Enable Windows LAPS With Intune
Step by step
12/31/20242 min read


Ok! So you've finally decided to enable Windows Laps ? Great !
Windows Laps ensures that each Windows device enrolled to Intune have a unique local administrative password. This is very important security feature that make sure that you do not have static local passwords and also that you need to login to Intune to retrive them.
Let's get started!
Windows client pre-reqs:
Windows 11 22H2 – April 11 2023 Update
Windows 11 21H2 – April 11 2023 Update
There are couple of things that you need to configure:
- Enable LAPS in you Tenant
- Enable the local administrator account [as this is disabled by default on Windows 11]
- Configure the settings for LAPS
Enable LAPS in your Tenant:
Sign in to the Azure Portal (https://portal.azure.com)
Navigate to Entra ID
In the left pane, expand Manage
Click on Devices and expand Manage
Click on Device settings
Scroll down and you will find the Enable Microsoft Entra Local Administrator Password Solution (LAPS) button.
Click YES and then click Save on the top of the page banner.
LAPS is now activated and available to be used within the Tenant.
On an enrolled (corporate) Windows 11 device, the administrator account will be disabled as default. If you want to use a custom local account instead, you must create that account before enabling Windows LAPS - Windows LAPS doesn't create the account.
Log in to Intune
Click on Devices – Windows - Configuration
Select Create – New Policy – Windows 10 and later – Settings catalog
Name: Enable Local Administrator account for LAPS
Description: Leave blank
Click Next
Click Add Settings
In the Search for setting box, type Accounts Enable Administrator Account Status, click Search
Click on the Local Policies Security Option
In the selection box below, select the checkbox for Accounts Enable Administrator Account Status
Close the Settings Picker and click the disabled button on the Accounts Enable Administrator Account Status to Enable it.
Click Next
Scope tags: Leave as is
Assignments: select All Devices
Click Next
Click Create
At the next device sync, the local administrator account will be enabled on all targeted devices.
You can now use this account with Windows LAPS .
Now that the account is enabled, you need to set the password complexity and how the password will be managed, i.e., rotated automatically or manually etc.
Sign in to Intune
Navigate to Endpoint Security
Expand Manage and select Account Protection
Click Create policy
Select platform: Windows
Select profile: Local admin password solution (Windows LAPS)
Click Create
Name: Windows LAPS settings
Backup directory: Back up the password to Azure AD only
Password age days: Not configured
Administrator account name: Leave as is
Password complexity: Large letters + small letters + numbers + special characters (Default)
Password length: 8 (note, in the real world you would set at least 14, however, this is a lab so to make it easy to test the sign in, we will keep it at the minimum requirement)
Post authentication actions: Leave as is. (In a real-world scenario, you may want to make sure that autorotation is enabled)
Post authentication reset delay (In a real-world scenario, you may want to set a time limit)
Wait for the next sync an the configuration will be enabled.
Now, try to run CMD as administrator to verify the functionality
Log in to Intune, click on Devices – Windows and click on the computername to open the computer object.
In the left pane click on Local admin password click on Show Local Administrator password, this will display the current password.
Now, log in to computer
In the search bar, type CMD
Right Click on the Command Prompt and select Run as administrator
Username: .\administrator (dot and then backslash)
Password: the password displayed in Intune
Command Prompt should now open in administrator mode
That's it !
Go 4 IT ! 😀