+3 votes
512 views
Recover Administrator password Windows Server 2022 | To reset

in WindowsServer by (551k points)
reopened | 512 views

1 Answer

+4 votes
Best answer

How to reset Administrator password in Windows Server 2022

One of the simplest and most used methods in the world to protect the information of a system is the use of passwords. Of course, these passwords must be complex to avoid using the current methods to discover them, when we manage a server with Windows Server 2022, the use of passwords must prevail even more since all roles, services are configured on the server and shared accesses with the entire domain..

 

If for some reason you have forgotten the administrator password in Windows Server 2022 , it is possible to reset it and TechnoWikis will explain how to do this in a functional way.

 

 

To stay up to date, remember to subscribe to our YouTube channel!   SUBSCRIBE

 

How to reset Administrator password in Windows Server 2022

 

Step 1

We must download the ISO image of Windows Server 2022 at the following link:

 

 Download Windows Server Insider Preview

 

Step 2

After this we record the image on a bootable DVD or USB and configure the server to boot from there directly in the BIOS or UEFI, when booting we will see the following:

 

image

 

 

Step 3

We click on "" Next "and then we will see this:

 

image

 

 

Step 4

There we click on "Repair computer" to see the following options:

 

image

 

 

Step 5

We click on "Troubleshoot" and we will see the following:

 

image

 

 

Step 6

In this case we click on "Command Prompt" to access the CMD console in advanced mode, in the console we enter ad: and use "dir" to list the content:

 

image

 

 

Note
in File Explorer this is drive C but in this mode it is named D.

 

 

Step 7

Now we are going to execute the following to deploy the system to use at startup:
 bcdedit / set {bootmgr} displaybootmenu yes 
image

 

 

Step 8

After this we configure how long the system selection will be visible:
 bcdedit / set {bootmgr} timeout 15 
image

 

 

Step 9

Now run "cd / windows / system32", there we are going to rename Utilman with the following command:
 ren utilman.exe utilman.bak 
image

 

 

Step 10

Now we are going to copy CMD to Utilman with the command:
 copy cmd.exe utilman.exe 
image

 

 

Step 11

What this does is allow the Utilman function (which is accessibility in Windows Server), to work as a CMD console to make changes to user profiles.
After this, we are going to list the content of CMD with the command:
 dir cmd.exe 
image

 

 

Step 12

Now we list the contents of Utilman with the command:
 dir utilman.exe 
image

 

 

Step 13

We exit the console with the "exit" command and then we will see the following window, there we click on "Continue":

 

image

 

 

Step 14

Windows Server 2022 and will start:

 

image

 

 

Step 15

We get to the lock screen:

 

image

 

 

Step 16

We use the following keys to unlock and at the bottom we click on the accessibility icon:

 

 

Ctrl + Alt + Del

 

 

 

image

 

 

Step 17

Clicking there will open a CMD console, there we enable the Administrator user:
 net user administrator / active: yes 
image

 

 

Step 18

After this we set the password with the syntax:
 net user administrator "password" 
image

 

 

Step 19

We exit with "exit" and then we enter the password created to access Windows Server 2022:

 

image

 

 

Step 20

We will have access to the system that is the objective:

 

image

 

With this process it is possible to reset the administrator password and have access to Windows Server 2022..

 


by (3.5m points)
Thanks for the Write-up, however, this has been patched by Microsoft in 2020. (UNFORTUNATELY) any other work arounds? I am in a real pickle after a ransomware attack. Took a week to rebuild this DC from scratch. after which we all thought it was best to rename and change the password for the Domain Admin user. Something went wrong between the person writing the new password on the whiteboard and the person entering it into the server. The local admin user is of course disabled.  How is it that these hackers are able to get this so easily and take down our entire network, but I am not even after  a weeks worth of trial and error.. SMH my server is 2016 BTW but it also has been patched.

Related questions

+4 votes
1 answer
+5 votes
1 answer
asked Nov 23, 2022 in WindowsServer by backtothefuture (551k points) | 38 views
+3 votes
1 answer
asked Oct 5, 2019 in Windows 10 by backtothefuture (551k points) | 251 views
+4 votes
1 answer
+3 votes
1 answer
Sponsored articles cost $40 per post. You can contact us via Feedback
10,633 questions
10,765 answers
510 comments
3 users