Cyber SecurityMicrosoft Entra IDMicrosoft Technologies

How to Configuring Windows LAPS with Entra ID using Microsoft Intune ?

In my previous blog post, I illustrated the process of enabling Windows LAPS with Entra ID using Group policies. In that discussion, we focused on devices that are Hybrid Entra ID Joined. Another approach to configuring the Windows LAPS settings is through Microsoft Intune. If the corporate devices are already managed using Microsoft Intune, we can effortlessly create a Windows LAPS policy to configure the Windows LAPS settings on endpoints.

In this blog post, I am going to demonstrate how we can set up Windows LAPS policy using Microsoft Intune.

Prerequisites

1. Devices need to be successfully onboard to Microsoft Intune.

2. Need a user account with appropriate permissions to set up and manage Windows LAPS Intune policy. By default, the relevant permissions are granted to Endpoint Security Manager built-in role. Also, you can use a custom role with appropriate permissions explained here.

3. Local Administrator Password Solution (LAPS) (Preview) feature should be enabled.

Enabling Windows LAPS feature in Azure AD

To enable this feature to follow the steps in my previous blog post https://www.rebeladmin.com/2023/06/how-to-configure-windows-laps-with-azure-ad/

After ensuring that all the prerequisites have been met, the next step is to create a Windows LAPS policy.

Create Windows LAPS Policy

To create policy,

1. Log in to https://endpoint.microsoft.com/ as Endpoint Security Manager or a user who has appropriate permissions to create LAPS policy.

2. Go to Endpoint security | Account protection | + Create Policy

Starting new LAPS policy

3. In the policy window select Windows 10 and later as Platform and Local admin password solution (Windows LAPS) (preview) as Profile. Then press Create

creating Local admin password solution (Windows LAPS) (preview) profile

4. In the policy wizard, define Name for the policy and click on Next

Define policy name

5. In the configuration window, make sure to select Backup the password to Azure AD only option under Backup Directory. After that can configure the rest of the settings according to IT requirements. These settings are similar to what you can configure from GPO. For my demo environment, I have defined the following settings,

Password Age – 7 days
Administrator Account Name – la1
Password complexity – Large letters + small letters + numbers + special characters
Password Length – 14

Note – If you are going to use a custom administrator account, make sure the account already exists in the endpoints as a local administrator. If the account does not exist, The policy will not create the account.

Define LAPS policy settings

6. Keep the default in the Scope tags page and click Next.

7. In Assignments, define the policy targets. You can choose a specific device group for this or else use + Add all devices option.

Define policy targets

8. In the Review + create page, review the policy settings and click on Create to complete the policy configuration.

Testing

Once the policy is pushed out, you can see the policy status from the policy overview page.

To do that you can click on the newly created policy in Endpoint security | Account protection

Windows LAPS policy status

Windows LAPS policy report

As we can see the policy sync successfully.

Let’s go ahead and check the local admin password details. To do that, we need an account with one of the following roles assigned,

Global Admin
Cloud Device Admin

To view account and password details,

1. Log in to https://endpoint.microsoft.com/ as one of the above-mentioned user.

2. Then click on Devices | All devices

3. From the list, click on a device that has the LAPS policy applied.

4. On device property page, click on Local admin password.

Device local admin password option

5. Then click on Show local administrator password to reveal the account and password details.

show local administrator password link

reveal local admin password

Using Intune we also can forcefully rotate the local admin password.

To do that we need to log in to Intune with an account that has the following permissions.

Managed devices: Read
Organization: Read
Remote tasks: Rotate Local Admin Password

Once logged in to https://endpoint.microsoft.com/ as a user who has the above-mentioned permissions, go to the relevant device overview page and then click on Rotate local admin password

forcefully rotate localadmin password

After a few minutes, we can see a new password for the local admin account. Please note this activity will reset the Password age.

updated local password

As we can see Windows LAPS configuration via Microsoft Intune is working as expected. This marks the end of the blog post and if you have any questions feel free to reach me at rebeladm@live.com

Related posts
Cyber SecurityMicrosoft Entra IDMicrosoft Technologies

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Entra ID Entitlement Management access packages enable administrators to offer a self-service…
Read more
Cyber SecurityMicrosoft Entra ID

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

In my previous blog post, I explained how to use Entra ID lifecycle workflow to trigger actions…
Read more
Azure servicesMicrosoft Entra IDMicrosoft Technologies

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

The Entra ID lifecycle workflow is a feature of Microsoft Entra ID identity governance and Microsoft…
Read more
Newsletter
Become a Trendsetter

Sign up and get the best of RebelAdmin, tailored for you.

Leave a Reply

Your email address will not be published. Required fields are marked *