Start Using Windows LAPS
- Get link
- X
- Other Apps
🎯Stop Sharing Local Admin Passwords - Start Using Windows LAPS.
We just finished a clean rollout of Windows LAPS to our workstations and moved from “shared local admin creds” to unique, rotating passwords with delegated access.
💠Why we did it:
🔸 Stop shared local admin passwords.
🔸 Enforce least privilege (no “Domain Users” in local Administrators).
🔸 Give EUC Team/Helpdesk a safe, auditable way to view/rotate device-specific passwords.
💠What we implemented:
1. Tightened local Administrators with GPO Preferences → Local Users & Groups (Action = Replace). Only our support group + built-in Administrator remain.
2. Rolled out Windows LAPS with encryption enabled and delegated Read/Reset on the workstation OU.
3. Added EUC Team/Helpdesk to Authorized password decryptors in the LAPS GPO so they can decrypt in ADUC/PowerShell.
4. Validated rotation with Get-LapsADPassword + Reset-LapsPassword -Identity <PC>.
💠Exact steps that worked:
🔸 Prepare the admin box (Win10/11 or Server 2019/2022, fully updated):
Get-Module -ListAvailable LAPS (should exist); install AD RSAT if needed.
🔸 Local Admins policy (one GPO):
Administrators (built-in) → Replace, Members: <YourSupportGroup>, (optional) Domain Admins, Administrator (built-in).
🔸 LAPS policy (second GPO):
1. Enable password backup → Enabled → Active Directory.
2. Password settings → Enabled (Length ~20, Complexity On, Age 7–14 days).
3. Enable password encryption → Enabled.
4. Authorized password decryptors → add your EUC Team/Viewer groups.
5. (Optional) “Name of admin account to manage” → set if you use a custom local admin
🔸Delegate on the OU (PowerShell):
1. Update-LapsADSchema
2. Set-LapsADComputerSelfPermission -Identity "<OU DN>"
3. Set-LapsADReadPasswordPermission -Identity "<OU DN>" -AllowedPrincipals "<YourSupportGroup>"
4. Set-LapsADResetPasswordPermission -Identity "<OU DN>" -AllowedPrincipals "<YourSupportGroup>"
💠Trigger + verify on a pilot PC:
🔸gpupdate /force ; Invoke-LapsPolicyProcessing -Verbose
🔸Get-LapsADPassword -Identity "<PC>" -AsPlainText
🔸Reset-LapsPassword -Identity "<PC>" (then read again—password/expiration change)
💠Results
🔸No broad local admin rights on endpoints.
🔸Unique, rotated passwords in AD, visible only to delegated roles.
🔸Clean handoff to EUC Team/Helpdesk with PowerShell/ADUC access and full auditability.
For more details👉https://is.gd/Bvd2QP
hashtag
💠Why we did it:
🔸 Stop shared local admin passwords.
🔸 Enforce least privilege (no “Domain Users” in local Administrators).
🔸 Give EUC Team/Helpdesk a safe, auditable way to view/rotate device-specific passwords.
💠What we implemented:
1. Tightened local Administrators with GPO Preferences → Local Users & Groups (Action = Replace). Only our support group + built-in Administrator remain.
2. Rolled out Windows LAPS with encryption enabled and delegated Read/Reset on the workstation OU.
3. Added EUC Team/Helpdesk to Authorized password decryptors in the LAPS GPO so they can decrypt in ADUC/PowerShell.
4. Validated rotation with Get-LapsADPassword + Reset-LapsPassword -Identity <PC>.
💠Exact steps that worked:
🔸 Prepare the admin box (Win10/11 or Server 2019/2022, fully updated):
Get-Module -ListAvailable LAPS (should exist); install AD RSAT if needed.
🔸 Local Admins policy (one GPO):
Administrators (built-in) → Replace, Members: <YourSupportGroup>, (optional) Domain Admins, Administrator (built-in).
🔸 LAPS policy (second GPO):
1. Enable password backup → Enabled → Active Directory.
2. Password settings → Enabled (Length ~20, Complexity On, Age 7–14 days).
3. Enable password encryption → Enabled.
4. Authorized password decryptors → add your EUC Team/Viewer groups.
5. (Optional) “Name of admin account to manage” → set if you use a custom local admin
🔸Delegate on the OU (PowerShell):
1. Update-LapsADSchema
2. Set-LapsADComputerSelfPermission -Identity "<OU DN>"
3. Set-LapsADReadPasswordPermission -Identity "<OU DN>" -AllowedPrincipals "<YourSupportGroup>"
4. Set-LapsADResetPasswordPermission -Identity "<OU DN>" -AllowedPrincipals "<YourSupportGroup>"
💠Trigger + verify on a pilot PC:
🔸gpupdate /force ; Invoke-LapsPolicyProcessing -Verbose
🔸Get-LapsADPassword -Identity "<PC>" -AsPlainText
🔸Reset-LapsPassword -Identity "<PC>" (then read again—password/expiration change)
💠Results
🔸No broad local admin rights on endpoints.
🔸Unique, rotated passwords in AD, visible only to delegated roles.
🔸Clean handoff to EUC Team/Helpdesk with PowerShell/ADUC access and full auditability.
For more details👉https://is.gd/Bvd2QP
hashtag
Activate to view larger image,
- Get link
- X
- Other Apps
Comments
Post a Comment