Event ID 4794 represents a critical security audit event that Windows generates whenever the Directory Services Restore Mode administrator password undergoes modification attempts. This event serves as a cornerstone for monitoring one of the most privileged accounts in a Windows domain environment.
The DSRM administrator account exists independently of Active Directory and provides emergency access when domain controllers boot into Directory Services Restore Mode. This special boot mode allows administrators to perform offline maintenance, restore AD databases, or recover from catastrophic failures. Because the DSRM account operates outside normal AD security boundaries, its password changes require meticulous tracking.
Windows logs this event in the Security log with detailed information including the security identifier (SID) of the account performing the operation, the target domain controller name, and precise timestamp data. The event fires during both successful and failed password change attempts, providing comprehensive audit coverage for compliance frameworks like SOX, HIPAA, and PCI-DSS.
In modern Windows Server 2025 environments, this event integrates with Advanced Threat Analytics and Microsoft Defender for Identity to detect anomalous DSRM password changes that might indicate privilege escalation attacks or insider threats targeting domain infrastructure.