Would you like to learn how to filter Windows event logs using Powershell to find who changed the user’s password on the domain? In this tutorial, we are going to show you how to find who changed the password of an account on the Active Directory.
• Windows 2012 R2
• Windows 2016
• Windows 2019
• Windows 2022
• Windows 10
• Windows 11
Equipment list
Here you can find the list of equipment used to create this tutorial.
This link will also show the software list used to create this tutorial.
Related tutorial – PowerShell
On this page, we offer quick access to a list of tutorials related to PowerShell.
Tutorial Powershell – Who changed the user password in Active Directory
On the domain controller, start an elevated Powershell command line.
List events related to the change of a user password.
Here is the command output.
Display the content of events related to the change of user passwords.
Here is the command output.
Display only the content of the event message.
Here is the command output.
Find who changed the password of users in the last 30 days.
Search for events related to the change of user passwords in a specific time interval.
List events related to the password change of a specific user account.
In our example, we filtered based on the event message content.
This Powershell script filters who changed the user password.
Here is the command output.
When a user changes his own password, the correct event ID is 4723.
Congratulations! You are able to find who changed a user password in the Active Directory using Powershell.