In a PowerShell script, how can I check if I'm running with administrator privileges?
-
5[Check for Admin Credentials in a PowerShell Script](http://blogs.technet.com/b/heyscriptingguy/archive/2011/05/11/check-for-admin-credentials-in-a-powershell-script.aspx) – KyleMit Aug 07 '15 at 18:43
-
2Archived version of the link in the previous comment: https://web.archive.org/web/20150711220515/http://blogs.technet.com/b/heyscriptingguy/archive/2011/05/11/check-for-admin-credentials-in-a-powershell-script.aspx – AJM May 30 '22 at 10:51
-
Where Microsoft has currently moved it to https://devblogs.microsoft.com/scripting/check-for-admin-credentials-in-a-powershell-script/ – silicontrip Jun 09 '22 at 04:07
7 Answers
In Powershell 4.0 you can use requires at the top of your script:
#Requires -RunAsAdministrator
Outputs:
The script 'MyScript.ps1' cannot be run because it contains a "#requires" statement for running as Administrator. The current Windows PowerShell session is not running as Administrator. Start Windows PowerShell by using the Run as Administrator option, and then try running the script again.

- 629
- 4
- 11
- 26

- 1,363
- 1
- 9
- 7
-
3Not exactly what I was looking for but still very useful. Thanks Eddie! – Michael Kelley Mar 19 '15 at 17:31
-
5
-
correkt link: https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_requires – Summer-Time Mar 30 '20 at 08:21
-
Neat solution, but the downside of it is if you run the script from the file explorer > right click > Run in Powershell (instead of running it from a terminal). In this case, the window blinks for half a second and the message cannot be read by the user. – Gerard Bosch Feb 26 '23 at 00:47
-
It's a neat idea but doesn't address the need where you want the script behavior to be different depending on whether it's running with admin privileges or not. – Dr Phil May 11 '23 at 19:19
$currentPrincipal = New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())
$currentPrincipal.IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)
(from Command line safety tricks)
-
3$currentPrincipal = New-Object Security.Principal.WindowsPrincipal( [Security.Principal.WindowsIdentity]::GetCurrent() ) &{ if ($currentPrincipal.IsInRole( [Security.Principal.WindowsBuiltInRole]::Administrator )) { (get-host).UI.RawUI.Backgroundcolor="DarkRed" clear-host write-host "Warning: PowerShell is running as an Administrator.`n" } – gm3dmo Dec 17 '09 at 20:16
-
3This is a great solution where you are using an ancient version of powershell (in my case 3) that doesn't support "#Requires -RunAsAdministrator" – Kinetic Jun 07 '21 at 15:33
-
3Single line without variable assignment: `(New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)` – Cameron Tacklind Feb 11 '22 at 19:42
-
@gm3do Like the person asking (probably), yes I want to actually use the value like in your comment... but PowerShell says "The ampersand (&) character is not allowed." Please fix the code and place it in a code block so it isn't mangled by the site: https://meta.stackexchange.com/a/22189 – Poikilos Jun 28 '23 at 16:22
function Test-Administrator
{
$user = [Security.Principal.WindowsIdentity]::GetCurrent();
(New-Object Security.Principal.WindowsPrincipal $user).IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator)
}
Execute the above function. IF the a result is True, the user has admin privileges.

- 729
- 2
- 11
- 21

- 969
- 1
- 5
- 5
-
8This only determines if the user running the script is an administrator on the machine -- and not if the script is currently being **executed with administrative privileges**. In other words, this will still return true even if the user did not use "run as administrator" to launch the command shell. – Holistic Developer Oct 17 '14 at 19:34
-
4@HolisticDeveloper, that is incorrect. If you aren't elevated, it will return false – charleswj81 Jan 08 '15 at 16:33
-
@charleswj81 as of now I observe the behavior that Holistic Developer describes. – zneak May 07 '16 at 00:01
-
I don't think you need the semi colon... but that said I don't think it throws an error either – Kellen Stuart Aug 04 '18 at 18:52
-
1This works for me on Win10 as of 2018. Returns False if current user account is not elevated, returns True if powershell is running elevated. – arberg Oct 16 '18 at 08:03
-
-
Hello, 2022 chiming in with testing this in admin and non-admin shells. Returns true in the former, false in the latter for me. – orion elenzil May 17 '22 at 23:13
as a combination of the above answers, you can use something like the following at the begin of your script:
# todo: put this in a dedicated file for reuse and dot-source the file
function Test-Administrator
{
[OutputType([bool])]
param()
process {
[Security.Principal.WindowsPrincipal]$user = [Security.Principal.WindowsIdentity]::GetCurrent();
return $user.IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator);
}
}
if(-not (Test-Administrator))
{
# TODO: define proper exit codes for the given errors
Write-Error "This script must be executed as Administrator.";
exit 1;
}
$ErrorActionPreference = "Stop";
# do something
Another method is to start your Script with this line, which will prevent it's execution when not started with admin rights.
#Requires -RunAsAdministrator

- 131
- 2
-
1Unfortunately, this doesn't work. If the script is not run with elevated rights, then it won't even load, and you won't see your custom error message. – JamesQMurphy May 02 '19 at 17:27
-
This will check if you are an Administrator, if not then it will reopen in PowerShell ISE as an Administrator.
Hope this helps!
$ver = $host | select version
if ($ver.Version.Major -gt 1) {$Host.Runspace.ThreadOptions = "ReuseThread"}
# Verify that user running script is an administrator
$IsAdmin=[Security.Principal.WindowsIdentity]::GetCurrent()
If ((New-Object Security.Principal.WindowsPrincipal $IsAdmin).IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator) -eq $FALSE)
{
"`nERROR: You are NOT a local administrator. Run this script after logging on with a local administrator account."
# We are not running "as Administrator" - so relaunch as administrator
# Create a new process object that starts PowerShell
$newProcess = new-object System.Diagnostics.ProcessStartInfo "PowerShell_ise";
# Specify the current script path and name as a parameter
$newProcess.Arguments = $myInvocation.MyCommand.Definition;
# Indicate that the process should be elevated
$newProcess.Verb = "runas";
# Start the new process
[System.Diagnostics.Process]::Start($newProcess);
# Exit from the current, unelevated, process
exit
}

- 121
- 2
Here is my take on it, if the script isn't run as an administrator, it reloads it and access for administrator access
if (-not (New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) {
# Prompt the user to elevate the script
$arguments = "& '" + $myInvocation.MyCommand.Definition + "'"
Start-Process powershell -Verb runAs -ArgumentList $arguments
exit
}

- 11
- 1
function Test-RunAsAdministrator{
$script = new-item -path $env:TEMP -name 'TestElevated.ps1' -value @'
#Requires -RunAsAdministrator
$true
'@
try{
& $script.FullName
}catch [System.Management.Automation.ScriptRequiresException]{
$false
}finally{
remove-item $script.FullName
}
}
This is a function wrapper for the #Requires
statement, it should return:
$true
, when run in an elevated context$false
, when run in a non-elevated context
Although in my current test scenarios it provides the same results as using the GetCurrent()
Admin User | Non-Admin User | |
---|---|---|
Elevated Proc | $true |
N/A |
Non Elevated Proc | $false |
$false |
$IsAdministrator = ([Security.Principal.WindowsPrincipal]::new(
($id = [Security.Principal.WindowsIdentity]::GetCurrent())
)).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)
$id.dispose(); remove-variable id

- 101
- 2