NT AUTHORITY\SYSTEM Modified Default Domain Policy
we changed our account lockout policy back in march and our password policy first week of april. today, we realized changes weren't being enforced , when reviewing settings in default domain policy, noticed password , account lockout policy settings reverted original values had set years. after research found computer account (nt authority\system) on our pdc modified settings 1 week day after modified password policy. no ad restore done.
what cause computer account on pdc change password policy , account lockout policy settings back original settings we've been using years?
i've been combing through logs, forums, blogs, etc. hours looking answer , no luck yet, i'm hoping on here may have insight.
hi,
how many dc have in domain?
modify password group policy settings in 1 dc , check gpo status in dc, make sure modifications can replicated successfully.
> noticed password , account lockout policy settings reverted original values we
> had set years.
do mean revert system default values or defined values?
run below command , check result:
at command prompt, type below commend, , press enter
secedit /refreshpolicy user_policy /enforce
at command prompt, type below commend, , press enter
secedit /refreshpolicy machine_policy /enforce
for more information please refer following ms articles:
using secedit force group policy refresh immediatelyhttp://support.microsoft.com/kb/227302
lawrence
technet community support
Windows Server > Group Policy
Comments
Post a Comment