UNLOCKING ADMINISTRATOR PASSWORD

  • Thread starter chiedza mudereri
  • Start date
C

chiedza mudereri

I AM THE ONLY ADMINISTRATOR IN MY COMAPNY AND I AM LOCKED
OUT. OS IS WINDOWS 2000 SERVER.
 
?

????

I cannot beleive that you are the only Administraor -
Whats happened to the default Admin account?????
CAPS LOCK
 
C

Curtis Clay III [MSFT]

Hello Chiedza,
Please clarify, you cannot lock out the administrator account, if your
current issue is that you are no longer able to logon to the server/domain,
then you will need to either, logon with a different admin account, or use
the ERD to recover the original administrator password.

258289 Windows 2000 Logon Passwords
http://support.microsoft.com/?id=258289
 
V

Vanguard

Curtis said:
Hello Chiedza,
Please clarify, you cannot lock out the administrator account, if your
current issue is that you are no longer able to logon to the
server/domain, then you will need to either, logon with a different
admin account, or use the ERD to recover the original administrator
password.

258289 Windows 2000 Logon Passwords
http://support.microsoft.com/?id=258289

Hmm, so you're saying that the policy setting of "Account lockout
duration" is not effected against the Administrator account when someone
makes more than "Account lockout threshold" failed login attempts? I
thought at one time I locked myself out of Administrator, the duration
was 30 minutes, so I had to wait that long before I could try to login
again.
 
M

MikeC

There are 3rd party products that can unlock or reset a
Win2K admin password **Use them at your own risk*. I have
experimented with some (kept in my software stash for
customer emergencies such as yours) and they do work.
 
S

Steven L Umbach

Hi Vanguard. "The" administrator account can not be locked out to interactive logon.
If passprop is used, then it can be locked out to network logon. Other users who are
members of the administrators group will be locked out as other users based on policy
enforced. This is one reason [other than the obvious power it holds] that "the"
administrator account is such a target and needs a very complex password. --- Steve
 
V

Vanguard

Steven said:
Hi Vanguard. "The" administrator account can not be locked out to
interactive logon. If passprop is used, then it can be locked out to
network logon. Other users who are members of the administrators
group will be locked out as other users based on policy enforced.
This is one reason [other than the obvious power it holds] that "the"
administrator account is such a target and needs a very complex
password. --- Steve

Vanguard said:
Hmm, so you're saying that the policy setting of "Account lockout
duration" is not effected against the Administrator account when
someone makes more than "Account lockout threshold" failed login
attempts? I thought at one time I locked myself out of
Administrator, the duration was 30 minutes, so I had to wait that
long before I could try to login again.

Other than using a complex password, is it still advisable to rename the
"Administrator" account to something else (since it should still retain
the same SID) to also thwart hacking? Does renaming the Administrator
account result in other problems, like when using RunAs?
 
K

Karl Levinson [x y] mvp

It's still not a bad idea. Every little bit helps. But you won't
necessarily die if you don't do it. Lots of people do this without
problems. It should not cause problems with running Runas. IIRC you get a
chance to enter which login ID you want to Run As.

Because the SID stays the same, some people use special tools as mentioned
before to disable the default Admin account and create new ones, and also
use RestrictAnonymous where possible to try to reduce account enumeration
[difficult to do very effectively on domain controllers]. If you do this,
then the real admin account can't be guessed by SID [although someone doing
this could easily just try every possible SID to find your login IDs].

Really, no one should be using the "Administrator" account, assuming it is a
shared account. Ideally, each person, admin or otherwise, gets one or more
login IDs that uniquely identify them and only them [and what has been done
to a system by them].
 
V

Vanguard

Karl said:
It's still not a bad idea. Every little bit helps. But you won't
necessarily die if you don't do it. Lots of people do this without
problems. It should not cause problems with running Runas. IIRC you
get a chance to enter which login ID you want to Run As.

Because the SID stays the same, some people use special tools as
mentioned before to disable the default Admin account and create new
ones, and also use RestrictAnonymous where possible to try to reduce
account enumeration [difficult to do very effectively on domain
controllers]. If you do this, then the real admin account can't be
guessed by SID [although someone doing this could easily just try
every possible SID to find your login IDs].

Really, no one should be using the "Administrator" account, assuming
it is a shared account. Ideally, each person, admin or otherwise,
gets one or more login IDs that uniquely identify them and only them
[and what has been done to a system by them].


Other than using a complex password, is it still advisable to rename
the "Administrator" account to something else (since it should still
retain the same SID) to also thwart hacking? Does renaming the
Administrator account result in other problems, like when using
RunAs?

I don't use the Administrator account. Instead I use my own userid that
is in the Administrators group. I do copy my profile atop the
Administrator's profile (right-click My Computer, User Profiles, Copy
To, set permissions to Administrator for the profile, and do the copy)
so if I do need to use the Administrator userid then I get a familiar
desktop and Start menu (I had to relocate the My Documents folder to
eliminate copying it all into the Administrator's profile using this
method). I figure you always need a backup admin account, so I leave
the Administrator account alone (mostly). Actually, at one time, I had
both accounts using the same profile path through a registry edit (i.e.,
change their profile paths to point to the same one) but I figured that
if the profile got screwed up in one account then it was screwed in the
other and I preferred having separate but duplicated profiles as a
backup. I never encountered an error with sharing a profile across
multiple userids but I just didn't feel comfortable with it, always
expecting that something could happen to really fark me up.

If I rename the Administrator account to a different name (but with same
SID), will the Recovery Console still work (when it has you log under
"Administrator" which would now have a different name)? According to KB
# 243330, a SID of S-1-5-domain-500 is for the Administrator account, so
hopefuly the Recovery Console uses that one, too, regardless of whatever
it got renamed to.

Renaming Administrator to a different name is probably as far as I'd go
to provide some protection. I'd feel uncomfortable disabling the SID
for the standard Administrator account (whatever it was named) and using
alternate SIDs as administrator accounts (seems that I could do that
just by creating userids in the Administrators group and disabling the
Administrator account, however that's done). If, and I only say if
because I doubt that I would ever go that far, but because it's one of
those topics that pique interest (mostly in how to fathom how to fix
stuff), is there an official Microsoft info on how to do this. I don't
want to reveal anything that fledgeling hackers might find as a juicy
target for attack that Microsoft itself doesn't reveal.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top