Renaming User Profile in WXP

Posted on 2006-03-22
Last Modified: 2008-01-09
I have a user profile I would like to rename in WXP. I am logging on as Administrator but I get an error message "Cannot rename access denied". Also If I try to delete the profile I receive  an error message "Cannot delete ntuser: It is being used by another person or program. Can someone tell me how I can rename this profile?
Question by:Kimberly1467
    LVL 42

    Expert Comment

    are you sure that you are not logged in to the other profile?
    one sure way to verify is to reboot.  then log directly into the Admin account and try to rename.
    LVL 8

    Accepted Solution

    If you really can't rename the user or the profile, you could create a new user and copy all data from the old user/profile to the new, i would suggest you to do the following then:

    Make sure that you don't login with the old username, before logging on with Administrator, because the ntuser.dat is still in use after logoff.

    1) Logon with Administrator.
    2) Create a new user with the Username you want, and give administrator priviliges to it.
    3) Logon with this new user only one time to create the profile directory. Then reboot the machine.
    4) Logon with Administrator, have a look in C:\Documents and Settings. There should be a directory with the newly defined username. Then navigate to the directory with the old username you wanted to rename. Click on Tools -> Folder Options in the Menu toolbar -> View -> Uncheck "Hide extensions for known file types"  -> Uncheck "Hide operating system files" -> Check "Show hidden files and folders". Then select all data in the old profile folder and click on "Copy", navigate to the new profile folder and choose Paste. Now all data from the old profile should have been copied to the new profile folder.
    5) Reboot the machine and try to logon with the new user.

    If you can logon with the new user properly, you can delete the old user and the old profile directory.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Free Trending Threat Insights Every Day

    Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

    iTunes uses a third party component from  GEAR Software ( for accessing the CD/DVD drives in Windows computers.  This component is registered as a filter driver for all CD/DVD drives.  Sometimes the iTunes installation or…
    If you build your web application in Visual Studio you'll get at least a few binaries, or .DLL, files in your bin folder. However, there is more compiling to be done. Normally this would happen when an ASP.NET resource within the web site is request…
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now