Tag: server administration

  • How to Change Windows Server 2022 Administrator Password Using a Bootable USB Made with Ventoy (Utilman.exe Method)

    If you’ve forgotten the administrator password for your Windows Server 2022, you can reset it by replacing the Utilman.exe file with Command Prompt using a bootable USB drive created with Ventoy. This method allows you to bypass the login screen and reset the password directly. In this guide, we’ll walk you through the steps to change the Windows Server 2022 administrator password using a Ventoy bootable USB drive and the Utilman.exe method.


    What You’ll Need

    1. A working computer with internet access.
    2. A USB flash drive (at least 8GB).
    3. VentoyDownload Here
    4. A Windows Server 2022 ISO file: Download Here

    Step 1: Create a Ventoy Bootable USB Drive

    1. Download and install Ventoy on your working computer.
    2. Insert the USB flash drive into your computer.
    3. Open Ventoy and select your USB drive under the Device dropdown.
    4. Click Install to set up Ventoy on the USB drive.
    5. Copy the Windows Server 2022 ISO file to the USB drive.

    Step 2: Boot from the Ventoy USB Drive

    1. Insert the Ventoy USB drive into the locked Windows Server 2022 machine.
    2. Restart the server and enter the BIOS/UEFI settings (usually by pressing F2F12Del, or Esc during boot).
    3. Change the boot order to prioritize the USB flash drive.
    4. Save changes and exit the BIOS/UEFI settings.

    Step 3: Access Command Prompt via Utilman.exe Replacement

    1. Boot into the Ventoy USB drive and select the Windows Server 2022 ISO.
    2. On the Windows Setup screen, press Shift + F10 to open Command Prompt.
    3. Identify the Windows installation drive:Copydiskpart list volume exit
      • Look for the drive labeled “Windows” (e.g., C:).
    4. Navigate to the System32 folder:
      cd C:\Windows\System32
    5. Rename Utilman.exe to Utilman.exe.bak:
      ren Utilman.exe Utilman.exe.bak
    6. Copy cmd.exe and rename it to Utilman.exe:
      copy cmd.exe Utilman.exe
    7. Close Command Prompt and restart the server:
      wpeutil reboot

    Step 4: Reset the Administrator Password

    1. On the Windows Server 2022 login screen, click the Ease of Access icon (or press Win + U).
    2. This will open Command Prompt since Utilman.exe has been replaced.
    3. Reset the administrator password:
      net user Administrator NewPassword
      • Replace Administrator with the username of the account you want to reset.
      • Replace NewPassword with your desired password.
    4. Close Command Prompt and log in using the new password.

    Step 5: Restore Utilman.exe

    1. After logging in, open Command Prompt as an administrator.
    2. Navigate to the System32 folder:
      cd C:\Windows\System32
    3. Delete the replaced Utilman.exe:
      del Utilman.exe
    4. Restore the original Utilman.exe:
      ren Utilman.exe.bak Utilman.exe

    Step 6: Secure Your Server

    1. After regaining access, consider enabling additional security measures, such as:
      • BitLocker for drive encryption.
      • Multi-factor authentication for remote access.
      • Regular password updates.
    2. Keep a secure record of your passwords to avoid future lockouts.

    Conclusion

    Changing the Windows Server 2022 administrator password using a Ventoy bootable USB drive and the Utilman.exe method is a powerful way to regain access to your server. By following the steps outlined in this guide, you can bypass the login screen and reset the password directly. Ventoy’s flexibility makes it an excellent tool for managing multiple bootable ISOs, including Windows Server 2022.

    If you found this guide helpful, feel free to share it with your peers or leave a comment below with your thoughts or questions. Happy troubleshooting!

    About the Author:

    Ali Asad is a network engineer and tech enthusiast with a passion for sharing knowledge about networking, cybersecurity, and IT infrastructure. Follow [Your Blog/Social Media] for more tips and tutorials!