Windows doesn’t enable LAPS “by default,” but modern Windows and Active Directory include Windows Local Administrator Password Solution (Windows LAPS) as a built‑in feature that can be turned on and centrally managed.
Summary of how it works
- Purpose
- Windows LAPS automatically manages the password of a local administrator account on domain‑joined or Microsoft Entra‑joined devices.
- It regularly rotates the password and securely backs it up to either:
- Windows Server Active Directory, or
- Microsoft Entra ID.
- It helps protect against pass‑the‑hash and lateral‑movement attacks by ensuring each device has a unique, strong local admin password.
- Where it lives / prerequisites
- The LAPS client functionality is built into supported Windows versions (Windows 10/11 and Windows Server with the April 11, 2023 update or later).
- For storing passwords in Windows Server Active Directory:
- The AD schema must be prepared/extended for Windows LAPS attributes.
- Domain functional level (DFL) determines capabilities:
- DFL earlier than 2016: only clear‑text storage in AD (protected by ACLs), no password encryption, no DSRM account management.
- DFL 2016 with mixed DCs: supports encrypted storage for domain‑joined clients; DSRM management only for Server 2019+ DCs.
- DFL 2016 with only Server 2019+ DCs: full support (clear‑text or encrypted storage, plus DSRM account management).
- Basic architecture
- Managed device: runs the LAPS components (laps.dll, lapscsp.dll, lapspsh.dll) and applies policy via Group Policy or the LAPS CSP (MDM/Intune).
- Directory:
- Windows Server Active Directory: stores the LAPS password and metadata as attributes on the computer object.
- Microsoft Entra ID: alternative storage for cloud‑joined/hybrid devices.
- Admin tools: AD Users and Computers snap‑in (LAPS property page) and PowerShell cmdlets (for retrieval, history, and automation).
- How it works end‑to‑end with Active Directory a. Prepare Active Directory
- Copy the Windows LAPS Group Policy template to the Group Policy Central Store (if used).
- Extend the AD schema for Windows LAPS attributes (if not already done).
- Configure AD permissions so only authorized admins/groups can:
- Read/decrypt stored passwords.
- Force password expiration/rotation.
- Choose how to deploy policy:
- Group Policy (most common for AD‑joined devices), or
- Intune using the Windows LAPS CSP for hybrid‑joined devices.
- At minimum, set:
-
BackupDirectory = 2to back up passwords to Windows Server Active Directory.
-
- Account selection:
- If
AdministratorAccountNameis not configured, LAPS manages the built‑in local Administrator account (identified by its well‑known RID, not by name). - To manage a custom local admin account, set
AdministratorAccountNameto that account name and ensure the account exists (for example, via RestrictedGroups CSP). LAPS does not create the account.
- If
- Optional settings include password length, complexity, rotation interval, encryption principal, and post‑authentication actions.
- The LAPS client on each device periodically evaluates policy (Group Policy or CSP) during background policy refresh.
- When the password is due to expire (or is manually expired by an admin), LAPS:
- Generates a new random password according to policy.
- Sets the local administrator account password on the device.
- Writes the password and metadata (expiration time, history if enabled) to the computer object in AD.
- If encryption is enabled and supported by the domain, encrypts the password so only authorized principals (for example, Domain Admins or a specified group via
ADPasswordEncryptionPrincipal) can decrypt it.
- AD Users and Computers (LAPS property page) for a computer object allows authorized admins to:
- View current password expiration time.
- Modify or immediately expire the password expiration time.
- View/copy the current account name and password (if they have read/decrypt permissions).
- Note: this UI only shows the most recent password; older passwords (if history is enabled) require the
Get-LapsADPasswordPowerShell cmdlet.
- Intune and Azure Arc integration (optional)
- Intune can manage LAPS settings via endpoint security policies (Account protection) using the LAPS CSP, including:
- Password requirements.
- Rotation schedule.
- Backup to AD or Microsoft Entra.
- LAPS for Azure Arc (preview) extends centralized configuration/compliance for servers and clients connected via Azure Arc.
- Intune can manage LAPS settings via endpoint security policies (Account protection) using the LAPS CSP, including:
In short, Active Directory does not “auto‑configure” LAPS, but once AD is prepared and policy is configured, Windows LAPS becomes a built‑in, directory‑integrated solution that automatically rotates and stores local admin passwords on each domain‑joined device.
References: