Guest Alex Simons (AZURE) Posted April 22, 2023 Posted April 22, 2023 Howdy folks, Today we have some news I know many of you will be excited about! As part of our vision to give you comprehensive security solutions, we’ve joined forces with the Windows and Microsoft Intune teams to release a public preview of Windows Local Administrator Password Solution (LAPS) for Azure AD (which is now part of Microsoft Entra). I’ve asked Sandeep Deo, one of the Product Managers behind this release, to give you the low down on all these updates and explain how you can start using Windows LAPS with Microsoft Entra (Azure AD). You’ll find Sandeep’s blog post below. Best regards, Alex Simons (@Alex_A_Simons) Corporate VP of Program Management Microsoft Identity Division ---------------- Hi everyone, I am excited to share with you the updates we have made to LAPS and how you can start using it with Microsoft Entra (Azure AD) and Microsoft Intune to secure your Windows devices joined to Azure AD. Every Windows device comes with a built-in local administrator account that you must secure and protect to mitigate any Pass-the-Hash (PtH) and lateral traversal attacks. Many customers have been using our standalone, on-premises LAPS product for local administrator password management of their domain joined Windows machines. We heard from many of you that you need LAPS support as you modernize you Windows environment to join directly to Azure AD. Today we're making Windows LAPS available to you for both Azure AD joined and hybrid Azure AD joined devices. Additionally, Windows LAPS is now built-in into Windows with Windows 10 20H2 and later, Windows 11 21H2 and later, and Windows Server 2019 and later using the most recent security update (released on April 11, 2023). With these updates, you will also no longer need to install an external MSI package and future fixes or feature updates will be delivered via the normal Windows patching processes. There are some pretty important capabilities we've enabled with in this preview: Turn on Windows LAPS using a tenant wide policy and a client-side policy to backup local administrator password to Azure AD. Configure client-side policies via Microsoft Intune portal for local administrator password management to set account name, password age, length, complexity, manual password reset and so on. Recover stored passwords via Microsoft Entra/Microsoft Intune portal or Microsoft Graph API/PSH Enumerate all LAPS enabled devices via Microsoft Entra portal or Microsoft Graph API/PSH. Create Azure AD role-based access control (RBAC) policies with custom roles and administrative units for authorization of password recovery. View audit logs via Microsoft Entra portal or Microsoft Graph API/PSH to monitor password update and retrieval events. Configure Conditional Access policies on directory roles that have the authorization of password recovery. Let’s walk through the simple steps to enable some of these scenarios. Setting up LAPS In the Azure AD Devices menu, select Device settings, and then select Yes for the LAPS setting and click Save. In the Microsoft Intune Endpoint security menu, select Account protection, then select Create Policy to create a Windows LAPS profile for Windows 10 and later. During profile creation, the pick Backup Directory to be Azure AD and can also configure other client policies for LAPS, does the Assignments to Azure AD groups and then finally selects Review + Create. Recovering local administrator password Continue reading... Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.