Getty Images/iStockphoto
Local administrator passwords are challenging from a security standpoint, but an updated feature in Windows can reduce the worry associated with this administrative need.
Nearly every Windows device contains a local administrator account -- that's a basic security problem. These accounts are necessary for an admin to log in to the device to correct a problem connecting to AD. Organizations that want more security around these credentials can use the Windows Local Administrator Password Solution (LAPS), which automates password management of the local administrator account tokeep the environment more secure. Microsoft updated this feature in April 2023 to make it a native part of the Windows OS. This article covers improvements made in Windows LAPS, methods to deploy it and considerations when migrating from the earlier LAPS version.
Windows LAPS automatically manages and rotates the local administrator password on domain-joined Windows devices for Windows Server and the client OS. Microsoft developed the security measure to protect organizations from various attacks, such aspass the hash.
Local administrator password rotation is critical because, if an attacker accesses a nonmanaged local administrator password, they could use it to breach all domain-joined devices. Worse still, these passwords tend to be static, so an attacker could potentially use them to gain permanent access to an organization's resources.
Windows LAPSgenerates complex passwords for the local administrator account and rotates them on a schedule from seven to 365 days based on the configuration.
When admins need to access a device, they get the current password from AD or the cloud-based identity and access management platform Microsoft Entra ID, formerly known as Azure Active Directory. The admin then logs in as the local administrator. For added security, Windows LAPS can rotate the password automatically after use.
Since April 2024, Microsoft integrated Windows LAPS with the Windows OS.
Microsoft has made significant enhancements to Windows LAPS in recent years. The company deprecated its earlier version -- the company refers to this as legacy Microsoft LAPS -- as of Windows 11 23H2 in favor of this update.
Here are some of the enhancements in Windows LAPS:
Windows LAPS and legacy Microsoft LAPS cannot manage the same account on the same machine. Microsoft recommends switching systems to Windows LAPS. However, there are some considerations:
Windows LAPS works on the following Windows OSes with the April 11, 2023, update or later installed:
Windows Server 2025, released in November 2024, also supports Windows LAPS.
Microsoft includes Windows LAPS as part of the Windows OS -- added through Windows Update -- rather than requiring a separate download.
There are several key differences between Windows LAPS and legacy Microsoft LAPS, including the following:
Before you can migrate from legacy Microsoft LAPS, some prep work is necessary. You start by identifying the machines using the legacy version and then verifying they run an OS that is compatible with Windows LAPS. It's also a good idea to ensure those systems have the latest patches.
Next, prepare theAD infrastructure. You must update the schema -- the definition of the structure of the database -- because Windows LAPS adds new attributes to AD. Back up the AD environment, and then extend the schema using theUpdate-LapsADSchemacmdlet. You might need to apply some permissions using theSet-LapsADComputerSelfPermission cmdlet, which gives the computer account the ability to update Windows LAPS password attributes and also enables password rotation.
Next, decide if you want to allow coexistence between legacy Microsoft LAPS and Windows LAPS or if you want to perform a cutover migration. At a minimum, you must enable and configure the Windows LAPS Group Policy settings. If you disable legacy Microsoft LAPS, then you must set the legacy Microsoft LAPS Group Policy settings to "not configured." Only do this after you have verified Windows LAPS is working.
Next, verify that passwords are being stored correctly with the following PowerShell command.
Get-LapsADPassword -Identity <ComputerName>
Next, delete the machine's local administrator password and expiration data in AD with the following command.
Set-ADComputer -Identity "ComputerName" -Clear "ms-Mcs-AdmPwd","ms-Mcs-AdmPwdExpirationTime"
To remove these attributes from multiple machines in an organizational unit (OU), adapt the following PowerShell command to your infrastructure.
Get-ADComputer -Filter * -SearchBase "OU=Computers,DC=domain,DC=com" | Set-ADComputer -Clear "ms-Mcs-AdmPwd","ms-Mcs-AdmPwdExpirationTime"
There are two options to deploy Windows LAPS. The first is touse Intune to create a LAPS policy that admins push to managed Windows devices.
The other option is to push LAPS settings to managed devices using Group Policy, which is only appropriate when managing domain-joined Windows devices.
From the Microsoft Intune admin center, go to theEndpoint security tab tocreate the policy for Windows LAPS.
Click onAccount protection and then theCreate Policy link.
The interface displays a prompt to choose a platform and a profile.
Set the platform toWindows and the profile toLocal Admin Password Solution (Windows LAPS).
ClickCreate.
When prompted, give the profile a name.
ClickNext to move to theConfiguration settings screen.
Specify the desired backup directory,password length and complexity requirements, and other relevant settings.
ClickNext to advance to theScope Tags tab.
Select a custom scope tag -- if one exists -- or the default one.
ClickNext to open theAssignments tab.
Select the group to which you want to apply the policy.
Set theTarget Type toInclude orExclude, depending on whether you want the group included in the policy.
ClickNext to advance to theReview + Create screen.
Take a moment to review the settings shown on this screen. If everything looks good, click theCreate button to build the policy.
You can use Group Policy settings to push Windows LAPS settings to domain-joined devices, but you must first prepare AD by extending the schema to support Windows LAPS and provide the necessary permissions.
It's a good idea toback up AD to roll back the changes if necessary.
Next, open an elevated PowerShell session on your domain controller, and then enter the following command to update the AD schema.
Update-LapsADSchema
If an error about the command not being recognized appears, check that the server has all available updates, and confirm its role as a domain controller.
Next, configure Windows LAPS.
Grant the domain-joined computers permission to use Windows LAPS. The easiest way is to grant permission to theComputers container in AD. The command syntax varies depending on yourAD structure. In the case of a single domain forest with the name poseylab.com, the PowerShell command is the following.
Set-LapsADComputerSelfPermission -Identity "CN=Computers,DC=poseylab,DC=com"
Use Group Policy Management Editor to find the LAPS-related Group Policy settings in the Computer Configuration > Policies > Administrative Templates > System > LAPS section.
Configure the policy settings to meet your organization's needs.
Passwords for local administrator accounts are not going away, so the updated Windows LAPS is Microsoft's attempt to make the best of the situation. This automated process is an improvement on the legacy Microsoft LAPS system, so it is worthwhile to see if it works for your organization.
Brien Posey is a former 22-time Microsoft MVP and a commercial astronaut candidate. In his more than 30 years in IT, he has served as a lead network engineer for the U.S. Department of Defense and a network administrator for some of the largest insurance companies in America.
AI is transforming PaaS with automation and cost-efficient features, but will it eventually replace cloud platforms? Industry ...
Even though Q-Day might be several years away, enterprises should develop a strategic plan to prepare for the future. Experts ...
Businesses can find security vulnerabilities when they push their workloads to the edge. Discover the pitfalls of cloud edge ...
There are many ways to reset a desktop, and resetting from BIOS is perhaps the most drastic of these options. Learn how this ...
While MSI was the preferred method for distributing enterprise applications for decades, the MSIX format promises to improve upon...
While they have some disadvantages, in-place Windows upgrades can deliver a smooth transition between the OSes with minimal IT ...
While there are many technologies that allow for remote desktop access and management, IT administrators can use VNC on Macs to ...
When an admin needs to change the RDP port from its default to a different one, they can perform this process and many others via...
There are numerous options for thin client hardware including dedicated thin clients and retired PCs, but the evolution of ...