In this article:
Objective
Prerequisites
Steps to follow
Validation and confirmation
Tips
Related topics and articles
Objective
This article explains how to use ADAudit Plus to detect when the Directory Services Restore Mode (DSRM) password is changed, understand the security implications and immediate remediation steps, and implement long-term prevention strategies.
Prerequisites
You must have administrator access to the ADAudit Plus web console.
The necessary audit policy to generate Event ID 4794 (An attempt was made to set the Directory Services Restore Mode administrator password) must be enabled on all Domain Controllers. This requires enabling Policy Change > Audit Authorization Policy Change.
Steps to follow
The process for handling a DSRM Password Change involves detection, immediate remediation, and prevention.
Part 1: Detecting the event
Navigate to the Active Directory Tab > Attack Surface Analyzer > Threats > DSRM Password change.
This report shows all detections of the DSRM password being reset on a Domain Controller.
Part 2: Understanding the detection criteria
ADAudit Plus detects this event based on the following pattern:
Description: The Directory Services Restore Mode (DSRM) password was reset. The DSRM account is a powerful local administrator on a Domain Controller. Attackers with high privileges may change this password to create a persistent backdoor.
Detection Logic:
Event code equals 4794.
Subject Account Name does not end with $.
Part 3: Immediate remediation
An unauthorized DSRM password change is a high-privilege activity and should be treated as a critical security incident.
Verify Legitimacy: Immediately confirm with your Active Directory administration team if the DSRM password change was an authorized and scheduled maintenance activity.
Disable the Compromised Account: If the change was unauthorized, the DSRM Password Change report in ADAudit Plus will show the Subject Account Name that performed the action. This account has Domain Admin-equivalent privileges and must be disabled immediately for investigation.
Reset the DSRM Password: Immediately reset the DSRM password on the affected Domain Controller (and preferably all DCs) to a new, complex password known only to authorized personnel and store it securely.
Investigate the Initial Compromise: An attacker who can change the DSRM password already has significant control over your environment. A full forensic investigation is required to determine how they gained this level of access and what other actions they may have performed.
Validation and confirmation
After remediation, monitor the DSRM Password Change report in ADAudit Plus to ensure no new unauthorized changes are made.
The new, authorized DSRM password should be verified and securely documented in your password vault.
The investigation should confirm that the attacker's initial access vector has been identified and closed.
Tips
The following best practices are critical for preventing the abuse of the DSRM account.
Principle of Least Privilege (PoLP)
Restrict Domain Admin Rights: Strictly limit membership in privileged groups like Domain Admins and Enterprise Admins, as these are the accounts capable of changing the DSRM password.
Secure Privileged Accounts
Implement a Tiered Access Model: Prevent privileged accounts from being exposed on less secure systems by ensuring they are only used on servers of an equivalent or higher security tier (e.g., Tier 0 accounts on Tier 0 assets like DCs).
Use Privileged Access Management (PAM): Implement PAM solutions to control and monitor all administrative actions on Domain Controllers.
Monitoring and Policy
Treat All DSRM Changes as Alerts: Any DSRM password change (Event ID 4794) should be treated as a high-priority security alert. Legitimate changes are rare and should always follow a documented change management process.
Synchronize DSRM Passwords: Ensure DSRM passwords are synchronized across all Domain Controllers and are included in your secure password vaulting and rotation policies.
Related topics and articles
How to configure Attack Surface Analyzer in ADAudit Plus