Local Administrator Password Solution (LAPS)

Local Administrator Password Solution (LAPS)

In the past, a company-specific standard was usually always used for local administrator passwords. But what do you do if an employee who knows the default password leaves the company?

Right, it should be changed. In the past, Group Policies (GPO) were often used for this, even if the password was in clear text in SysVol. This was fortunately stopped by Microsoft. What other solutions are available? In practice I have seen VBS or PowerShell scripts, the good ones have random passwords, the bad ones only a standard.

But isn’t there a well designed solution from Microsoft? Yes, there is, Local Administrator Password Solution (LAPS).

b2937acbe3bd47b1ae8aa8f7e767f396 Local Administrator Password Solution (LAPS) 2

Why the effort?

Some customers I’ve been to before used default passwords for local admin accounts because it’s easy. Once stored in the image, done. But when can this become a problem? Here is my personal top-3 why this is a bad idea:

  • Employees leave the company and know these passwords…
  • If all passwords are the same, a lateral pass-to-hash attack is simplified in case of infection or attack.
  • If you have to give a password to the user (yes, shouldn’t happen, but it can happen), then the user only knows that for his computer (And changing it can be triggered prematurely via PowerShell).

Other reasons and requirements (e.g. German Federal Office for Information Security (IT-Grundschutz)) are sufficient. Mostly local administrator passwords are not changed because it is too much work. This also changes with LAPS.

How does it work?

LAPS is a service that is installed on the respective computers. This service writes its information to 2 attributes of the computer object. These attributes must be installed with a schema extension and are automatically protected by ADDS-ACL. The extension is done by a provided PowerShell script.

The client / service is delivered as MSI package and can be done via command line or with a software distribution.

The administration is done with an own PowerShell module or an installable GUI. The control over the clients is done via group policies. The GPO can then also be used to set the policies for Local Admin passwords, for example password length or maximum age.

To monitor the whole thing, the log behavior and the audit function can be adjusted. The corresponding events are logged in the Event Log.

Which systems are supported?

I always talk about a client, but for which systems can the LAPS client be used? Quite simply, more than you might think, any x86 or x64 Windows currently supported by Microsoft that is a member of a Windows domain. The Active Directory requirement is similarly low, the domain controllers must be running Windows Server 2003 SP1 or higher. The functional level of the domain should also be 2003.

How do I install it now?

During a normal installation of the MSI, the management tools can be selected. Normally they are not installed. This includes the PowerShell scripts for the propagation of AD.

The installation of the management tools is very easy.

041917 0532 LocalAdmini1 Local Administrator Password Solution (LAPS) 4
041917 0532 LocalAdmini2 Local Administrator Password Solution (LAPS) 6
041917 0532 LocalAdmini3 Local Administrator Password Solution (LAPS) 8
041917 0532 LocalAdmini4 Local Administrator Password Solution (LAPS) 10
041917 0532 LocalAdmini5 Local Administrator Password Solution (LAPS) 12

After the installation, the PowerShell must be used to prepare the AD. To do this, start the PowerShell with a user that is included in the Schema Admins group and run the following commands

Import-Module AdmPwd.PS

041917 0532 LocalAdmini6 Local Administrator Password Solution (LAPS) 14

If necessary, the permissions on the attributes can also be adjusted manually, for example to give the help desk access only to the passwords of the client computers. See the LAPS documentation for details.

In order for the LAPS client to be able to enter the new passwords when using the GPO, they must also be authorized. Without these rights, the passwords will not be changed. To do this, execute the command and replace with the corresponding OU name.

Set-AdmPwdComputerSelfPermission <OU>

In order to be able to control the whole thing via group policy, the ADMX and the ADML file must be copied, preferably to the central storage for group policies. If you don’t have a Central Store for GPO’s yet, it’s high time. The files you need to copy can be found after installation under “%SystemRoot%\PolicyDefinitions” the file name is “AdmPwd.admx” or “en-US\AdmPwd.adml”.

You can then configure LAPS via Group Policy.

041917 0532 LocalAdmini7 Local Administrator Password Solution (LAPS) 16

Installation of the LAPS client

For LAPS to work, the appropriate MSI package must be installed in addition to the policy. If you don’t have a software distribution, you can also do this via a scheduled task using group policies. Or classic via a command line command, e.g:

msiexec /i \\server\Freigabe\LAPS.x64.msi /quiet

If you would like the LAPS not to be listed under “Programs and Functions”, you can also distribute and register the DLL. See the LAPS documentation for details.

After the next GPUpdate the Admin Password will be changed accordingly.

How can I view the password?

Simply start the GUI and select the computer name.

LAPS GUI Local Administrator Password Solution (LAPS) 18

Alternatively the PowerShell command can be used, here a placeholder also works.

Get-AdmPwdPassword -ComputerName Win10Ent

Update 4.6.2019

Appropriately, the article “Using and auditing PowerShell scripts with Local Administrator Password Solution (LAPS)” was published on June 4, 2019.  The translation of this article was published on the 25th July 2019 at LinkedIn. Please read the article on LinkedIn.

This article first appeared on Infrastrukturhelden.de in German.

This article is a translation of the Infrastrukturhelden.de article “Local Administrator Password Solution (LAPS)” (Published – 2017-04-19). Links may refer to other Infrastrukturhelden.de articles, these may also be available in English language.

Fabian Niesen has been working as an IT consultant for years. Here he writes privately and independently of his employer. Among others he is certified as MCSA Windows Server 2008 / 2012, MCSA Office 365, MCSA Windows 10, MCSE Messaging, MCT and Novell Certified Linux Administrator. Since 2016 he is also MCT Regional Lead for Germany. His hobbies are social media, blogging, medieval markets, historical songs and house building.