I ran the tool against a list of computers in AD. Several of them were DC's. When it completed it had changed the Domain Administrator password? None of the servers have a "Local" Administrator account, just AD. How did the tool change the AD account?

Bulk Password Reset changed the Domain Admin account?
Started by
Doug
, Jul 02 2014 04:31 PM
2 replies to this topic
#1
Posted 02 July 2014 - 04:31 PM
#2
Posted 02 July 2014 - 05:08 PM
Doug,
When I attempt to test this I get access denied for all of my domain controllers (I assume because the account is privileged), but why add domain controllers to the list? And if it did indeed change the domain\administrator account then it is working as intended. I would just remove the DCs from your list.
-Jeff
When I attempt to test this I get access denied for all of my domain controllers (I assume because the account is privileged), but why add domain controllers to the list? And if it did indeed change the domain\administrator account then it is working as intended. I would just remove the DCs from your list.
-Jeff
#3
Posted 02 July 2014 - 05:11 PM
Doug,
When I attempt to test this I get access denied for all of my domain controllers (I assume because the account is privileged), but why add domain controllers to the list? And if it did indeed change the domain\administrator account then it is working as intended. I would just remove the DCs from your list.
-Jeff
Yep, I yanked them right after that little snafu! But I thought that this program only touched the "LOCAL" accounts, not AD accounts?