A few words of thanks would be greatly appreciated.

Access to registry has been disabled by Administrator

When you log in to your computer with Windows operating system administrator privileges, the system assumes that you have the right to run and install non-malicious data files and software. However, when trying to run regedit, it displays an error message saying the administrator has disabled registry editing. It is due to a virus or malware trying to gain control of your administrative rights. To get back in the driver's seat, enable the group policy editor that solves the Viral software code disabled in Registry Access problem. Lots of malicious programs will interrupt the registry permit, depending on its primary file name (regedit.exe) and do not allow them to run. Operating system administrative rights can be targeted by malware.


When I run Regedit (Start > Run) it displays " Regedit is disabled by the administrator".

What can be done?


To enable registry editor which has been disabled by some malware, please do the following to regain access and perform maintenance:

Enable Registry Editor using Group Policy Editor
  • 1. Click on the Start > Run and type "gpedit.msc" on the field (without ").
  • 2. Navigate to:
  • User Configuration
  • Administrative Templates
  • System
  • 3. On the option: Prevent access to registry editing tools
  • 4. Click Disabled and click on the OK button to save settings.
  • 5. Reboot your computer.


Thanks to Dark7568 for this tip on the forum.

A few words of thanks would be greatly appreciated.

Ask a question
CCM is a leading international tech website. Our content is written in collaboration with IT experts, under the direction of Jean-François Pillou, founder of CCM.net. CCM reaches more than 50 million unique visitors per month and is available in 11 languages.


This document, titled « Access to registry has been disabled by Administrator », is available under the Creative Commons license. Any copy, reuse, or modification of the content should be sufficiently credited to CCM (ccm.net).