Windows hides a lot of user account information for the sake of simplicity. Here is how to get full details of all user accounts in Windows 10 & 11.
With a few mouse clicks, Windows allows you to create as many user accounts as you desire. Whether in Windows 10 or 11, open the Settings app, go to “Accounts > Family and other people” and click the button “Add a family member” or “Add someone else to this PC” to create a new user account.
Every time you create a new user account, it will be added to the user’s list and displayed in the Settings app, Control Panel, and on the Lock Screen.
In addition to the user accounts you create, Windows has a few more default accounts that are hidden from plain sight. For example, Windows includes an administrator and guest account that are both disabled by default. If you are running Windows 10 or 11, you will also have a WDAGUtilityAccount account that Windows Security will manage to secure your computer.
Table of contents:
- Why does Windows hide user accounts?
- View full user account details in Windows
- Explaining user account details
Why does Windows hide user accounts and details?
One of the main reasons Windows conceals built-in accounts is to prevent you from messing with them. Apart from hiding default user accounts, Windows also hides advanced user account details such as SID information, domain, SIDType, if the user account has the power to change the password, and so on.
In Windows, you can see all user accounts as well as full user account info. All you have to do is execute a command to get started. Here’s how to list and view full user account details in Windows.
The steps below work the same in Windows 10 and 11.
View Full Details of User Accounts in Windows
Follow these steps to see hidden user accounts and hidden details of all user account in Windows.
- Press the Start key.
- Search for “PowerShell.”
- Right-click on “Windows PowerShell.”
- Choose the “Run as administrator” option.
- Execute the below command.
wmic useraccount list full
- It lists all the user accounts and full details of each user account.
Steps with more details:
Search for “PowerShell” in the start menu, right-click on it, and choose the “Run as Administrator” option. You can also open PowerShell in “Windows Terminal (Admin)” and follow along.
After opening the PowerShell window, copy the below command, paste it in the console and press “Enter” to execute the command.
Quick tip: to paste the command, right-click inside the PowerShell or Command Prompt window.
wmic useraccount list full
As soon as you execute the command, the console window will list full user account details of all users on your system. This includes hidden accounts like Administrator, WDAGUtilityAccount, and Guest.
WDAGUtilityAccount is a Windows Defender user account, in case you were wondering. Windows Defender requires administrative capabilities to scan and remove malicious files from your machine. As a result, it has its own user account. Don’t meddle with it.
Also, did you know that Windows Defender can now run in a sandbox for added security? Here’s how to enable Windows Defender sandbox in Windows.
What are all those properties in the details list?
After running the command, you may notice properties that you may not understand, such as AccountType. So, allow me to explain some of the lingo in the account details list.
AccountType: This property identifies the account type of each user with a certain number. Each number reflects a different type of account. This is what they mean:
- 512: A typical Windows user’s default or standard account. When you run the above-mentioned command, you should see something like this.
- 256: Local user accounts whose primary account is on a different Domain. As a result, these accounts will only have access to this domain and nothing else.
- 2048: Account for the system domain that also trusts other domains.
- 4096: A system account that is also a member this domain.
- 8192: This is a domain controller backup account that is also a member of this domain.
Disabled: This property indicates if the account is active or inactive. If the user account is active, you will see False, otherwise True.
Lockout: Indicates whether or not the account is locked out. In most cases, the account is locked out by the administrator or by repeatedly entering the wrong password.
SID: This is the account’s Security Identifier (SID). Each account has its own SID string.
SIDType: This indicates the type of SID. You can tell which group the current SID belongs to based on the value. In general, the user account you create is a member of the User group.
- 1 = User
- 2 = Group
- 3 = Domain
- 4 = Alias
- 5 = Well known group
- 6 = Deleted account
- 7 = Invalid
- 8 = Unknown
- 9 = Computer
—
That is all. It is that simple to know the full user account details in Windows 10 and 11.
I hope this simple and easy Windows how-to guide helped you.
If you are stuck or need some help, send an email, and I will try to help as much as possible.