Deploying Windows LAPS with Microsoft Intune: A Complete Walkthrough
Overview
Windows Local Administrator Password Solution (LAPS) is a Microsoft-native control that generates unique, randomly-rotated local administrator passwords for each managed endpoint and escrows them to either Active Directory or Microsoft Entra ID. Without LAPS — or a comparable control — organisations risk lateral movement enabled by shared local administrator passwords.
This guide covers the native Windows LAPS deployment for Intune-managed, Entra ID-joined devices — the recommended path for cloud-first environments. If you are managing hybrid-joined devices or running legacy LAPS alongside native LAPS, see the notes in each section.
Tested environment: Windows 11 22H2 and 24H2, Intune April 2026 service release, Entra ID with LAPS enabled at tenant level.
Production Rollout Advice
Deploy LAPS as a control with an operational handover, not just as another Intune profile. Before assigning it broadly, agree who is allowed to retrieve passwords, where retrievals are audited, and what happens after a password is used for support or recovery.
For the first rollout, use a small device group that includes ordinary user endpoints, a shared device if you support them, and at least one machine with your standard hardening baseline. Confirm the password appears in Entra ID, retrieval auditing is visible, and post-authentication rotation behaves as expected before expanding the assignment.
Do not use LAPS to justify leaving shared local admin passwords in place. During rollout, remove old local admin credentials from build scripts, gold images, and helpdesk notes so the new control is not undermined by the old process.
Prerequisites
Before starting, confirm:
- Windows 11 22H2 with KB5025239 (April 2023 CU) or later, or Windows 10 22H2 with the same. The built-in LAPS component requires this build minimum.
- Intune tenant on March 2025 service release or later.
- Entra ID: LAPS support must be enabled in the Entra portal. Navigate to Devices > Device Settings and enable "Enable Microsoft Entra Local Administrator Password Solution (LAPS)".
- Your Intune role: Endpoint Security Manager or higher.
- Legacy LAPS agent removed: If the Microsoft LAPS v1.x agent is installed on any devices, remove it before enabling native LAPS to prevent policy conflicts. Check for the presence of
LAPS.exeorAdmPwd.dllbefore proceeding. - Entra-joined (not hybrid-joined): This guide targets pure Entra ID join. For hybrid-joined devices, LAPS must be configured to back up to on-premises Active Directory unless you have confirmed hybrid LAPS escrow support in your Intune version.
Step 1: Enable LAPS in Entra ID
- Sign in to the Entra admin centre as a Privileged Role Administrator or Global Administrator.
- Navigate to Identity > Devices > Overview > Device Settings.
- Set Enable Microsoft Entra Local Administrator Password Solution (LAPS) to Yes.
- Click Save.
This is a tenant-wide setting — it does not automatically apply LAPS to any device. It enables the escrow capability that your Intune policy will activate on specific devices.
Step 2: Create the Intune Configuration Profile
- Navigate to the Intune admin centre.
- Go to Endpoint security > Account protection.
- Click Create policy and select:
- Platform: Windows 10 and later
- Profile type: Local admin password solution (Windows LAPS)
- Give the policy a clear name, e.g.
LAPS - Entra ID Joined Devices.
Recommended Settings
| Setting | Recommended Value | Notes |
|---|---|---|
| Backup Directory | Azure Active Directory | Use for Entra-joined devices |
| Password Age Days | 30 | Rotate every 30 days |
| Administrator Account Name | (blank) | Targets the built-in local Administrator account |
| Password Complexity | Large letters + small letters + numbers + special characters | Maximum complexity |
| Password Length | 20 | Minimum 14 for CIS compliance, 20 is stronger |
| Post Authentication Actions | Reset password and log off managed account | Rotates after any use |
| Post Authentication Reset Delay | 24 | Hours before rotation after post-auth use |
- Click Next, configure scope tags if required, then proceed to Assignments.
Step 3: Assign to Device Groups
Assign the policy to a device group, not a user group. LAPS is a device-level configuration.
Recommended group structure:
- Create an Entra ID dynamic device group with the rule:
(device.managementType -eq "MDM") and (device.deviceTrustType -eq "AzureAD") - This automatically captures all Entra-joined, Intune-managed devices
Do not assign this policy to hybrid-joined devices unless you have confirmed there is no legacy LAPS agent present and your Intune version supports hybrid LAPS with Entra ID backup.
Step 4: Verify and Test
After the policy syncs (allow up to 8 hours, or trigger a manual sync via the Intune portal or Sync-MDMClientWithManagementService on the device), verify:
On the device
Open an elevated PowerShell prompt and check the LAPS state:
# Check current LAPS status using the built-in module (Windows 11 22H2+)
Get-LapsAADPassword -DeviceNameOrId $env:COMPUTERNAME -AsPlainTextIf the LAPS PowerShell module is not present, check via registry:
Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\LAPS\State"In the Intune portal
Navigate to Devices > [device name] > Local admin password. You should see a password with a rotation date. If this pane is absent, the policy has not yet synced — trigger a manual sync.
In Entra ID
Navigate to Entra admin centre > Devices > All devices > [device name] > Local administrator password recovery. The password should be visible to accounts with appropriate permissions. If the password field is blank, the device has not yet escrowed — check the event log (Step 5 troubleshooting).
PowerShell bulk verification
To check LAPS escrow status across your fleet from a management workstation:
# Requires Microsoft.Graph module
Connect-MgGraph -Scopes "DeviceLocalCredential.Read.All", "Device.Read.All"
$Devices = Get-MgDevice -Filter "managementType eq 'MDM'" -All
foreach ($Device in $Devices) {
$Cred = Get-MgDeviceLocalCredential -DeviceId $Device.Id -ErrorAction SilentlyContinue
[PSCustomObject]@{
DeviceName = $Device.DisplayName
LAPSEscrowed = if ($Cred) { "Yes" } else { "No" }
LastRotated = $Cred.RefreshDateTime
}
}Step 5: Configure Password Recovery Access
By default, Global Administrators and Privileged Role Administrators can recover LAPS passwords. For operational use, create a delegated role:
- In Entra ID, navigate to Roles and administrators > All roles.
- Locate Cloud Device Administrator — this role has
microsoft.directory/deviceLocalCredentials/password/readby default. - Alternatively, create a custom role with only that permission for a tighter least-privilege model.
- Assign the role to your IT support team via PIM if you have Entra ID P2.
Auditing password retrievals: Every time a LAPS password is retrieved, an entry is written to the Entra audit log under Devices > Audit logs, action type Get local administrator password. Set up a diagnostic setting to export these to Log Analytics or Sentinel for SOC visibility.
Troubleshooting
Policy shows as "Not applicable": Confirm the device is Entra-joined (not hybrid-joined). Run dsregcmd /status on the device and check AzureAdJoined: YES.
Password not escrowing: Confirm LAPS is enabled in Entra Device Settings at the tenant level. Check the device event log under Applications and Services Logs > Microsoft > Windows > LAPS > Operational. Event ID 10020 indicates the policy was received; Event ID 10023 confirms escrow success; Event ID 10027 indicates an escrow failure with an error code.
Legacy LAPS conflicts: If the device shows a LAPS policy conflict, check for the presence of the legacy LAPS.exe or AdmPwd.dll. Remove the legacy agent and run a policy sync. The native LAPS CSP and the legacy LAPS Group Policy extension cannot run simultaneously.
Password rotation not happening after use: Confirm the Post Authentication Actions setting is configured in the Intune profile. If the local administrator account used for recovery is not the built-in Administrator (RID 500), you must specify the account name explicitly in the Administrator Account Name field.
Common Admin Mistakes
- Assigning the policy to users instead of devices. LAPS is device configuration, so user targeting creates confusing coverage gaps.
- Enabling LAPS in Entra ID but forgetting that this only enables escrow capability. Devices still need a Windows LAPS policy.
- Letting too many roles retrieve passwords. Keep recovery access small, audited, and preferably time-bound through PIM.
- Managing the same device with legacy LAPS, Group Policy, and Intune at the same time. Pick the management plane for each device population and document the exception path.
Known Limitations
- Hybrid-joined devices: Native LAPS on hybrid-joined devices can back up to Entra ID (as of Windows 11 23H2 with the appropriate Intune CSP update), but requires explicit configuration. Do not apply this guide's Entra-only policy to hybrid-joined devices without testing.
- Co-management: If the device is co-managed (Intune + SCCM) and the Account Protection workload is not set to Intune, the LAPS policy will not be applied by Intune. Move the Account Protection workload to Intune, or deploy LAPS via SCCM's separate integration path.
- The local administrator account must exist: Native LAPS targets the built-in Administrator account (RID 500) unless you specify a name. If the built-in account is disabled (common in CIS hardening baselines), LAPS will manage it in a disabled state — the password rotates but the account cannot be used until re-enabled. Decide whether to keep the built-in account enabled or create a named admin account for LAPS to manage.
- Intune device-to-user assignment: LAPS password recovery in Intune shows the password to Intune administrators on the device's page. There is no per-user delegation within Intune's LAPS recovery UI — use the Entra Cloud Device Administrator role for delegated access.
- Recovery key not visible in Intune but visible in Entra: This is expected behaviour. The Intune portal retrieves the key from Entra ID on demand. If Entra ID shows the key but Intune does not, it is a display delay — refresh the page.
Rollback and Cleanup
If you need to remove LAPS from a device or roll back the policy:
- Remove the Intune policy: In the Intune portal, navigate to the LAPS policy and remove the device or device group from the assignment. The policy will be removed on the next sync.
- Clear the escrowed key: After removing the policy, the password in Entra ID is not automatically deleted. To remove it: navigate to the device in Entra ID > Local administrator password recovery > Delete. This prevents stale keys from being used.
- Disable LAPS at tenant level: If you are removing LAPS entirely, toggle the Entra Device Settings back to No. This prevents any future policies from escrowing passwords but does not affect passwords already escrowed.
- Restore the local administrator account state: If LAPS was managing the built-in Administrator account, decide whether to re-disable it or leave it as-is after LAPS removal.
Related Resources
Microsoft Intune
RecommendedManage, secure, and report on all your endpoints from a single cloud-native console.
AdminSignal Editorial
Editorial Staff
Written and reviewed by the AdminSignal editorial team. All content is independently verified for technical accuracy against official Microsoft documentation.
AdminSignal content is produced independently. Editorial policy