EdTech IRL

EdTech IRL

Share this post

EdTech IRL
EdTech IRL
Windows LAPS
Copy link
Facebook
Email
Notes
More
User's avatar
Discover more from EdTech IRL
Anything K12 edtech is fair game - instructional, infrastructure, incident response, tools, tips, tricks, deployment, data privacy, diagnostics, etc., etc. Any opinions are our own and do not represent the opinions of any organization or corporation.
Already have an account? Sign in
Intune

Windows LAPS

Managing the Built-in Admin Password with Intune and the new Windows LAPS

Andy Lombardo's avatar
Andy Lombardo
May 12, 2023

Share this post

EdTech IRL
EdTech IRL
Windows LAPS
Copy link
Facebook
Email
Notes
More
Share

During the first year of our district’s 1:1 initiative back in 2014, we saw a good example of how persistent students can be when we found that a kiddo had removed a hard drive from their device, connected to their own computer, and used L0phtCrack to crack the local administrator password on the device. Since we were manually managing our devices, all of the local administrator passwords has been set by hand, and they were identical on all 3500 devices. The combination of reusing the password and having a simple enough password that could be hand-entered en masse was a double-whammy, and also incredibly hard to remediate with all of the deployed devices.

In the years since, we’ve lived and learned. With on-prem AD, Microsoft LAPS - short for Local Administrator Password Solution - was a solution for using Active Directory to automatically set unique local administrator passwords on devices, but in our transition to Azure AD, we’ve looked at third party solutions like Cloud LAPS, but starting with the Windows update released on Patch Tuesday last month, Windows is including LAPS as a built-in part of Windows. With LAPS built-in, setting it up for Azure AD is a snap in Intune.

Setting up Windows LAPS with Intune

  1. Sign in to the Intune Admin Center (intune.cmd.ms) and navigate to Endpoint Security —> Account Protection —> Create Policy. On the Create a profile blade, choose Windows 10 and later for the Platform, and under Account Protection choose Local admin password solution (Windows LAPS) and click Create.

  1. Give the Profile a name and description and click Next

  1. Under Configuration Settings, select the configuration that makes the most sense for your environment. For an AAD/Intune environment, backing up the password to Azure AD makes the most sense. This Backup Directory refers to where the password will actually be managed and can be viewed from. The default for password rotation is 30 days, which is fine for me. For password complexity, I reference the Hive Systems Password table

  2. Select a scope if appropriate

  3. On the assignments tab, apply the LAPS policy to the group you want to manage local administrator passwords for. While there isn’t much that can go wrong that would need to be remediated, it’s always a good idea to test with a sample user or group first. After I was confident that everything worked as expected, I revised the policy to push to all devices. As LAPS is tied to the local administrator account for the machine, I definitely recommend using Device Groups as opposed to User Groups.

    Since the appropriate Windows update for LAPS was just released, the policy has only been successfully applying as devices pull the correct Windows update.

  1. Review and create policy.

    Checking a Device’s Local Admin Password in LAPS

    Now that the Intune policy has pushed and the magic has happened, you can check a device’s local administrator password from Azure AD. From the AAD Manage —> Devices tab, select Local Administrator Password Recovery

From the Local Administrator Password Recovery screen, you can search for device.

Clicking the “Show local administrator password” link will bring up a blade like below where you can view the local admin password in clear text. You can also see when that password was set, and when its set for rotation.

Further Reading

Manage Windows LAPS with Microsoft Intune policies | Microsoft Learn | https://learn.microsoft.com/en-us/mem/intune/protect/windows-laps-overview?source=recommendations


Subscribe to EdTech IRL

Launched 3 years ago
Anything K12 edtech is fair game - instructional, infrastructure, incident response, tools, tips, tricks, deployment, data privacy, diagnostics, etc., etc. Any opinions are our own and do not represent the opinions of any organization or corporation.

Share this post

EdTech IRL
EdTech IRL
Windows LAPS
Copy link
Facebook
Email
Notes
More
Share

Discussion about this post

User's avatar
Mass Deployment of AutoPilot From Scratch (Zero Touch USB - Updated for 2023)
Create a bootable USB drive that will wipe a device, install windows, provision the device, and enroll it into AutoPilot... with barely any user…
Apr 13, 2022 • 
Brady Widener
3

Share this post

EdTech IRL
EdTech IRL
Mass Deployment of AutoPilot From Scratch (Zero Touch USB - Updated for 2023)
Copy link
Facebook
Email
Notes
More
55
Getting a list of last logged on users for an Intune Device
Solving a common K-12 problem using the Microsoft Graph API!
Nov 28, 2023 • 
Brady Widener

Share this post

EdTech IRL
EdTech IRL
Getting a list of last logged on users for an Intune Device
Copy link
Facebook
Email
Notes
More
14
Set it and Forget it: Daily Silent Update of All Your Winget Apps
Clicking "Yes" on UAC 1,000 times not required
Sep 16, 2024 • 
Andy Lombardo
2

Share this post

EdTech IRL
EdTech IRL
Set it and Forget it: Daily Silent Update of All Your Winget Apps
Copy link
Facebook
Email
Notes
More
1

Ready for more?

© 2025 EdTech IRL
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More

Create your profile

User's avatar

Only paid subscribers can comment on this post

Already a paid subscriber? Sign in

Check your email

For your security, we need to re-authenticate you.

Click the link we sent to , or click here to sign in.