Running PowerShell with administrative privileges enables system-level tasks such as managing services, changing firewall settings, and editing protected locations without permission errors.
On Windows 11, elevation is controlled by User Account Control (UAC), which launches a separate elevated process when Run as administrator is used. The elevated session receives a higher-integrity security token, allowing access to operations blocked for standard sessions.
Administrative shells can change critical system settings and files, so elevation is best kept to the shortest time needed for the task. Start search may show Windows PowerShell (built-in) or PowerShell (PowerShell 7+), and the same elevation flow applies to both.
Typing begins searching immediately in the Start menu.
Select the PowerShell result if Windows PowerShell is not listed, as elevation works the same way.
Elevated sessions can modify protected resources such as C:\Windows\System32 and the HKLM:\ registry hive.
Verify the application name in the prompt before approving, as elevation grants full administrative rights to the process.
PS C:\Windows\system32> ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) True
The title bar typically starts with Administrator: when elevation is active.