In daily work, the saddest thing for a network administrator is to forget the local Administrator account password without an alternate administrator account and password recovery disk.
In an earlier system, it was possible to use many of the Windows PE discs in the country to solve this problem. However, for Windows Server 2008 R2, it is not possible to solve the password problem by simply doing these things.
However, by replacing the file, you can use a workaround to add a local administrator account or modify the Administrator account password, using the command prompt line, if you are bypassing the login.
The specific method of operation is:
First, use the Windows Server 2008 R2 installation CD to boot the computer. After completing the installation image load, enter the language selection interface, press "SHIFT+F10", open the command prompt interface, enter the partition where the Windows directory is located (if Windows is installed by default, and use the system reservation partition, then D), and set to "Windows\" System32 "directory (Figure 1).
Find the "Osk.exe" file in the directory and delete it (Figure 2).
Third, rename the "Cmd.exe" in the current directory to "Osk.exe" (Figure 3).
Four, restart the computer, waiting for startup completed, click on the lower left corner of the "Easy access" button, in the pop-up dialog box check "Do not use the keyboard typing (screen Keyboard)", and click "OK" (Figure 4).
As a result of the previous file replacement, so now will not open the Screen keyboard, but the cmd command prompt interface (see Figure 5).
Use the Net user command to modify the password for the local Administrator account (Figure 6).
Note: If you are unsure of the administrator account name, you can create a new user here and add it to the local Administrators group, as follows:
NET Users Adminuser P@ssw0rd/add
net localgroup Administrators Adminuser/add
Use the local admin account and the modified password for normal login (Figure 7).
Eight, to be able to log in successfully, Proof password modification effective (as shown in Figure 8).
When you're done, you can recover the Osk.exe from other Windows Server 2008 R2 computers, copy it to the current computer, replace the file that Cmd.exe modified.
Note: The default is normal
Osk.exe
can only be deleted and cannot be replicated, so copy
Osk.exe
must first be on its
NTFS
permission to modify the line.
Finally, it is possible that, over time, Microsoft will patch up such modifications to the local admin password in the form of an upgrade patch, so it is still recommended that you set up an alternate administrator account or use a password recovery disk to operate.
This article from the "Fat Brother Technology Hall" blog