Start Using Windows LAPS

 🎯Stop Sharing Local Admin Passwords - Start Using Windows LAPS.

We just finished a clean rollout of Windows LAPS to our workstations and moved from “shared local admin creds” to unique, rotating passwords with delegated access.

💠Why we did it:
🔸 Stop shared local admin passwords.
🔸 Enforce least privilege (no “Domain Users” in local Administrators).
🔸 Give EUC Team/Helpdesk a safe, auditable way to view/rotate device-specific passwords.

💠What we implemented:
1. Tightened local Administrators with GPO Preferences → Local Users & Groups (Action = Replace). Only our support group + built-in Administrator remain.
2. Rolled out Windows LAPS with encryption enabled and delegated Read/Reset on the workstation OU.
3. Added EUC Team/Helpdesk to Authorized password decryptors in the LAPS GPO so they can decrypt in ADUC/PowerShell.
4. Validated rotation with Get-LapsADPassword + Reset-LapsPassword -Identity <PC>.

💠Exact steps that worked:
🔸 Prepare the admin box (Win10/11 or Server 2019/2022, fully updated):
Get-Module -ListAvailable LAPS (should exist); install AD RSAT if needed.
🔸 Local Admins policy (one GPO):
Administrators (built-in) → Replace, Members: <YourSupportGroup>, (optional) Domain Admins, Administrator (built-in).

🔸 LAPS policy (second GPO):
1. Enable password backup → Enabled → Active Directory.
2. Password settings → Enabled (Length ~20, Complexity On, Age 7–14 days).
3. Enable password encryption → Enabled.
4. Authorized password decryptors → add your EUC Team/Viewer groups.
5. (Optional) “Name of admin account to manage” → set if you use a custom local admin

🔸Delegate on the OU (PowerShell):
1.  Update-LapsADSchema
2.  Set-LapsADComputerSelfPermission -Identity "<OU DN>"
3.  Set-LapsADReadPasswordPermission  -Identity "<OU DN>" -AllowedPrincipals "<YourSupportGroup>"
4.  Set-LapsADResetPasswordPermission -Identity "<OU DN>" -AllowedPrincipals "<YourSupportGroup>"

💠Trigger + verify on a pilot PC:
🔸gpupdate /force ; Invoke-LapsPolicyProcessing -Verbose
🔸Get-LapsADPassword -Identity "<PC>" -AsPlainText
🔸Reset-LapsPassword -Identity "<PC>" (then read again—password/expiration change)

💠Results
🔸No broad local admin rights on endpoints.
🔸Unique, rotated passwords in AD, visible only to delegated roles.
🔸Clean handoff to EUC Team/Helpdesk with PowerShell/ADUC access and full auditability.
For more details👉https://is.gd/Bvd2QP
hashtag

Comments

Popular posts from this blog

VMware:- Esxi Log File Locations

ESX and vCenter Alarms

Convert VMware Snapshot into Memory Dump