using a domain account, this restriction doesn’t apply.

You can disable Remote UAC by creating the LocalAccountTokenFilterPolicy registry parameter.

It will slightly reduce the Windows security.
  1. Open the Registry Editor (regedit.exe);
  2. Go to the following reg key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ;
  3. Create a new DWORD (32-bit) parameter with the name LocalAccountTokenFilterPolicy;
  4. Set the LocalAccountTokenFilterPolicy parameter value to 1;Remote local administrator & LocalAccountTokenFilterPolicy regestry parameter
  5. Restart your computer to apply the changes.
You can create the LocalAccountTokenFilterPolicy registry parameter using the following command:

reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "LocalAccountTokenFilterPolicy" /t REG_DWORD /d 1 /f

After the reboot, try to remotely open the C$ admin share on a remote computer. Log in with an account that is a member of the local Administrators group.

remotely accessing the C$ admin share with a local account

A File Explorer window should now display the contents of the remote drive.

10 comments
14
Facebook Twitter Google + Pinterest
previous post
Fixing “Winload.efi is Missing or Contains Errors” in Windows 10
next post
How to Refresh (Update) Group Policy Settings on Windows

Related Reading

How to Cancel Windows Update Pending Restart Loop

May 6, 2025

View Windows Update History with PowerShell (CMD)

April 30, 2025

Change BIOS from Legacy to UEFI without Reinstalling...

April 21, 2025

Remove ‘Your License isn’t Genuine’ Banner in MS...

April 21, 2025

Uninstalling Windows Updates via CMD/PowerShell

April 18, 2025

10 comments

Vicky April 5, 2022 - 12:08 am

Thank you very much for this information. I have an odd circumstance, where I need to find out all the people MAC of who is remote into my computer. I was finally able to get my network to run on Private and it stay there I’m finding a second network on my computer. I have other situations that backs this up in my router settings.

Reply
Jadden April 8, 2022 - 4:54 pm

check event viewer

Reply
CityguyUSA August 25, 2022 - 4:42 am

Thank God someone had the answer.

Reply
johhny September 3, 2022 - 8:12 am

how to change permission without deleting a share from cmd?

Reply
Endang Irawan September 8, 2022 - 7:09 am

what the impact if we have disable c$ d$ etc on the server?

Reply
Lynda April 13, 2023 - 5:17 pm

Oh do I LOVE you…let me count the ways…! Thanks xoxo!

Reply
xx January 13, 2024 - 4:17 pm

What’s the catch? What does the built-in administrator have in the settings that a user manually added to the Administrators group does not have, so that UAC does not block them?

Reply
admin January 16, 2024 - 6:39 am

This is the default behavior of the built-in Windows Administrator account.
This account is not subject to UAC (User Account Control), and all programs are executed without a UAC prompt (this is an important difference from user accounts with administrator privileges).
https://woshub.com/enable-built-in-administrator-account-in-windows-10/

Reply
CityguyUSA January 22, 2024 - 10:26 pm

As a local user with admin privilege’s on a workgroup computer the cmd “dir \\Win10Computer\c$” to a networked computer works fine. I get no credential requests and I already had UAC off. This wasn’t always the case. There was a time when it just wouldn’t work through the cmd window but you could map the admin share to a local drive letter using the GUI in file manager.

Reply
Susanta Naskart September 23, 2024 - 7:35 am

change this value to to effect
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters]
“AutoShareWks”=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
“LocalAccountTokenFilterPolicy”=dword:00000001

Reply

Leave a Comment Cancel Reply

join us telegram channel https://t.me/woshub
Join WindowsHub Telegram channel to get the latest updates!

Categories

  • Active Directory
  • Group Policies
  • Exchange Server
  • Microsoft 365
  • Azure
  • Windows 11
  • Windows 10
  • Windows Server 2022
  • Windows Server 2019
  • Windows Server 2016
  • PowerShell
  • VMware
  • Hyper-V
  • Linux
  • MS Office

Recent Posts

  • Cannot Install Network Adapter Drivers on Windows Server

    April 29, 2025
  • Change BIOS from Legacy to UEFI without Reinstalling Windows

    April 21, 2025
  • How to Prefer IPv4 over IPv6 in Windows Networks

    April 9, 2025
  • Load Drivers from WinPE or Recovery CMD

    March 26, 2025
  • How to Block Common (Weak) Passwords in Active Directory

    March 25, 2025
  • Fix: The referenced assembly could not be found error (0x80073701) on Windows

    March 17, 2025
  • Exclude a Specific User or Computer from Group Policy

    March 12, 2025
  • AD Domain Join: Computer Account Re-use Blocked

    March 11, 2025
  • How to Write Logs to the Windows Event Viewer from PowerShell/CMD

    March 3, 2025
  • How to Hide (Block) a Specific Windows Update

    February 25, 2025

Follow us

  • Facebook
  • Twitter
  • Telegram
Popular Posts
  • How to Repair EFI/GPT Bootloader on Windows 10 or 11
  • How to Restore Deleted EFI System Partition in Windows
  • Network Computers are not Showing Up in Windows 10/11
  • Install and Manage Windows Updates with PowerShell (PSWindowsUpdate)
  • How to Download Offline Installer (APPX/MSIX) for Microsoft Store App
  • Updating List of Trusted Root Certificates in Windows
  • Fix: Windows Cannot Connect to a Shared Printer
Footer Logo

@2014 - 2024 - Windows OS Hub. All about operating systems for sysadmins


Back To Top