Skip to main content

Forgot the Administrator’s Password? - Change Domain Admin Password in Windows Server

 

Note: In order to successfully use this trick you must first use one of the password resetting tools available on the Forgot the Administrator's Password? page.

LANsurveyor: Map Your Network in Minutes!









Relax while LANsurveyor automatically maps your network.

LANsurveyor automatically discovers your LAN or WAN and produces comprehensive, easy-to-view network diagrams that can be exported into Microsoft Office® Visio®.
You Have Got To Try This! Get the Download Here...

The reason for that is that you need to have the local administrator's password in order to perform the following tip, and if you don't have it, then the only method of resetting it is by using the above tool.
Read more about that on the Forgot the Administrator's Password? page.
Update: After some reader feedback I'm pleased to say that this procedure ALSO WORKS for Windows Server 2008 Domain Controllers. Feel free to send in your feedback. I kept the original page syntax in relation to Windows Server 2003, but you can now perform the same actions on Windows Server 2008.
Lamer note: This procedure is NOT designed for Windows XP since Windows XP is NOT a domain controller. Also, for a Windows 2000 version of this article you should read the Forgot the Administrator's Password? - Change Domain Admin Password in Windows 2000 AD page.
Reader Sebastien Francois added his own personal note regarding the changing of Domain Admin passwords on Windows Server 2003 Active Directory domains (HERE). I will quote parts of it (thanks Seb!):
Requirements
  1. Local access to the Domain Controller (DC).
  2. The Local Administrator password.
  3. Two tools provided by Microsoft in their Resource Kit: SRVANY and INSTSRV. Download them from HERE (24kb).
Step 1
Restart Windows 2003 in Directory Service Restore Mode.
Note: At startup, press F8 and choose Directory Service Restore Mode. It disables Active Directory. When the login screen appears, log on as Local Administrator. You now have full access to the computer resources, but you cannot make any changes to Active Directory.



Step 2
You are now going to install SRVANY. This utility can virtually run any programs as a service. The interesting point is that the program will have SYSTEM privileges (LSA) (as it inherits the SRVANY security descriptor), i.e. it will have full access on the system. That is more than enough to reset a Domain Admin password. You will configure SRVANY to start the command prompt (which will run the 'net user' command).
Copy SRVANY and INSTSRV to a temporary folder, mine is called D:'temp. Copy cmd.exe to this folder too (cmd.exe is the command prompt, usually located at %WINDIR%'System32).
Start a command prompt, point to d:'temp (or whatever you call it), and type:
instsrv PassRecovery "d:'temp'srvany.exe"(change the path to suit your own).
It is now time to configure SRVANY.
Start Regedit, and navigate to
HKEY_LOCAL_MACHINE'System'CurrentControlSet'Services'PassRecovery

Create a new subkey called Parameters and add two new values:
name: Applicationtype: REG_SZ (string)value: d:'temp'cmd.exename: AppParameterstype: REG_SZ (string)value: /k net user administrator 123456 /domainReplace 123456 with the password you want. Keep in my mind that the default domain policy require complex passwords (including digits, respecting a minimal length etc) so unless you've changed the default domain policy use a complex password such as P@ssw0rd
Now open the Services applet (Control Panel'Administrative Tools'Services) and open the PassRecovery property tab. Check the starting mode is set to Automatic.


Go to the Log On tab and enable the option Allow service to interact with the desktop.
Restart Windows normally, SRVANY will run the NET USER command and reset the domain admin password.
Step 3
Log on with the Administrator's account and the password you've set in step #2.
Use this command prompt to uninstall SRVANY (do not forget to do it!) by typing:
net stop PassRecoverysc delete PassRecoveryNow delete d:'temp and change the admin password if you fancy.
Done!
Supplement

Robert Strom has written a cool script that will completely automate this process. He wrote:
"My script is really just an automation of his process which performs all the post cleanup of itself. Launch one script and it's all done. No manual registry entries, the service is created, the service settings are all imported into the registry, etc."
Download it from HERE (186kb).
Note that you still need physical access to the DC and the ability to log on locally as the local administrator. If you do not have the local administrator's password use the following tip: Forgot the Administrator's Password?.

Copied for you.

Comments

Popular posts from this blog

Integration with vCloud Director failing after NSXT upgrade to 4.1.2.0 certificate expired

  Issue Clarification: after upgrade from 3.1.3 to 4.1.2.0 observed certificate to be expired related to various internal services.   Issue Verification: after Upgrade from 3.1.3 to 4.1.2.0 observed certificate to be expired related to various internal services.   Root Cause Identification: >>we confirmed the issue to be related to the below KB NSX alarms indicating certificates have expired or are expiring (94898)   Root Cause Justification:   There are two main factors that can contribute to this behaviour: NSX Managers have many certificates for internal services. In version NSX 3.2.1, Cluster Boot Manager (CBM) service certificates were incorrectly given a validity period of 825 days instead of 100 years. This was corrected to 100 years in NSX 3.2.3. However any environment originally installed on NSX 3.2.1 will have the internal CBM Corfu certs expire after 825 regardless of upgrade to the fixed version or not. On NSX-T 3.2.x interna...

Calculate how much data can be transferred in 24 hours based on link speed in data center

  In case you are planning for migration via DIA or IPVPN link and as example you have 200Mb stable speed so you could calculate using the below formula. (( 200Mb /8)x60x60x24) /1024/1024 = 2TB /per day In case you have different speed you could replace the 200Mb by any rate to calculate as example below. (( 5 00Mb /8)x60x60x24) /1024/1024 =  5.15TB  /per day So approximate each 100Mb would allow around 1TB per day.

Device expanded/shrank messages are reported in the VMkernel log for VMFS-5

    Symptoms A VMFS-5 datastore is no longer visible in vSphere 5 datastores view. A VMFS-5 datastore is no longer mounted in the vSphere 5 datastores view. In the  /var/log/vmkernel.log  file, you see an entry similar to: .. cpu1:44722)WARNING: LVM: 2884: [naa.6006048c7bc7febbf4db26ae0c3263cb:1] Device shrank (actual size 18424453 blocks, stored size 18424507 blocks) A VMFS-5 datastore is mounted in the vSphere 5 datastores view, but in the  /var/log/vmkernel.log  file you see an entry similar to: .. cpu0:44828)LVM: 2891: [naa.6006048c7bc7febbf4db26ae0c3263cb:1] Device expanded (actual size 18424506 blocks, stored size 18422953 blocks)   Purpose This article provides steps to correct the VMFS-5 partition table entry using  partedUtil . For more information see  Using the partedUtil command line utility on ESX and ESXi (1036609) .   Cause The device size discrepancy is caused by an incorrect ending sector for the VMFS-5 partition on the ...