You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> Azure AD support for Windows LAPS is currently in PREVIEW.
24
24
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
25
25
26
-
Every Windows device comes with a built-in local administrator account that you must secure and protect to mitigate any Pass-the-Hash (PtH) and lateral traversal attacks. Many customers have been using our standalone, on-premises [LAPS](https://www.microsoft.com/download/details.aspx?id=46899) product for local administrator password management of their domain joined Windows machines. With Azure AD support for Windows LAPS, we are providing a consistent experience for both Azure AD joined and hybrid Azure AD joined devices.
26
+
Every Windows device comes with a built-in local administrator account that you must secure and protect to mitigate any Pass-the-Hash (PtH) and lateral traversal attacks. Many customers have been using our standalone, on-premises [LAPS](https://www.microsoft.com/download/details.aspx?id=46899) product for local administrator password management of their domain joined Windows machines. With Azure AD support for Windows LAPS, we're providing a consistent experience for both Azure AD joined and hybrid Azure AD joined devices.
27
27
28
28
Azure AD support for LAPS includes the following capabilities:
29
29
30
30
-**Enabling Windows LAPS with Azure AD** - Enable a tenant wide policy and a client-side policy to backup local administrator password to Azure AD.
31
31
-**Local administrator password management** - Configure client-side policies to set account name, password age, length, complexity, manual password reset and so on.
32
-
-**Recovering local administrator password** - Use API/Portal eperiences for local administrator password recovery.
33
-
-**Enumerating all Windows LAPS enabled devices** - Use API/Portal eperiences to enumerate all Windows devices in Azure AD enabled with Windows LAPS.
32
+
-**Recovering local administrator password** - Use API/Portal experiences for local administrator password recovery.
33
+
-**Enumerating all Windows LAPS enabled devices** - Use API/Portal experiences to enumerate all Windows devices in Azure AD enabled with Windows LAPS.
34
34
-**Authorization of local administrator password recovery** - Use role based access control (RBAC) policies with custom roles and administrative units.
35
-
-**Auditing local administrator password update and recovery** - Use audit logs API/Portal experinces to monitor password update and recovery events.
35
+
-**Auditing local administrator password update and recovery** - Use audit logs API/Portal experiences to monitor password update and recovery events.
36
36
-**Conditional Access policies for local administrator password recovery** - Configure Conditional Access policies on directory roles that have the authorization of password recovery.
37
37
38
38
> [!NOTE]
@@ -68,32 +68,32 @@ This feature is now available on the following Windows OS platforms with the spe
68
68
69
69
To enable Windows LAPS with Azure AD, you must:
70
70
71
-
1. In the **Azure AD Devices** menu, select **Device settings**, and then select **Yes** for Enable Local Administartor Password Solution (LAPS) setting and click **Save**. You also have the option to use MS Graph API [Update deviceRegistrationPolicy](https://learn.microsoft.com/graph/api/deviceregistrationpolicy-update?view=graph-rest-beta&preserve-view=true).
71
+
1. In the **Azure AD Devices** menu, select **Device settings**, and then select **Yes** for Enable Local Administrator Password Solution (LAPS) setting and click **Save**. You also have the option to use MS Graph API [Update deviceRegistrationPolicy](https://learn.microsoft.com/graph/api/deviceregistrationpolicy-update?view=graph-rest-beta&preserve-view=true).
72
72
2. Configure client-side policy and set **BackUpDirectory** to be Azure AD.
73
-
- If you are using Microsoft Intune to manage client side policies, see [Manage Windows LAPS using Microsoft Intune](https://learn.microsoft.com/mem/intune/protect/windows-laps-policy)
74
-
- If you are using Group Policy Objects (GPO) to manage client side policies, see [Windows LAPS Group Policy](https://learn.microsoft.com/windows-server/identity/laps/laps-management-policy-settings#windows-laps-group-policy)
73
+
- If you're using Microsoft Intune to manage client side policies, see [Manage Windows LAPS using Microsoft Intune](https://learn.microsoft.com/mem/intune/protect/windows-laps-policy)
74
+
- If you're using Group Policy Objects (GPO) to manage client side policies, see [Windows LAPS Group Policy](https://learn.microsoft.com/windows-server/identity/laps/laps-management-policy-settings#windows-laps-group-policy)
75
75
76
76
> [!NOTE]
77
77
> The preferred option to configure Windows LAPS policy for Azure AD joined devices is to use [Manage Windows LAPS using Microsoft Intune](https://learn.microsoft.com/mem/intune/protect/windows-laps-policy). However, if your devices are Azure AD joined but you're not using Microsoft Intune or Microsoft Intune is not supported (e.g. Windows Server 2019/2022), you can still deploy Windows LAPS for Azure AD. In this scenario, you must deploy policy manually (for example, either by using direct registry modification or by using Local Computer Group Policy). For more information, see [Configure Windows LAPS policy settings](https://learn.microsoft.com/windows-server/identity/laps/laps-management-policy-settings).
78
78
79
79
## LAPS password management
80
-
To configure LAPS password management policies for your Azure AD joined devices, you can use Microsoft Intune or any other MDM provider of your choide. If you are using Microsoft Intune to manage client side policies, see [Manage Windows LAPS using Microsoft Intune](https://learn.microsoft.com/mem/intune/protect/windows-laps-policy)
81
-
To configure LAPS password management for your hybrid Azure AD joined devices, you can use GPO if such devices are not [co-managed](https://learn.microsoft.com/mem/configmgr/comanage/overview) with Microsoft Intune. If you are using GPO, see [Windows LAPS Group Policy](https://learn.microsoft.com/windows-server/identity/laps/laps-management-policy-settings#windows-laps-group-policy).
80
+
To configure LAPS password management policies for your Azure AD joined devices, you can use Microsoft Intune or any other MDM provider of your choice. If you're using Microsoft Intune to manage client side policies, see [Manage Windows LAPS using Microsoft Intune](https://learn.microsoft.com/mem/intune/protect/windows-laps-policy)
81
+
To configure LAPS password management for your hybrid Azure AD joined devices, you can use GPO if such devices aren't [co-managed](https://learn.microsoft.com/mem/configmgr/comanage/overview) with Microsoft Intune. If you're using GPO, see [Windows LAPS Group Policy](https://learn.microsoft.com/windows-server/identity/laps/laps-management-policy-settings#windows-laps-group-policy).
82
82
83
83
## Recovering local administrator password
84
-
To view local administrator password for a Windows device joined to Azure AD, you need to be garnted the *deviceLocalCredentials.Read.All* permission and you must be assigned one of the following roles:
84
+
To view local administrator password for a Windows device joined to Azure AD, you need to be granted the *deviceLocalCredentials.Read.All* permission, and you must be assigned one of the following roles:
85
85
86
86
- Global Administrator
87
87
- Cloud Device Administrator
88
88
- Intune Service Administrator
89
89
90
-
You can also use MS Graph API [Get deviceLocalCredentialInfo](https://learn.microsoft.com/graph/api/devicelocalcredentialinfo-get?view=graph-rest-beta&preserve-view=true) to recover local administrative password. If you use the MS Graph API, the password returned is in Base64 encoded value that you will need to decode before using it.
90
+
You can also use MS Graph API [Get deviceLocalCredentialInfo](https://learn.microsoft.com/graph/api/devicelocalcredentialinfo-get?view=graph-rest-beta&preserve-view=true) to recover local administrative password. If you use the MS Graph API, the password returned is in Base64 encoded value that you need to decode before using it.
91
91
92
92
## Enumerating all Windows LAPS enable devices
93
93
94
94
To enumerate all Windows LAPS enabled devices with Azure AD, you can use Azure AD portal by going to **Azure AD Devices | Overview** page and selecting **Local administrator password recovery (Preview)** menu.
95
95
96
-
You can also use MS Graph API to list all devices in Azure AD enbled with Windows LAPS.
96
+
You can also use MS Graph API to list all devices in Azure AD enabled with Windows LAPS.
97
97
98
98
## Authorization of local administrator password recovery
99
99
Other than the built-in Azure AD roles of Global Administrator, Cloud Device Administrator and Intune Administrator that are granted *device.LocalCredentials.Read.All*, you can use Azure AD custom roles or administrative units to authorize local administrator password recovery. For example,
@@ -103,7 +103,7 @@ Other than the built-in Azure AD roles of Global Administrator, Cloud Device Adm
103
103
You can create an Azure AD [custom role](https://learn.microsoft.com/azure/active-directory/roles/custom-create), you need to assign *microsoft.directory/deviceLocalCredentials/password/read* permission to authorize local administrator password recovery.
104
104
105
105
> [!NOTE]
106
-
> Since Microsoft Entra portal is not yet enabled to show permissions for LAPS, you will need to create a custom role and grant permissions using [MS Graph API](https://learn.microsoft.com/azure/active-directory/roles/custom-create#create-a-role-with-the-microsoft-graph-api) or [Powershell](https://learn.microsoft.com/azure/active-directory/roles/custom-create#create-a-role-using-powershell)
106
+
> Since Microsoft Entra portal is not yet enabled to show permissions for LAPS, you will need to create a custom role and grant permissions using [MS Graph API](https://learn.microsoft.com/azure/active-directory/roles/custom-create#create-a-role-with-the-microsoft-graph-api) or [PowerShell](https://learn.microsoft.com/azure/active-directory/roles/custom-create#create-a-role-using-powershell)
107
107
108
108
Once you have created the custom role, you can assign it to users using Microsoft Entra portal, MS Graph API or Powershell.
109
109
@@ -112,24 +112,24 @@ Other than the built-in Azure AD roles of Global Administrator, Cloud Device Adm
112
112
You can also create an Azure AD [administrative unit](https://learn.microsoft.com/azure/active-directory/roles/administrative-units), add devices and assign Cloud Device Administrator role with administrative unit scope to authorize local administrator password recovery.
113
113
114
114
> [!NOTE]
115
-
> Since Microsoft Entra portal is not yet enabled to assign custom role (you would create to authorize local administartor password recovery) with administrative unit, you will need to use [MS Graph API](https://learn.microsoft.com/azure/active-directory/roles/admin-units-manage#microsoft-graph-api) or [Powershell](https://learn.microsoft.com/azure/active-directory/roles/admin-units-manage#microsoft-graph-powershell)
115
+
> Since Microsoft Entra portal is not yet enabled to assign custom role (you would create to authorize local administartor password recovery) with administrative unit, you will need to use [MS Graph API](https://learn.microsoft.com/azure/active-directory/roles/admin-units-manage#microsoft-graph-api) or [PowerShell](https://learn.microsoft.com/azure/active-directory/roles/admin-units-manage#microsoft-graph-powershell)
116
116
117
117
## Auditing local administrator password update and recovery
118
-
To view audit events for local adminsitartor password update, you can go to **Azure AD Devices | Overview** page, select **Audit** logs, then use **Activity** filter and Search for **Update device local administrator password** to view the audit events.
118
+
To view audit events for local administrator password update, you can go to **Azure AD Devices | Overview** page, select **Audit** logs, then use **Activity** filter and Search for **Update device local administrator password** to view the audit events.
119
119
120
-
To view audit events for local adminsitartor password recovery, you can go to **Azure AD Devices | Overview** page, select **Audit** logs, then use **Activity** filter and Search for **Recover device local administrator password** to view the audit events.
120
+
To view audit events for local administrator password recovery, you can go to **Azure AD Devices | Overview** page, select **Audit** logs, then use **Activity** filter and Search for **Recover device local administrator password** to view the audit events.
121
121
122
122
## Conditional Access policies for local administrator password recovery
123
-
To configure Conditional Access for local administartor passwrod recovery you will need to assign policy with user scope to built-in roles such as Global Administrator, Cloud Device Administrator and Intune Administrator that when granted *deviceLocalCredential.Read.All* permission have the ability to recover local administrator password for any Windows device joined to Azure AD and enabled with Windows LAPS. You can find more details on [Conditional Access USer Assignments](https://learn.microsoft.com/azure/active-directory/conditional-access/concept-conditional-access-users-groups)
123
+
To configure Conditional Access for local administrator password recovery, you need to assign policy with user scope to built-in roles such as Global Administrator, Cloud Device Administrator and Intune Administrator that when granted *deviceLocalCredential.Read.All* permission have the ability to recover local administrator password for any Windows device joined to Azure AD and enabled with Windows LAPS. You can find more details on [Conditional Access User Assignments](https://learn.microsoft.com/azure/active-directory/conditional-access/concept-conditional-access-users-groups)
124
124
125
125
> [!NOTE]
126
126
> Other role types including administrative unit-scoped roles and custom roles aren't supported
127
127
128
128
## Licensing requirements
129
129
130
130
### Azure Active Directory subscription
131
-
**Azure Active Directory Free**, when you are using basic Windows LAPS with Microsoft Entra (Azure AD) features such as enabling LAPS using device settings, storing encrypted local administrator password, password recovery and audit logsis the free version of Azure AD that’s included when you subscribe to Intune. With Azure AD Free, you can use all the features of LAPS.
132
-
**Azure Active Directory Premium**, when you are using premium experiences to improve security with capabilities such as Conditional Access, Custom Roles and Administrative Units
131
+
**Azure Active Directory Free**, when you're using basic Windows LAPS with Microsoft Entra (Azure AD) features such as enabling LAPS using device settings, storing encrypted local administrator password, password recovery and audit logs.
132
+
**Azure Active Directory Premium**, when you're using premium experiences to improve security with capabilities such as Conditional Access, Custom Roles and Administrative Units.
133
133
134
134
### Microsoft Intune subscription
135
135
**Microsoft Intune Plan 1**, which is the basic Intune subscription. You can also use Windows LAPS with a free trial subscription for Intune.
@@ -141,7 +141,7 @@ To configure Conditional Access for local administartor passwrod recovery you wi
141
141
142
142
No.
143
143
144
-
### Is Windows LAPS with Azure AD supported for Azure AD registered (aka Workplace Join) devices?
144
+
### Is Windows LAPS with Azure AD supported for Azure AD registered devices?
0 commit comments