You gained access to your C drive after securing it.
You gained access to your C drive after securing it.
Not incorrect, but a member of the Administrators group isn't the same as the "administrator" account. The admin role is more powerful, similar to how root is a superuser but distinct from logging in as root. It's alike yet different.
This situation applies to local machine accounts as well, though the statement holds more weight in an Active Directory setup where the default domain admin acts like root across the entire forest. The built-in local "Administrator" account stems from its inclusion in the "Administrators" group. Removing or reclassifying it is challenging due to system constraints. By default, the "Administrator" role remains disabled unless explicitly enabled. Users part of that group gain full permissions similar to the standard local admin. Once granted access, they can own directories/files and modify NTFS ACL settings. The closest equivalent to root remains the SYSTEM account, which is a system-wide machine account with unrestricted privileges.
None of the options helped. Running CMD isn't possible due to location restrictions, and I'm unsure how to proceed from safe mode.
No, you cannot restore permissions directly from the registry.
I adjusted the C drive settings, but I'm facing problems reverting the changes.
In the folder you created adjustments, you can attempt to restore ACLs to their original settings. There are no assurances you'll avoid another issue, but if you have no alternative, proceed. How to revert NTFS permissions on drives or folders ⋆ SysAdminStuff icacls * /T /Q /C /RESET