How to Find Out Last Password Change in Active Directory Server 2016/2019.

Last updated on October 25th, 2020

If you want to find out the last password change for a user in Active Directory then continue reading this tutorial. This article contains instructions on how to view in Active Directory when a user last changed their password.

How to View the Last Password Change for a User in Active Directory 2019/2016/2012.

Method 1. Find Out the Last Change of User Password from Windows GUI.

If you need to find out the date of the last password change of a user in Active Directory:

1. Open Active Directory Users and Computers
From View menu, click Advanced Features.

How to Find Last Password Change in Active Directory Server 2016


3. Select the Users group on the left pane.
4. At the right pane, right-click at the user you want to view the last password change and select Properties.

View Last Password Change in Active Directory


5. At 'User Properties' window, select the Attribute Editor tab.
6. Now scroll down to pwdLastSet attribute, to find out when a password was changed for last time.




Method 2. Check the Latest User Password Change from Command Prompt.

The next method to see when a password was changed for a user, is to give the following command in Command Prompt or in PowerShell.

  • net user AccountName

* Note: Where "AccountName" = the name of the domain user that you want to view the Password last set.

Check password change command prompt



That's it! Let me know if this guide has helped you by leaving your comment about your experience. Please like and share this guide to help others.

If this article was useful for you, please consider supporting us by making a donation. Even $1 can a make a huge difference for us in our effort to continue to help others while keeping this site free:

We're hiring

We're looking for part-time or full-time technical writers to join our team! It's about a remote position that qualified tech writers from anywhere in the world can apply. Click here for more details.