Running PowerShell with administrative privileges enables system-level tasks such as managing services, changing firewall settings, and editing protected locations without permission errors.
On Windows 11, elevation is controlled by User Account Control (UAC), which launches a separate elevated process when Run as administrator is used. The elevated session receives a higher-integrity security token, allowing access to operations blocked for standard sessions.
Administrative shells can change critical system settings and files, so elevation is best kept to the shortest time needed for the task. Start search may show Windows PowerShell (built-in) or PowerShell (PowerShell 7+), and the same elevation flow applies to both.
Steps to run PowerShell as administrator:
- Press the Windows key to open the Start search.
Typing begins searching immediately in the Start menu.
- Type PowerShell into the Start search box.

- Select Windows PowerShell in the search results.
Select the PowerShell result if Windows PowerShell is not listed, as elevation works the same way.
- Right-click the selected Windows PowerShell result.

- Click Run as administrator.
Elevated sessions can modify protected resources such as C:\Windows\System32 and the HKLM:\ registry hive.
- Confirm the User Account Control (UAC) prompt by clicking Yes.
Verify the application name in the prompt before approving, as elevation grants full administrative rights to the process.
- Verify that the elevated session reports an administrator role.
PS C:\Windows\system32> ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) True
The title bar typically starts with Administrator: when elevation is active.
Mohd Shakir Zakaria is a cloud architect with deep roots in software development and open-source advocacy. Certified in AWS, Red Hat, VMware, ITIL, and Linux, he specializes in designing and managing robust cloud and on-premises infrastructures.
