Skip to content

What you should know about Windows LAPS

Tara Sinquefield
Tara Sinquefield|Updated October 1, 2025
Illustration of computer desk and monitor with PDQ logo
Illustration of computer desk and monitor with PDQ logo

Windows LAPS (Local Administrator Password Solution) was updated in April 2023 to improve password security in Active Directory and Entra ID (formerly Azure AD). These changes also affected how it works with PDQ Deploy & Inventory. This guide explains what changed, why legacy setups stopped working, and how to configure LAPS for PDQ Deploy & Inventory.

If you have gone through the pain of setting up LAPS only to find out that a Windows update wiped away all your hard work, this article is for you! Or if not, you know that you should limit the use of a Domain Admin account and instead use service accounts, preferably local accounts, to do your bidding.

That's where LAPS comes into play. It’s a nice little solution that solves your security problem while still letting you get your work done. But there's one little problem: It had a big fight with Deploy and Inventory. (They were on a break!)

What is Windows LAPS, and how is it different from legacy LAPS?

Windows LAPS is Microsoft’s tool for automatically managing and securing local administrator passwords in Active Directory and Entra ID. It automatically handles and secures these passwords, storing them in Active Directory and Entra ID with encryption. You can control access to the password based on permissions. 

You might have come across the older Microsoft endpoint security tool, also known as legacy LAPS, which was available for some time on the Microsoft Download Center. It functioned by regularly changing the password and maintaining a backup in Active Directory (AD). In our discussions, we'll refer to this older product as "legacy LAPS." (Kind of like me. I’m not old — I’m vintage.)

Legacy Microsoft LAPS required an MSI package deployment on each target device to function effectively. This was a pain! In contrast, the newer iteration of LAPS streamlines the process by integrating seamlessly into Active Directory and Entra ID without the need for individual MSI installations on devices. This improvement simplifies deployment and management, making the newer LAPS solution even more efficient and user-friendly. 

Why did Windows LAPS temporarily stop working with PDQ Deploy & Inventory?

In April 2023, Microsoft updated LAPS to store passwords in a new Active Directory schema with encryption. PDQ Deploy & Inventory could no longer locate credentials in the old attribute editor, causing integrations to fail.

Previously, LAPS stored the admin password openly in the AD attribute editor, devoid of encryption. Deploy & Inventory knew precisely where to look. However, the April 2023 update changed the game. Microsoft, in its customary fashion, revamped things. Shocker, right? I’m convinced there are entire departments dedicated to moving things around. 

The new LAPS became more sophisticated and security focused — a positive step. Yet, as with any major Microsoft update, it introduced some disruptions. That is Microsoft speak for “this update is going to break a bunch of stuff, and our help documentation is going to be of absolutely no help at all.” Oh goodie! I get to waste a bunch of time reading 10 articles that vaguely tiptoe around the issue but don’t tell me how to fix it. Time to go to Reddit and find some other rabid sysadmins facing the same issue who actually have a solution. Grrrr! I’m suddenly blinded by rage. What were we talking about? Oh yes, new LAPS.

The AD schema expanded in the new Microsoft LAPS, birthing a fresh tab on the AD object, aptly named LAPS. Here, LAPS now securely keeps its admin name and, just for funsies, encrypts the password, taking on a secret-agent vibe. This relocation left Deploy & Inventory tools searching in vain at the old address within the attribute editor. The absence of a forwarding address perplexed them, severing the connection with LAPS. It was an unfortunate chain of events driven by LAPS's added security layer. While fixable, once Deploy & Inventory tools locate the new address, they'll know where to find LAPS and its keys. 

What are the prereqs for the updated version of LAPS?

Here are the basics for the new version of LAPS. You need to be running either Windows 10 or 11 H2s on your machine. For the server folks, Windows Server 2019, 2022, or 2025 are where it's at. Don't forget to run the April 2023 update on your domain controller. You won’t get anywhere unless you do this step. No. Seriously. Run this update.

How do I configure Windows LAPS with PowerShell?

Next, it's time to run a few PowerShell commands on your domain controller (DC). This is a little different than legacy LAPS. Remember — we are adding an additional tab to AD, so we need to run additional steps.

Let’s run PowerShell — as Administrator, of course. Is there any other way?

1. Verify the LAPS module is installed:

Get –Command –Module LAPS
PowerShell output showing available Windows LAPS cmdlets including Get-LapsADPassword and Update-LapsADSchema.

2. Update the Active Directory schema:

Update-LapsADSchema -Verbose
PowerShell verbose output confirming Active Directory schema update for Windows LAPS.

3. Configure security on an Active Directory (AD) organizational unit (OU) to grant specific users or groups permission to query Windows Local Administrator Password Solution (LAPS) passwords. 

help Set-LapsADReadPasswordPermission -Online
PowerShell command granting Domain Admins read access to Windows LAPS passwords in Active Directory.

How do I set up Windows LAPS Group Policy?

How to set up Windows LAPS Group Policy TL;DR

1. Remove legacy GPO

  • Open Group Policy Management Console.

  • Unscope or delete your old LAPS GPO.

  • Wait ~3 days for the change to refresh across the domain.

2. Create a new local admin account

  • Use GPO to add a new local admin account on machines.

  • Avoid PS scripts or other methods (higher security risk).

3. Update .admx templates

  • Install the April 2023 update.

  • Manually update .admx templates on your domain controller if needed (check SYSVOL replication).

4. Create the new LAPS GPO

  • In Group Policy Management, navigate to:
    Computer Configuration > Policies > Administrative Templates > System > LAPS

  • Configure:

    • Local admin account name

    • Backup directory (Active Directory)

    • Password complexity and age

5. Apply and wait

  • Save and scope the GPO.

  • Allow up to 24 hours for policies to apply.

Now it’s time to tackle Group Policy. Let’s open the Group Policy Management Console. We need to get rid of your old LAPS Group Policy Object (GPO). Make sure you unscope it and give it at least 3 days to refresh.

In the meantime, you need to create a new local admin on the machines. Some people say you don’t need to do this, but I did. So, why not just do it? Although there are PS scripts to add a local admin and various other methods, they all have some security risks. I would suggest using GPO to do this part. It’s not fancy, but it works, and it’s secure.

Once you have done the above step, it's time to make the LAPS GPO. You might need to update your .admx templates on your domain controller. I’m sorry; it’s an MS guide. Sigh. This part was a pain! Even though I ran the update, I needed to manually update my templates. So annoying! Where is SYSVOL again?! Gah! Why wouldn’t I have replication issues with my domain controllers? Stupid computers! After some expletive-filled rants, I managed to update my templates and was ready to make my new GPO.

How to determine if you have new .admx templates 

If you pay attention to nothing else, listen to this! Here is how you know you have the new templates: 

The legacy LAPS GPO and the new LAPS

  • Legacy LAPS used to live here: 
    Computer config > Policies > Admin templates > LAPS.

  • New LAPS lives here:
    Computer config > Policies > Admin templates > System > LAPS. 

Group Policy Management Editor showing Windows LAPS policies under Computer Configuration > Administrative Templates > System > LAPS.

As we expand the policy, we can see all the settings we changed.

Windows LAPS Group Policy settings including password backup, encryption, and password policies.

First, we need to create an admin account. Make sure this matches the name of the new admin account you just created.

Windows LAPS GPO configuration window specifying custom administrator account name to manage.

Next, we are going to pick the backup directory. Since Deploy & Inventory only work with Active Directory, you need to specify AD here.

Windows LAPS GPO setting showing Active Directory selected as the password backup directory.

This next part is where we configure the password complexity and age. Set this according to your environment’s security specifications.

Windows LAPS GPO password policy settings including password complexity, length, and age in days.

Save your GPO and scope it accordingly. Full disclosure: This did take some time to trigger. I may or may not have compulsively run gpupdate /force over and over again to no avail. It took 24 hours before it worked. Here is how you know it works. You will see this in Active Directory:

Active Directory object properties showing Windows LAPS tab with admin account name and stored password.

All of these fields in AD will be populated. Success!

How do I use Windows LAPS with PDQ Deploy & Inventory?

Now that we have done all the prep work, we are good to go. The good news is, if you have already done the setup work in Deploy & Inventory, LAPS will work again. Take your new local admin account and follow this LAPS integration guide to get your new credentials up and running.

PDQ Deploy logo

What’s that? You don’t have PDQ Deploy? No worries.

Just head over and download a free 14-day trial today.

You may — and when I say may, I mean you will — run into an access denied error; you will need to turn off remote UAC. I know, I know. Your security peeps are not gonna be happy. But think of it this way: You are trading one security feature for another. Pick your poison, people! By its very nature, LAPS does not allow any program to run local credentials from a remote machine. So we are gonna blame Microsoft for this one. 

You can turn off remote UAC via GPO, or you can use this handy PS command in Deploy & Inventory. The choice is yours. 

PowerShell script configuring LocalAccountTokenFilterPolicy registry value to disable remote UAC for Windows LAPS integration.

LAPS also works with Microsoft Intune using configuration policies, the GPOs of the cloud. You can use these, along with conditional access policies, for a greater level of security for your devices.

Since I know you're like me and you like to keep things tidy, the very last thing you need to do is uninstall the MSI from legacy LAPS. Lucky for you, I’m including an uninstall guide using Deploy & Inventory so you can do it quickly and easily. If you aren’t already using Deploy & Inventory, why not sign up for a free trial today? 

Loading...

Tara Sinquefield
Tara Sinquefield

Tara used to work in IT. She loves animals. She kinda likes humans. Now she does theoretical IT and teaches other nerds how to do stuff.

Related articles