Skip to main content
CUI

Vulnerability V-243479

Back

V-243479

CAT II

The Directory Service Restore Mode (DSRM) passwords must be changed on each Domain Controller (DC) at least annually.

Ships Affected
1
Total Findings
1
Open
0
Closed
0

Check Text

Verify the DSRM password for each DC is changed at least annually. If logs are retained locally for a sufficient amount of time to capture the log event, the following command will indicate the password reset: PS C:\> Get-WinEvent -FilterHashtable @{Logname='Security'; ID=4794} | Format-Table -Property TimeCreated, Message TimeCreated Message ----------- ------- 10/29/2025 4:47:12 PM An attempt was made to set the Directory Services Restore Mode... If logs are not available, review the site processes around DSRM password reset to determine compliance. If DSRM passwords are not changed for each DC in the domain at least annually, this is a finding.

Fix Text

Change the DSRM passwords on each DC at least annually with the following commands: C:\> ntdsutil C:\Windows\system32\ntdsutil.exe: Set DSRM Password Reset DSRM Administrator Password: Reset Password on server <servername> Follow prompts to reset the password.

STIG Reference

STIG
Active Directory Domain Security Technical Implementation Guide
Version
3
Release
7
Rule ID
SV-243479r1153403_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-DC-003/Checklist/MONT-DC-003_ADDomain_V3R5_20251023-171837.ckl
Unassigned 2026-01-14T12:57:36.435963 View in Context
CUI