Microsoft is offering the Local Administrator Password Solution (LAPS) that provides a solution to the issue of using a common local account with an identical password on every computer in a domain. LAPS resolves this issue by setting a different, random password for the common local administrator account on every computer in the domain. Domain administrators using the solution can determine which users, such as helpdesk administrators, are authorized to read passwords.
Compromised identical local account credentials could allow elevation of privilege if an attacker uses them to elevate from a local user/administrator to a domain/enterprise administrator. Local administrator credentials are needed for occasions when logon is required without domain access. In large environments, password management can become
complex, leading to poor security practices, and such environments greatly increase the risk of a Pass-the-Hash (PtH) credential replay attack.
LAPS simplifies password management while helping customers implement recommended defenses against cyberattacks. In particular, the solution mitigates the risk of lateral escalation that results when customers use the same administrative local account and password combination on their computers.
First, follow the link in the references to download the program and the Operations guide.
Follow the steps in the guide to install.
Here are my steps:
- Download the .msi
1a. Install only the management tools on the DC
1b. Run the same msi on clients, but install only the CSE
# What it does = installs two extended attributes to AD:
ms-Mcs-AdmPwd – Stores the password in clear text
ms-Mcs-AdmPwdExpirationTime – Stores the time to reset the password
- On the DC:
3a. To see rights:
Find-AdmPwdExtendedrights -identity :
3b. To remove rights:
Right Click on the OU that contains the computer accounts that you are installing this solution on and select Properties.
Click the Security tab
Select the Group(s) or User(s) that you don’t want to be able to read the password and then click Edit.
Uncheck All extended rights
Adding machine rights:
ex: Set-AdmPwdComputerSelfPermission -OrgUnit Workstations
Adding user rights:
-AllowedPrincipals ex: Set-AdmPwdReadPasswordPermission -OrgUnit Workstations -AllowedPrincipals contoso\Administrator,contoso\HelpDesk,contoso\PwdAdmins
Most important step = Deploy the GPO that sets the policy. The settings are located under Computer Configuration\Administrative Templates\LAPS.
# now showing up? Mine didn’t either thanks to my Central Store
open C:\Windows\PolicyDefinitions and copy admpwd.admx to C:\Windows\SYSVOL\domain\Policies\PolicyDefinitions\ admx
and C:\Windows\PolicyDefinitions\en-us\admpwd.adml to C:\Windows\SYSVOL\domain\Policies\PolicyDefinitions\en-us\
- Done. Wait for GPO’s to push to clients or run gpupdate /force to start testing!
#Clients must have the CSE installed and the GPO applied in order for LAPS to work!
Viewing the password:
In Powershell: Get-AdmPwdPassword -ComputerName
GUI: ADUC – Right Click – Attribute Editor tab – ms-Mcs-AdmPwd
If you have a Helpdesk Team with the required rights from step 5, you can have them install the management tools which includes the LAPS UI application: