Password Change event viewer

PrasadWF 426 Reputation points
2021-08-30T18:38:46.13+00:00

Hi,

I have changed the password of user account using ctrl+alt+del. After changing the password when I go to DC and check the event viewer ,I did not find the event related to this password change.

Is DC capture this kind of event ? can someone please let me know where can I find this event?

Windows for business Windows Server User experience Other
0 comments No comments
{count} votes

Accepted answer
  1. Charles Thivierge 4,171 Reputation points
    2021-08-30T19:08:31.437+00:00

    Yes, it can.

    But you must enable some audit first on the DC's

    Then, if you have multiple DC's, i suggest you to use the following command to know which DC has received the password change request
    repadmin /showobjmeta mydomain.local "DN"

    For example, a user that has a Distinguished Name: CN=MyUser,CN=Users,=MyDomain,DC=Local

    The command will be:
    repadmin /showobjmeta mydomain.local "CN=MyUser,CN=Users,=MyDomain,DC=Local"

    This will list you all properties of the user account and you will be able to have the DC that made the password change.

    127704-pwdchange.png

    Then, open the security log on this DC and look for the Event ID 4738 "User Account Management"

    You should see a list of attributes and one of them will be "Password Last Set"

    hth


2 additional answers

Sort by: Most helpful
  1. Charles Thivierge 4,171 Reputation points
    2021-08-30T20:23:04.06+00:00

    Well, this information is set on each object (user or computer) in Active Directory.

    The attribute name is "pwdLastSet"

    Well... it's possible to use a powershell script to get the list of user you want and then use the repadmin command to retrieve the information.

    hth

    0 comments No comments

  2. Charles Thivierge 4,171 Reputation points
    2021-08-31T16:05:15.02+00:00

    If you have a file with all sAMAccountName, you could use this PS to get this information.

    This will read the file C:\Temp\List_Users.txt file and will create a create a txt file for each user under the C:\Temp\Extract_User_Info folder

    foreach($line in Get-Content C:\Temp\List_Users.txt) {
    $userdn = get-aduser -identity $line
    repadmin /showobjmeta $Env:USERDNSDOMAIN "$userDN" | Out-File -FilePath C:\Temp\Extract_User_Info\$line.txt
    Write-Host repadmin /showobjmeta $Env:USERDNSDOMAIN "$userDN"
    }

    hth

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.