No its not quite the same. Windows still places some user access control (UAC) type restrictions even on accounts designated as Administrators when it comes to running certain programs or shortcuts. Microsoft does so to prevent even Administrator accounts from running scripts/programs that could harm Windows. Often one can bypass the UAC or similar restrictions on certain shortcuts by changing the shortcuts advanced properties to run the shortcut as an Administrator.
Rather than permissions, it was one of the flags on the robocopy command.
I’ll detail here in case someone in the future runs into this:
There is a /COPYALL flag which copies the file and ALL info.
You can also set different flags on the copy command as follows:
/COPY:copyflag[s] : What to COPY (default is /COPY:DAT)
(copyflags : D=Data, A=Attributes, T=Timestamps
S=Security=NTFS ACLs, O=Owner info, U=aUditing info).
/COPYALL is the same as /COPY:DATSOU
By changing my flag to /COPY:DATSO, I prevented the Auditing info from being part of the process and the script runs fine.