Magic Quadrant™ for Privileged Access Management 2025: Netwrix Recognized for the Fourth Year in a Row. Download the report.

Platform
Resource centerHow-to-Guide
How to Detect Password Changes in Active Directory

How to Detect Password Changes in Active Directory

Native Auditing

  1. Run GPMC.msc (url2open.com/gpmc) → open "Default Domain Policy" → Computer Configuration → Policies → Windows Settings → Security Settings → Local Policies → Audit Policy:
    • Audit account management → Define → Success and Failure.
  2. Run GPMC.msc → open "Default Domain Policy" → Computer Configuration → Policies → Windows Settings → Security Settings → Event Log → Define:
    • Maximum security log size to 1GB
    • Retention method for security log to Overwrite events as needed
  3. Open Event viewer and search Security log for event id’s: 628/4724 – password reset attempt by administrator and 627/4723 – password change attempt by user.
Image

Netwrix Auditor for Active Directory

  1. Run Netwrix Auditor → Navigate to “Reports” → Open “Active Directory” → Go to “Active Directory Changes” → Select “Password Resets by Administrator” or “User Password Changes” → Click “View”.
  2. To get reports on email regularly, choose "Subscribe" option and define schedule and recipient.
Image
Image

Share on