Skip to content

Commit bddde09

Browse files
authored
Update howto-windows-laps-with-azuread.md
1 parent a666207 commit bddde09

File tree

1 file changed

+20
-20
lines changed

1 file changed

+20
-20
lines changed

articles/active-directory/devices/howto-windows-laps-with-azuread.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -23,16 +23,16 @@ ms.collection: M365-identity-device-management
2323
> Azure AD support for Windows LAPS is currently in PREVIEW.
2424
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
2525
26-
Every Windows device comes with a built-in local administrator account that you must secure and protect to mitigate any Pass-the-Hash (PtH) and lateral traversal attacks. Many customers have been using our standalone, on-premises [LAPS](https://www.microsoft.com/download/details.aspx?id=46899) product for local administrator password management of their domain joined Windows machines. With Azure AD support for Windows LAPS, we are providing a consistent experience for both Azure AD joined and hybrid Azure AD joined devices.
26+
Every Windows device comes with a built-in local administrator account that you must secure and protect to mitigate any Pass-the-Hash (PtH) and lateral traversal attacks. Many customers have been using our standalone, on-premises [LAPS](https://www.microsoft.com/download/details.aspx?id=46899) product for local administrator password management of their domain joined Windows machines. With Azure AD support for Windows LAPS, we're providing a consistent experience for both Azure AD joined and hybrid Azure AD joined devices.
2727

2828
Azure AD support for LAPS includes the following capabilities:
2929

3030
- **Enabling Windows LAPS with Azure AD** - Enable a tenant wide policy and a client-side policy to backup local administrator password to Azure AD.
3131
- **Local administrator password management** - Configure client-side policies to set account name, password age, length, complexity, manual password reset and so on.
32-
- **Recovering local administrator password** - Use API/Portal eperiences for local administrator password recovery.
33-
- **Enumerating all Windows LAPS enabled devices** - Use API/Portal eperiences to enumerate all Windows devices in Azure AD enabled with Windows LAPS.
32+
- **Recovering local administrator password** - Use API/Portal experiences for local administrator password recovery.
33+
- **Enumerating all Windows LAPS enabled devices** - Use API/Portal experiences to enumerate all Windows devices in Azure AD enabled with Windows LAPS.
3434
- **Authorization of local administrator password recovery** - Use role based access control (RBAC) policies with custom roles and administrative units.
35-
- **Auditing local administrator password update and recovery** - Use audit logs API/Portal experinces to monitor password update and recovery events.
35+
- **Auditing local administrator password update and recovery** - Use audit logs API/Portal experiences to monitor password update and recovery events.
3636
- **Conditional Access policies for local administrator password recovery** - Configure Conditional Access policies on directory roles that have the authorization of password recovery.
3737

3838
> [!NOTE]
@@ -68,32 +68,32 @@ This feature is now available on the following Windows OS platforms with the spe
6868

6969
To enable Windows LAPS with Azure AD, you must:
7070

71-
1. In the **Azure AD Devices** menu, select **Device settings**, and then select **Yes** for Enable Local Administartor Password Solution (LAPS) setting and click **Save**. You also have the option to use MS Graph API [Update deviceRegistrationPolicy](https://learn.microsoft.com/graph/api/deviceregistrationpolicy-update?view=graph-rest-beta&preserve-view=true).
71+
1. In the **Azure AD Devices** menu, select **Device settings**, and then select **Yes** for Enable Local Administrator Password Solution (LAPS) setting and click **Save**. You also have the option to use MS Graph API [Update deviceRegistrationPolicy](https://learn.microsoft.com/graph/api/deviceregistrationpolicy-update?view=graph-rest-beta&preserve-view=true).
7272
2. Configure client-side policy and set **BackUpDirectory** to be Azure AD.
73-
- If you are using Microsoft Intune to manage client side policies, see [Manage Windows LAPS using Microsoft Intune](https://learn.microsoft.com/mem/intune/protect/windows-laps-policy)
74-
- If you are using Group Policy Objects (GPO) to manage client side policies, see [Windows LAPS Group Policy](https://learn.microsoft.com/windows-server/identity/laps/laps-management-policy-settings#windows-laps-group-policy)
73+
- If you're using Microsoft Intune to manage client side policies, see [Manage Windows LAPS using Microsoft Intune](https://learn.microsoft.com/mem/intune/protect/windows-laps-policy)
74+
- If you're using Group Policy Objects (GPO) to manage client side policies, see [Windows LAPS Group Policy](https://learn.microsoft.com/windows-server/identity/laps/laps-management-policy-settings#windows-laps-group-policy)
7575

7676
> [!NOTE]
7777
> The preferred option to configure Windows LAPS policy for Azure AD joined devices is to use [Manage Windows LAPS using Microsoft Intune](https://learn.microsoft.com/mem/intune/protect/windows-laps-policy). However, if your devices are Azure AD joined but you're not using Microsoft Intune or Microsoft Intune is not supported (e.g. Windows Server 2019/2022), you can still deploy Windows LAPS for Azure AD. In this scenario, you must deploy policy manually (for example, either by using direct registry modification or by using Local Computer Group Policy). For more information, see [Configure Windows LAPS policy settings](https://learn.microsoft.com/windows-server/identity/laps/laps-management-policy-settings).
7878
7979
## LAPS password management
80-
To configure LAPS password management policies for your Azure AD joined devices, you can use Microsoft Intune or any other MDM provider of your choide. If you are using Microsoft Intune to manage client side policies, see [Manage Windows LAPS using Microsoft Intune](https://learn.microsoft.com/mem/intune/protect/windows-laps-policy)
81-
To configure LAPS password management for your hybrid Azure AD joined devices, you can use GPO if such devices are not [co-managed](https://learn.microsoft.com/mem/configmgr/comanage/overview) with Microsoft Intune. If you are using GPO, see [Windows LAPS Group Policy](https://learn.microsoft.com/windows-server/identity/laps/laps-management-policy-settings#windows-laps-group-policy).
80+
To configure LAPS password management policies for your Azure AD joined devices, you can use Microsoft Intune or any other MDM provider of your choice. If you're using Microsoft Intune to manage client side policies, see [Manage Windows LAPS using Microsoft Intune](https://learn.microsoft.com/mem/intune/protect/windows-laps-policy)
81+
To configure LAPS password management for your hybrid Azure AD joined devices, you can use GPO if such devices aren't [co-managed](https://learn.microsoft.com/mem/configmgr/comanage/overview) with Microsoft Intune. If you're using GPO, see [Windows LAPS Group Policy](https://learn.microsoft.com/windows-server/identity/laps/laps-management-policy-settings#windows-laps-group-policy).
8282

8383
## Recovering local administrator password
84-
To view local administrator password for a Windows device joined to Azure AD, you need to be garnted the *deviceLocalCredentials.Read.All* permission and you must be assigned one of the following roles:
84+
To view local administrator password for a Windows device joined to Azure AD, you need to be granted the *deviceLocalCredentials.Read.All* permission, and you must be assigned one of the following roles:
8585

8686
- Global Administrator
8787
- Cloud Device Administrator
8888
- Intune Service Administrator
8989

90-
You can also use MS Graph API [Get deviceLocalCredentialInfo](https://learn.microsoft.com/graph/api/devicelocalcredentialinfo-get?view=graph-rest-beta&preserve-view=true) to recover local administrative password. If you use the MS Graph API, the password returned is in Base64 encoded value that you will need to decode before using it.
90+
You can also use MS Graph API [Get deviceLocalCredentialInfo](https://learn.microsoft.com/graph/api/devicelocalcredentialinfo-get?view=graph-rest-beta&preserve-view=true) to recover local administrative password. If you use the MS Graph API, the password returned is in Base64 encoded value that you need to decode before using it.
9191

9292
## Enumerating all Windows LAPS enable devices
9393

9494
To enumerate all Windows LAPS enabled devices with Azure AD, you can use Azure AD portal by going to **Azure AD Devices | Overview** page and selecting **Local administrator password recovery (Preview)** menu.
9595

96-
You can also use MS Graph API to list all devices in Azure AD enbled with Windows LAPS.
96+
You can also use MS Graph API to list all devices in Azure AD enabled with Windows LAPS.
9797

9898
## Authorization of local administrator password recovery
9999
Other than the built-in Azure AD roles of Global Administrator, Cloud Device Administrator and Intune Administrator that are granted *device.LocalCredentials.Read.All*, you can use Azure AD custom roles or administrative units to authorize local administrator password recovery. For example,
@@ -103,7 +103,7 @@ Other than the built-in Azure AD roles of Global Administrator, Cloud Device Adm
103103
You can create an Azure AD [custom role](https://learn.microsoft.com/azure/active-directory/roles/custom-create), you need to assign *microsoft.directory/deviceLocalCredentials/password/read* permission to authorize local administrator password recovery.
104104

105105
> [!NOTE]
106-
> Since Microsoft Entra portal is not yet enabled to show permissions for LAPS, you will need to create a custom role and grant permissions using [MS Graph API](https://learn.microsoft.com/azure/active-directory/roles/custom-create#create-a-role-with-the-microsoft-graph-api) or [Powershell](https://learn.microsoft.com/azure/active-directory/roles/custom-create#create-a-role-using-powershell)
106+
> Since Microsoft Entra portal is not yet enabled to show permissions for LAPS, you will need to create a custom role and grant permissions using [MS Graph API](https://learn.microsoft.com/azure/active-directory/roles/custom-create#create-a-role-with-the-microsoft-graph-api) or [PowerShell](https://learn.microsoft.com/azure/active-directory/roles/custom-create#create-a-role-using-powershell)
107107
108108
Once you have created the custom role, you can assign it to users using Microsoft Entra portal, MS Graph API or Powershell.
109109

@@ -112,24 +112,24 @@ Other than the built-in Azure AD roles of Global Administrator, Cloud Device Adm
112112
You can also create an Azure AD [administrative unit](https://learn.microsoft.com/azure/active-directory/roles/administrative-units), add devices and assign Cloud Device Administrator role with administrative unit scope to authorize local administrator password recovery.
113113

114114
> [!NOTE]
115-
> Since Microsoft Entra portal is not yet enabled to assign custom role (you would create to authorize local administartor password recovery) with administrative unit, you will need to use [MS Graph API](https://learn.microsoft.com/azure/active-directory/roles/admin-units-manage#microsoft-graph-api) or [Powershell](https://learn.microsoft.com/azure/active-directory/roles/admin-units-manage#microsoft-graph-powershell)
115+
> Since Microsoft Entra portal is not yet enabled to assign custom role (you would create to authorize local administartor password recovery) with administrative unit, you will need to use [MS Graph API](https://learn.microsoft.com/azure/active-directory/roles/admin-units-manage#microsoft-graph-api) or [PowerShell](https://learn.microsoft.com/azure/active-directory/roles/admin-units-manage#microsoft-graph-powershell)
116116
117117
## Auditing local administrator password update and recovery
118-
To view audit events for local adminsitartor password update, you can go to **Azure AD Devices | Overview** page, select **Audit** logs, then use **Activity** filter and Search for **Update device local administrator password** to view the audit events.
118+
To view audit events for local administrator password update, you can go to **Azure AD Devices | Overview** page, select **Audit** logs, then use **Activity** filter and Search for **Update device local administrator password** to view the audit events.
119119

120-
To view audit events for local adminsitartor password recovery, you can go to **Azure AD Devices | Overview** page, select **Audit** logs, then use **Activity** filter and Search for **Recover device local administrator password** to view the audit events.
120+
To view audit events for local administrator password recovery, you can go to **Azure AD Devices | Overview** page, select **Audit** logs, then use **Activity** filter and Search for **Recover device local administrator password** to view the audit events.
121121

122122
## Conditional Access policies for local administrator password recovery
123-
To configure Conditional Access for local administartor passwrod recovery you will need to assign policy with user scope to built-in roles such as Global Administrator, Cloud Device Administrator and Intune Administrator that when granted *deviceLocalCredential.Read.All* permission have the ability to recover local administrator password for any Windows device joined to Azure AD and enabled with Windows LAPS. You can find more details on [Conditional Access USer Assignments](https://learn.microsoft.com/azure/active-directory/conditional-access/concept-conditional-access-users-groups)
123+
To configure Conditional Access for local administrator password recovery, you need to assign policy with user scope to built-in roles such as Global Administrator, Cloud Device Administrator and Intune Administrator that when granted *deviceLocalCredential.Read.All* permission have the ability to recover local administrator password for any Windows device joined to Azure AD and enabled with Windows LAPS. You can find more details on [Conditional Access User Assignments](https://learn.microsoft.com/azure/active-directory/conditional-access/concept-conditional-access-users-groups)
124124

125125
> [!NOTE]
126126
> Other role types including administrative unit-scoped roles and custom roles aren't supported
127127
128128
## Licensing requirements
129129

130130
### Azure Active Directory subscription
131-
**Azure Active Directory Free**, when you are using basic Windows LAPS with Microsoft Entra (Azure AD) features such as enabling LAPS using device settings, storing encrypted local administrator password, password recovery and audit logsis the free version of Azure AD that’s included when you subscribe to Intune. With Azure AD Free, you can use all the features of LAPS.
132-
**Azure Active Directory Premium**, when you are using premium experiences to improve security with capabilities such as Conditional Access, Custom Roles and Administrative Units
131+
**Azure Active Directory Free**, when you're using basic Windows LAPS with Microsoft Entra (Azure AD) features such as enabling LAPS using device settings, storing encrypted local administrator password, password recovery and audit logs.
132+
**Azure Active Directory Premium**, when you're using premium experiences to improve security with capabilities such as Conditional Access, Custom Roles and Administrative Units.
133133

134134
### Microsoft Intune subscription
135135
**Microsoft Intune Plan 1**, which is the basic Intune subscription. You can also use Windows LAPS with a free trial subscription for Intune.
@@ -141,7 +141,7 @@ To configure Conditional Access for local administartor passwrod recovery you wi
141141

142142
No.
143143

144-
### Is Windows LAPS with Azure AD supported for Azure AD registered (aka Workplace Join) devices?
144+
### Is Windows LAPS with Azure AD supported for Azure AD registered devices?
145145

146146
No.
147147

0 commit comments

Comments
 (0)