V-243479
CAT IIThe Directory Service Restore Mode (DSRM) passwords must be changed on each Domain Controller (DC) at least annually.
- Ships Affected
- 1
- Total Findings
- 1
- Open
- 0
- Closed
- 0
Check Text
Verify the DSRM password for each DC is changed at least annually.
If logs are retained locally for a sufficient amount of time to capture the log event, the following command will indicate the password reset:
PS C:\> Get-WinEvent -FilterHashtable @{Logname='Security'; ID=4794} | Format-Table -Property TimeCreated, Message
TimeCreated Message
----------- -------
10/29/2025 4:47:12 PM An attempt was made to set the Directory Services Restore Mode...
If logs are not available, review the site processes around DSRM password reset to determine compliance.
If DSRM passwords are not changed for each DC in the domain at least annually, this is a finding.
Fix Text
Change the DSRM passwords on each DC at least annually with the following commands:
C:\> ntdsutil
C:\Windows\system32\ntdsutil.exe: Set DSRM Password
Reset DSRM Administrator Password: Reset Password on server <servername>
Follow prompts to reset the password.
STIG Reference
- STIG
- Active Directory Domain Security Technical Implementation Guide
- Version
- 3
- Release
- 7
- Rule ID
- SV-243479r1153403_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| USNS MONTFORD POINT | T-ESD-1 | _Reviewed/MONT-DC-003/Checklist/MONT-DC-003_ADDomain_V3R5_20251023-171837.ckl | Unassigned | 2026-01-14T12:57:36.435963 | View in Context |