NT AUTHORITY\SYSTEM Modified Default Domain Policy


we changed our account lockout policy back in march and our password policy first week of april. today, we realized changes weren't being enforced , when reviewing settings in default domain policy, noticed password , account lockout policy settings reverted original values had set years. after research found computer account (nt authority\system) on our pdc modified settings 1 week day after modified password policy. no ad restore done.

what cause computer account on pdc change password policy , account lockout policy settings back original settings we've been using years?

i've been combing through logs, forums, blogs, etc. hours looking answer , no luck yet, i'm hoping on here may have insight.


hi,

how many dc have in domain?

modify password group policy settings in 1 dc , check gpo status in dc, make sure modifications can replicated successfully.

> noticed password , account lockout policy settings reverted original values we
> had set years.

do mean revert system default values or defined values?

run below command , check result:

at command prompt, type below commend, , press enter

secedit /refreshpolicy user_policy /enforce

at command prompt, type below commend, , press enter

secedit /refreshpolicy machine_policy /enforce

for more information please refer following ms articles:

using secedit force group policy refresh immediately
http://support.microsoft.com/kb/227302



lawrence

technet community support



Windows Server  >  Group Policy



Comments

Popular posts from this blog

server manager error: ADAM.events.xml could not be enumerated.

Cannot access Anywhere Access using domain name?

WMI Failure: Unable to update Local Resource Group