Hey Sampei.Nihira,I enabled it for my custom local admin account/PIN protection with the "prompt for credentials on secure desktop" policy on Windows 11 Pro 25H2 26200.7171, but it didn't work.
Bummer to hear it didn't kick in as expected—let's troubleshoot this step by step based on your setup (custom local admin account with PIN protection on Windows 11 Pro 25H2 build 26200.7171). First off, a quick clarification to make sure we're on the same page: The "Administrator Protection" you're tweaking via Group Policy is tied to User Account Control (UAC) behaviors, specifically the "Admin Approval Mode." For custom admin accounts (like yours, not the built-in Administrator), Admin Approval Mode is already the default—meaning UAC prompts should appear for elevated actions. The policy you're enabling ("User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" set to "Prompt for credentials on the secure desktop") just customizes how that prompt behaves, forcing a credential entry (e.g., password or PIN) instead of a simple "Yes" consent.
Since you mentioned it "didn't work," I'm assuming the UAC prompt isn't switching to credential mode or isn't appearing at all when it should. This could stem from a few common issues, especially on an Insider build like 26200.7171 (which is a Canary/Dev channel preview—those can be finicky with policy enforcement). Here's a breakdown and some targeted fixes:
### 1. **Verify Policy Application**
- Double-check that the policy is enabled correctly:
- Open Group Policy Editor (`gpedit.msc`).
- Navigate to **Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options**.
- Look for **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** and ensure it's set to "Prompt for credentials on the secure desktop."
- Also, confirm **User Account Control: Run all administrators in Admin Approval Mode** is Enabled (this is the master switch for AAM—it's usually on by default, but worth verifying).
- After changes, run `gpupdate /force` in an elevated Command Prompt to apply them immediately. Restart your system to be safe, as some UAC tweaks need a reboot.
- Test by trying an admin-level action, like opening Task Manager as admin (right-click > Run as administrator) or editing a protected file in System32. You should see a secure desktop prompt asking for credentials (password or PIN, since you have PIN set up).
### 2. **Account Type and PIN Integration**
- For custom local admin accounts, this should work fine with Windows Hello PIN (which you're using for protection). When the prompt appears, it might default to PIN entry if that's your preferred auth method—Microsoft prioritizes Hello over passwords for security. If you want to force password-only, you could temporarily remove the PIN via Settings > Accounts > Sign-in options, but that might not be ideal if you're relying on it elsewhere.
- Note: If your account is set up with Windows Hello (PIN/biometrics), the prompt might not fall back to password easily—it's designed to use the "easiest" secure method. Test disabling Hello temporarily to isolate if that's the culprit.
### 3. **Potential Build-Specific or Compatibility Issues**
- Build 26200.7171 is an early preview (likely with known bugs in security features). Check the Windows Insider Blog or Feedback Hub for any reported issues with UAC/Group Policy in this build—I've seen similar complaints in previews where policies don't apply consistently until a stable release.
- Ensure UAC isn't disabled entirely: Go to Settings > System > About > Windows specifications, or check the registry key `EnableLUA` at `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System` (should be 1 for enabled).
- Conflicts with third-party tools? If ThrottleStop, GHelper, or Shadow Defender are running with elevated privileges or custom hooks, they might interfere. Try testing in a clean boot (msconfig > Services > Hide all Microsoft > Disable others, then reboot) to rule that out.
### 4. **Alternative Approaches if It Still Fails**
- **Registry Equivalent**: If Group Policy isn't sticking, try the direct regedit method (backup your registry first!):
- Open regedit as admin.
- Go to `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System`.
- Set `ConsentPromptBehaviorAdmin` to 1 (for "Prompt for credentials on secure desktop").
- Set `EnableLUA` to 1 if it's not already.
- Reboot and test.
- **Fallback to Consent Prompt**: If credentials mode is the sticking point, switch the policy to "Prompt for consent on the secure desktop" as a test—it's less restrictive but still adds protection.
- **Built-in Admin Test**: For comparison, enable the built-in Administrator account (via `net user administrator /active:yes`), log in, and apply the "User Account Control: Admin Approval Mode for the Built-in Administrator account" policy (set to Enabled). This might behave differently and help pinpoint if it's account-specific.
If none of that gets it working, could you share more details? Like, what exactly happens when you try an elevated action (no prompt at all? Wrong prompt type? Error message?)? Screenshots or event logs (from Event Viewer > Windows Logs > System, filter for UAC-related events) would be super helpful for narrowing it down. We can crack this—it's a solid feature once it's humming along!
How's the molar recovery going, by the way? Hope no more drama there.
