Overview π₯
The Default Administrator Account Enabled actionable alert triggers when Liongard detects that the built-in Active Directory Administrator account (RID-500) is enabled during inspection. Because this account possesses unrestricted domain privileges and is commonly targeted during attacks, Liongard generates an alert whenever it is detected as enabled.
Example:
In some environments, partners may notice the alert repeatedly reopening even when:
The Administrator account is confirmed disabled
No configuration changes were made
The alert was previously acknowledged or resolved
This article explains why repeated alerts occur, how detection works, and how to permanently resolve unintended alert behavior.
How Liongard Detects This Condition π€
The alert evaluates the metric:
DefaultAdministratorEnabled
This metric checks only the built-in Administrator account, identified by:
Security Identifier ending in -500
Default domain administrative account
Liongard determines status based on the Active Directory attribute:
userAccountControl
Specifically:
Account State | Result |
ACCOUNTDISABLE flag present | False |
ACCOUNT enabled | True |
Inspection unavailable | Null |
Root Cause π
Repeated alerts are usually not caused by the account being enabled. Instead, they occur when Liongard inspections temporarily return a null metric value, which appears as a state change when alert rules use the Changed operator.
Example:
Common causes include:
Domain Controller query interruption
Active Directory replication delay
Agent communication timeout
Inspection parsing interruption
Cached inspection inconsistencies
When the next inspection succeeds:
null β false/true
Liongard interprets this as a change and reopens the alert.
Why Alerts Reopen After Resolution π§
Actionable Alerts are inspection-state based, not event-based.
If the alert rule uses:
Operator: Changed
ANY transition triggers a new alert:
null β false
false β true
null β true
Even when the Administrator account never changed.
Expected vs Unexpected Behavior π§
β Expected Scenarios
Alerts may be intentional when:
Administrator account is used as break-glass access
Legacy applications require RID-500 account
Security policy permits enabled fallback admin
β οΈ Unexpected Scenarios
Investigation is required if:
Account was recently enabled
Audit logs show Event ID 4722
Unauthorized privilege escalation suspected
Steps to Resolve π§βπ»
1οΈβ£ Confirm Administrator Account Status
Run on a Domain Controller:
Get-ADUser -Identity "Administrator" -Properties Enabled
Expected secure state:
Enabled : False/true
2οΈβ£ Validate Security Audit Logs (Optional)
Check enable/disable activity:
Get-WinEvent -FilterHashtable @{
LogName='Security';
ID=4722,4725
}Event ID | Meaning |
4722 | Account Enabled |
4725 | Account Disabled |
3οΈβ£ Verify Metric Output in Liongard
Navigate:
Admin β Inspectors β Active Directory β Select your Active Directory System β Data Print Explorer
Search:
DefaultAdministratorEnabled
Interpretation:
Result | Meaning |
False | Expected |
True | Account enabled |
Null | Likely alert trigger source |
4οΈβ£ Correct Alert Rule Configuration β (Most Important)
Navigate:
Admin β Actionable Alerts β Rules
If rule uses:
Operator: Changed
Clone and update to:
Operator: =
Threshold: True
β Alert now triggers only when account is actually enabled
After cloning:
Apply updated rule
Disable original rule
5οΈβ£ Run Inspector in Debug + Clear Cache Mode
This removes stale inspection results and stabilizes metric output.
Verify consistent results across multiple inspections.
6οΈβ£ Validate Liongard Agent Health
Confirm:
Admin β Agents β Select your agent
Agent Online
Recent heartbeat present
No inspection failures
Server validation:
Get-Service LiongardAgent
Expected:
Status : Running
When to Contact Liongard Support π¦
Contact support if:
Administrator account is disabled
No enable audit events exist
Metric repeatedly returns
nullAlerts persist after rule correction
Provide:
PowerShell validation output
Event Viewer logs
Data Print metric value
Alert configuration screenshot
Security Best Practice π
Microsoft security guidance recommends:
β
Disable built-in Administrator when possible
β
Rename RID-500 account
β
Use monitored emergency access accounts instead
Summary π€©
Repeated Default Administrator alerts are typically caused by:
β
Metric state transitions
β
Temporary inspection null values
β
Use of the Changed alert operator
Not actual account changes.
Recommended resolution:
Validate account state
Review metric output
Replace
Changedwith= TrueClear inspection cache
Confirm agent health
This ensures alerts trigger only for genuine security risk conditions.




