An attempt was made to set the Directory Services Restore Mode administrator password
On this page
This event is logged whenever you successfully set the DSRM administrator password such as with ntdsutil.
This password is important since it controls someone's ability to enter DSRM and potentially restore or other wise access the Active Directory database.
The user and logon session that performed the action.
- Security ID: The SID of the account.
- Account Name: The account logon name.
- Account Domain: The domain or - in the case of local accounts - computer name.
- Logon ID is a semi-unique (unique between reboots) number that identifies the logon session. Logon ID allows you to correlate backwards to the logon event (4624) as well as with other events logged during the same logon session.
- Caller Workstation: computer name where the user was present; only relevant if user made the change remotely
- Status Code: Always "0x0"? Start a discussion if you have information on this field!
Top 10 Windows Security Events to Monitor
An attempt was made to set the Directory Services Restore Mode
Security ID: ACME\administrator
Account Name: administrator
Account Domain: ACME
Logon ID: 0x21a95
Caller Workstation: WIN-R9H529RIO4Y
Status Code: 0x0
Keep me up-to-date on the Windows Security Log.
*We will NOT share this