{"id":263,"date":"2019-08-22T11:26:00","date_gmt":"2019-08-22T11:26:00","guid":{"rendered":"https:\/\/int64software.com\/blog\/?p=263"},"modified":"2020-04-20T13:52:42","modified_gmt":"2020-04-20T13:52:42","slug":"installing-and-configuring-microsoft-laps-a-complete-guide-part-2","status":"publish","type":"post","link":"https:\/\/int64software.com\/blog\/2019\/08\/22\/installing-and-configuring-microsoft-laps-a-complete-guide-part-2\/","title":{"rendered":"Installing and Configuring Microsoft LAPS: A Complete Guide &#8211; Part 2"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"eaf6\">Introduction<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In our last article we showed how carry out a fresh install and configuration Microsoft\u2019s Local Administrator Password Solution (LAPS) in your Active Directory environment. If you haven\u2019t read that already, start by <a href=\"https:\/\/int64software.com\/blog\/2018\/07\/17\/installing-and-configuring-microsoft-laps-a-complete-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"In our last article we showed how carry out a fresh install and configuration Microsoft\u2019s Local Administrator Password Solution (LAPS) in your Active Directory environment. If you haven\u2019t read that already, start by following this link. (opens in a new tab)\">following this link<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">LAPS\n is an incredibly useful free tool provided by Microsoft to \nautomatically manage the Local Administrator account password for your \ndomain joined Windows computers, and is a security tool that any \norganisation with an Active Directory domain should have.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">However,  the client user interface it provides leave a lot to be desired as it  only works on Windows computers and is very simple in design. So today  we\u2019re going to take that one step further by installing and configuring <a rel=\"noreferrer noopener\" href=\"https:\/\/int64software.com\/overlaps\/\" target=\"_blank\">OVERLAPS<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a rel=\"noreferrer noopener\" href=\"https:\/\/int64software.com\/overlaps\/\" target=\"_blank\">OVERLAPS <\/a>is  a third party add-on for LAPS which provides a web interface, so you  can now access LAPS managed passwords from any device, including mobile  phones, while on the move.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"592\" height=\"650\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/02\/anim-browse-and-view-pwd.gif\" alt=\"Browsing for a computer and viewing its password in OVERLAPS for Microsoft LAPS.\" class=\"wp-image-462\"\/><figcaption>Browsing for a computer and viewing its password in OVERLAPS for Microsoft LAPS.<\/figcaption><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">This Guide<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">This guide will take you through the setup and configuration of OVERLAPS. However, it only contains a subset of the information available in the full Setup Guide which we recommend downloading (<a rel=\"noreferrer noopener\" aria-label=\"PDF available here (opens in a new tab)\" href=\"https:\/\/int64software.com\/overlaps\/about-demo\/\" target=\"_blank\">PDF available here)<\/a> for the full and very latest information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"3519\">System Requirements<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">We\u2019re  going to be installing OVERLAPS on a Windows Server 2016 box with  nothing else on it, but it can be installed on any Windows device after  Server 2012 R2 or Windows 10.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">OVERLAPS a really light-weight application, so we\u2019ve just setup a single core,  512Mb RAM virtual machine in Hyper-V for this demonstration, and it  really doesn\u2019t need more than that.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In\n the real world, we\u2019d probably recommend installing it on an existing \nhost so you\u2019re not paying for another Window licence. The only gotcha to\n watch out for is if another internet service is already using ports 80 \nor 443, but we\u2019ll cover that later.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">When it comes to actually using OVERLAPS, the web interface requires any modern web browser with JavaScript enabled.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"51ea\">Installation and Initial Configuration<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"0489\">Running the Bundle Installer<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"610\" height=\"53\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/install_0.png\" alt=\"\" class=\"wp-image-764\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/install_0.png 610w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/install_0-300x26.png 300w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><figcaption>OVERLAPS Pro MSI Installer<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Double click the OVERLAPS installer to start the installation process.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"529\" height=\"440\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/install_2.png\" alt=\"\" class=\"wp-image-766\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/install_2.png 529w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/install_2-300x250.png 300w\" sizes=\"auto, (max-width: 529px) 100vw, 529px\" \/><figcaption>OVERLAPS Pro EULA<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">The  End User Licence Agreement will display. There aren\u2019t any surprises in there though, so once you\u2019re happy check the \u201cI accept\u2026\u201d box and click Next.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">You may notice a command window popping up briefly. This is the database upgrade handler which is responsible for creating the database file if needed and, when installing version 2.0 for the first time, importing all of your configuration data into it.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Once the installation process has completed, you\u2019ll be shown a success message.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"509\" height=\"399\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/install_5.png\" alt=\"\" class=\"wp-image-767\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/install_5.png 509w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/install_5-300x235.png 300w\" sizes=\"auto, (max-width: 509px) 100vw, 509px\" \/><figcaption>OVERLAPS Pro Installation Completed<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">If  everything went to plan, you should now see the OVERLAPS service  installed and running. You can check this by running the Services system  tool (Start -&gt; Run -&gt; services.msc).<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"413\" height=\"21\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/service.png\" alt=\"\" class=\"wp-image-768\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/service.png 413w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/service-300x15.png 300w\" sizes=\"auto, (max-width: 413px) 100vw, 413px\" \/><figcaption>The OVERLAPS web service&nbsp;running<\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"b6bb\">Configuring the Server&nbsp;Port<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">If you notice the service isn\u2019t running, check the log file in the below folder for problems. The most common cause for failure is because another process is already serving HTTP content on port 80.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>C:\\ProgramData\\Int64 Software Ltd\\OVERLAPS<\/code><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">If  this happens, or if you want to change the port for another reason, you  can do so by editing the OVERLAPS configuration file (config.xml).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"708\" height=\"178\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/config-file-port.png\" alt=\"\" class=\"wp-image-769\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/config-file-port.png 708w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/config-file-port-300x75.png 300w\" sizes=\"auto, (max-width: 708px) 100vw, 708px\" \/><figcaption>Default Configuration File<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">By  default, the OVERLAPS is configured to use port 80 for unencrypted  (HTTP) traffic and port 443 for encrypted (HTTPS) traffic. Note that  HTTPS is not enabled by default as you first need to install a certificate either from a Certificate Authority, generated from your own root certificate, or using a Self-Signed certificate (<a href=\"https:\/\/int64software.com\/blog\/2020\/04\/20\/creating-a-self-signed-ssl-certificate-for-your-intranet-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/int64software.com\/blog\/2020\/04\/20\/creating-a-self-signed-ssl-certificate-for-your-intranet-services\/<\/a>).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The ports can be changed to any valid port number (1\u201365535), but remember to check a list of known ports (<a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_TCP_and_UDP_port_numbers\" rel=\"noreferrer noopener\" target=\"_blank\">such as this handy one on Wikipedia<\/a>, or <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/832017\/service-overview-and-network-port-requirements-for-windows\" rel=\"noreferrer noopener\" target=\"_blank\">this list of default ports used by Windows<\/a>) to make sure you don\u2019t conflict with anything.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Any changes to the configuration file require the OVERLAPS service to be  restarted. You can do this by right clicking the service and selecting  Restart (or just Start if the service is already stopped).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Installing your Licence File<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">If you have purchased an OVERLAPS licence then you will be able to generate and download a licence file from your Downloads section on our website. This file will need to be placed in the OVERLAPS data folder (see below) before it will work.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>C:\\ProgramData\\Int64 Software Ltd\\OVERLAPS\\<\/code><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">Once the file is in place, restart the OVERLAPS service. If it worked correctly, you will get the login page when going to the server\u2019s IP address\/hostname from a web browser. If you receive a licence error, try downloading the file again.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The OLCONFIG.EXE Tool (Replaces LAPSUSER.EXE)<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"675\" height=\"342\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/olconfig-start.png\" alt=\"\" class=\"wp-image-770\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/olconfig-start.png 675w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/olconfig-start-300x152.png 300w\" sizes=\"auto, (max-width: 675px) 100vw, 675px\" \/><figcaption>OLCONFIG.EXE<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">As of version 2.0, OVERLAPS replaced the legacy lapsuser configuration tool with the more comprehensive olconfig command line utility.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This tool still allows you to manage users, but also adds functionality for configuring Kerberos and installing SSL\/TLS certificates.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Command line help can be viewed for each function using the following commands:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>olconfig.exe user \/help\nolconfig.exe https \/help\nolconfig.exe security \/help<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"bf1f\">Configuring Kerberos for Added Login&nbsp;Security<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">By  default, the OVERLAPS web server will use the NT LAN Manager (NTLM) to  handle Integrated Authentication requests (as opposed to the form login  method). While this is fine for most cases, NTLM has been shown to be  vulnerable to certain Man-In-The-Middle attacks, so it is recommended  that you configure it to use Kerberos instead.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To configure Kerberos, you must define a Service Principal Name (SPN) for the server. You can do this in one of two ways: automatically using the \u201colconfig.exe\u201d command line tool included with OVERLAPS, or manually using the \u201csetspn.exe\u201d tool provided by Windows.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Configuring Kerberos using olconfig.exe<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Enabling Kerberos support using the olconfig.exe tool can be achieved very simply with one of the following commands depending on whether you are using HTTP, HTTPS or both HTTP and HTTPS (recommended).<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>olconfig.exe security \/enablekrb http\nolconfig.exe security \/enablekrb https\nolconfig.exe security \/enablekrb both<\/code><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">To check the current Kerberos status, you can use the command line:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>olconfig.exe security \/krbstatus<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Configuring Kerberos manually<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Alternatively, to register an SPN manually, use the command line:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Setspn.exe \u2013a HTTP(S)\/&lt;servername> &lt;machineaccount>$<\/code><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">Where \u201c<em>&lt;servername&gt;<\/em>\u201d is the name of the server OVERLAPS is installed on how a user would connect to it, and \u201c<em>&lt;machineaccount&gt;$<\/em>\u201d is the system account name of that device.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">So, for example, if our server was called \u201coverlaps\u201d (accessed as \u201c<em>http:\/\/overlaps\u201d<\/em>), and we wanted to configure both HTTP and HTTPS to support Kerberos, we\u2019d use the command lines:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>SetSPN \u2013a HTTP\/OVERLAPS OVERLAPS$\nSetSPN \u2013a HTTPS\/OVERLAPS OVERLAPS$<\/code><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">If, however, the server is accessed as \u201c<em>http:\/\/overlaps.contoso.com<\/em>\u201d, then we\u2019d use:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Setspn.exe \u2013a HTTP\/OVERLAPS.CONTOSO.COM OVERLAPS$<\/code><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">For more information on configuring Service Principal Names, please refer to Microsoft\u2019s documentation on the subject.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"9972\">Encrypted Web Traffic with&nbsp;HTTPS<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">To further increase security to OVERLAPS, we recommend that you install an SSL certificate so that your <em>client &lt;-&gt; server<\/em> traffic is encrypted.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">You\u2019ll  need to purchase or generate a certificate for this purpose (<a rel=\"noreferrer noopener\" href=\"https:\/\/int64software.com\/blog\/2020\/04\/20\/creating-a-self-signed-ssl-certificate-for-your-intranet-services\/\" target=\"_blank\">see here for a guide on creating a Self-Signed certificate<\/a>).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Configuring HTTPS using olconfig.exe<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">With your .pfx private key certificate in an accessible location, use the following command to bind it to OVERLAPS:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>olconfig.exe https \/certfile &lt;filename> &#91;\/password &lt;password>]<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Configuring HTTPS manually<\/strong><\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">1. Run mmc.exe<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">2. Go to File -&gt; Add\/Remove Snap-in<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">3. Select \u201cCertificates\u201d and click Add<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/1*oEemOExTAuzvbCeZofLi0g.png\" alt=\"\"\/><figcaption>Adding the Certificates Snap-in<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">4. Select \u201cComputer account\u201d when prompted<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/1*--z_pVXoMu1C717OIkQ1RA.png\" alt=\"\"\/><figcaption>Select \u201cComputer account\u201d<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">5. Select \u201cLocal computer: (the computer this console is running on)\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">6. Click Finish<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">7. Click OK to close the snap-in dialog<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">8. Navigate to Certificates -&gt; Personal<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">9. Right click and select All Tasks -&gt; Import<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">10. When prompted for a file to import, click Browse<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">11. Next to filename, where it says \u201c<em>X.509 Certificate (*.cer, *.crt)<\/em>\u201d, change this to \u201c<em>Personal Information Exchange (*.pfx, *.p12)<\/em>\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/1*VR6L1x8UuoQ06N0mC444Ag.png\" alt=\"\"\/><figcaption>Personal Information Exchange<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">12. Select your certificate\u2019s private key file<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">13. When prompted, enter the certificate\u2019s password and check the box to \u201cMark this key as exportable\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">14. Follow the rest of the dialog to complete the import.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">15. Once imported, right click the certificate and click \u201cOpen\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">16. Navigate to the Details tab, and scroll down to \u201cThumbprint\u201d, copy this value for use in the next step.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Linking (binding) your Certificate to OVERLAPS<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To link your certificate to OVERLAPS you need to use the \u201cnetsh\u201d command from the command prompt.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The command to add the certificate is:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Netsh  http add sslcert hostnameport=&lt;servername>:443  certhash=&lt;thumbprint of your certificate>  appid={7c492133\u2013379e-4918\u201382c3\u20131d8d2f9bee3a}<\/code><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">Where \u201c<em>&lt;servername&gt;<\/em>\u201d is the fully qualified name of your OVERLAPS server as a client would access it (e.g. <em>overlaps.contoso.com<\/em>), and \u201c<em>&lt;thumbprint of your certificate&gt;<\/em>\u201d is the value you copied at step 16 of the last section.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Be careful to make sure you copy the \u201c<em>appid<\/em>\u201d exactly as this identifies the OVERLAPS executable is what you want to attach the certificate to.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">You should receive the message \u201c<em>SSL Certificate successfully added<\/em>\u201d.\n If, however, you receive the message \u201cA specified logon session does \nnot exist\u201d, then the certificate is probably not installed in the \ncorrect store, check again that it is in the Personal folder of the \nCurrent Computer store (I\u2019ve made this mistake more times that I care to\n count!)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Once that is complete, you can now enable HTTP in the OVERLAPS configuration file.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/1*Z6MQuK6Pjp_Jc9N-Q2mDgQ.png\" alt=\"\"\/><figcaption>Enable HTTPS in&nbsp;OVERLAPS<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Remembering to restart the OVERLAPS service to register the change.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">After\n testing that this has worked, it is recommended that you then disable \nunencrypted HTTP traffic, which can also be done through the \nconfiguration file.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"fb68\">Adding the First Administrators<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Before  you can login for the first time, you must first add yourself as an  Administrator user. You can use the \u201colconfig.exe\u201d tool to do this. All subsequent users and  groups can be added from within OVERLAPS itself.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"676\" height=\"341\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/olconfig-user.png\" alt=\"\" class=\"wp-image-771\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/olconfig-user.png 676w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/olconfig-user-300x151.png 300w\" sizes=\"auto, (max-width: 676px) 100vw, 676px\" \/><figcaption>OVERLAPS User Manager&nbsp;Utility<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">To add yourself, use the command line:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>olconfig.exe user &lt;myusername> \/add \/admin<\/code><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">If everything works then you should receive a success message.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"678\" height=\"98\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/olconfig-user-success.png\" alt=\"\" class=\"wp-image-772\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/olconfig-user-success.png 678w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/olconfig-user-success-300x43.png 300w\" sizes=\"auto, (max-width: 678px) 100vw, 678px\" \/><figcaption>User Added Successfully<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Active Directory<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Multiple Domain Forest Support<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">From version 1.3.4 OVERLAPS now supports multiple domain environments with a properly configured trust relationship.<br><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Navigation<\/strong><br>By default, when populating Organizational Units, OVERLAPS will look to the root domain of the forest and from there discover any accessible child domains. However this can be modified from the configuration file by changing the \u201cMultipleDomainPreference\u201d value to the following:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>\u201cRootFirst\u201d (Default)<\/em><\/strong><br>Seeks the root domain in the current Forest and then attempts to include child domains.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>\u201cMemberFirst\u201d<\/em><\/strong><br>Selects the domain that the OVERLAPS server is a member of first, and then attempts to include any other domains in the current Forest (including the root if it is not the same).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>&#8220;SingleDomainOnly&#8221;<\/em><\/strong><br>Limits OVERLAPS to the domain that its server is in only. No attempt will be made to attempt to read any other domains in the Forest.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Authentication<\/strong><br>In this latter mode, user authentication is also limited to the current domain. Otherwise in a multi-domain environment, users will be prompted for their domain prior to logging in (or have to supply it in the form \u201cdomain\\username\u201d in the case of Windows Integrated Authentication).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Universal Groups are supported for user login, as are per-domain groups. When adding a user or group in a multi-domain environment, you will be prompted for the domain that the user belongs to.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Note that currently, the \u201clapsuser.exe\u201d program only supports local domain users.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Permissions<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">In order to view and (in the case of OVERLAPS Pro) modify the Microsoft LAPS managed Local Administrator passwords, OVERLAPS requires the following Active Directory Organizational Unit permissions to the containers in which the managed computers reside:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Read ms-McsAdmPwd<\/li><li>Read ms-Mcs-AdmPwdExpirationTime<\/li><li>Write ms-Mcs-AdmPwdExpirationTime<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Configuring just these permissions correctly can lead to unexpected behaviour, so it is recommended to make use of the PowerShell scripts that come with Microsoft LAPS to set them.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">As OVERLAPS runs as Local System on the host server, you will need the server\u2019s computer account name to proceed. This should be the name of the server followed by a dollar sign ($), so if the server is called \u201cmyoverlaps\u201d for example, the computer account name would be \u201cmyoverlaps$\u201d.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Launch PowerShell using an account which has the necessary Active Directory modification permissions.<\/li><li>Load the LAPS module by typing:<br> <em>Import-Module AdmPwd.PS<\/em><\/li><li>Grant read permission to the Local Administrator password property with the command:<br> <em>Set-AdmPwdReadPasswordPermission -OrgUnit  -AllowedPrincipals<\/em> <\/li><li>If using OVERLAPS Pro, also grant write permission to that you can reset the password expiry time, forcing a reset when LAPS next runs on the client:<br><em>Set-AdmPwdResetPasswordPermission -OrgUnit  -AllowedPrincipals<\/em><\/li><li>Restart the OVERLAPS service to make sure it picks up the new permissions.<\/li><\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">If everything went to plan, OVERLAPS will now be able to view and, in Professional, trigger a reset of the Local Administrator passwords.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Multi-Domain Permissions<\/strong><br>In multi-domain environments, these permissions may need to be manually applied to each domain.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"6979\">Additional Configuration Options<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"ce45\">The Configuration File<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">As mentioned previously, OVERLAPS stored all of its configuration options in an XML file at:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>C:\\ProgramData\\Int64 Software Ltd\\OVERLAPS\\config.xml<\/em><\/p><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">You  must have Administrator rights on the server to modify this file and  any changes require the OVERLAPS service to be restarted.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"8da2\">Specific Settings<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Most of the settings in the configuration file can be modified easily from within the \u201cConfig\u201d page of OVERLAPS. However, some settings are considered \u201cinternal\u201d and cannot be changed from within OVERLAPS, or there may occasions when being able to modify values manually could be advantageous. For this reason, some of the key values are shown below.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>HTTPEnabled\/HTTPSEnabled<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If \u201ctrue\u201d, enables the respective type of traffic (unencrypted HTTP or encrypted HTTPS).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>HTTPPort\/HTTPSPort<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The port that will be opened for HTTP or HTTPS traffic respectively (default 80 and 443).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>ThreadLimit<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The  maximum number of concurrent requests that the web host can handle. If  you have a large user base and start noticing the website becoming  sluggish, then you may wish to increase this value.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>MaxInputStreamSizeBytes and MaxInputVarsPerRequest<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">These values control the limitations on data posted to the server during a web request. They are designed to limit the thread of a denial of service attack or flooding the server. The only time these values may need to be modified is if you operate a particularly large number of Organizational Units in your domain.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>DateFormat<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While a small selection of standard formats are provided for selection from the Config page, this allows you to specify a custom date format using standard date format characters (see <a rel=\"noreferrer noopener\" href=\"https:\/\/docs.microsoft.com\/en-us\/dotnet\/standard\/base-types\/standard-date-and-time-format-strings\" target=\"_blank\">https:\/\/docs.microsoft.com\/en-us\/dotnet\/standard\/base-types\/standard-date-and-time-format-strings<\/a>). Do not use this to specify time format values.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>LDAPPort<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Change this if you need OVERLAPS to connect to Active Directory using a different LDAP port.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>EnforceWIA<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If set to \u201ctrue\u201d, the user login page will be disabled and OVERLAPS will only accept Windows Integrated Authentication logins.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>UpdateCheckFrequencyDays<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">How frequently (in days) OVERLAPS should check for program updates. Updates are not installed automatically, but this is just used to put a flag in the page footer to notify you that an update is available. Set this to \u201c0\u201d to disable update checks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"d24c\">User Interface<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"680\" height=\"30\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/main-menu.png\" alt=\"\" class=\"wp-image-773\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/main-menu.png 680w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/main-menu-300x13.png 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption>The OVERLAPS Main Menu<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The main menu provides access to all of OVERLAPS pages. The items available depend on the permissions of the currently logged in user.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Browser<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"804\" height=\"638\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/browser-active-dir.png\" alt=\"\" class=\"wp-image-774\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/browser-active-dir.png 804w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/browser-active-dir-300x238.png 300w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/browser-active-dir-768x609.png 768w\" sizes=\"auto, (max-width: 804px) 100vw, 804px\" \/><figcaption>Browsing Active Directory in OVERLAPS<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The Active Directory Browser window allows you to quickly navigate your Active Directory structure for a particular Organizational Unit. Click a container to select it, then click again to open to that page.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Duplicate Containers in the Browser<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Some users may experience duplicate containers showing in their browser like the example below.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"221\" height=\"348\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/browser-duplicate-entry-points-marked.png\" alt=\"\" class=\"wp-image-775\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/browser-duplicate-entry-points-marked.png 221w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/browser-duplicate-entry-points-marked-191x300.png 191w\" sizes=\"auto, (max-width: 221px) 100vw, 221px\" \/><figcaption>Duplicate containers in the Browser window<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">This occurs when a user is granted permissions to containers through more than one combination of groups or direct (explicit) membership. In this example, the user is explicitly defined in the OVERLAPS user list and is granted full access to the \u201cmdomain\u201d domain. However, they are also a member of a Security Group which was added to OVERLAPS and given permission to the \u201cClients\u201d Organizational Unit. Because of the way that OVERLAPS now dynamically populates this tree, they are therefore seeing both entry points into the domain.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This is not anything to be concerned about, and it should not impact on the user\u2019s experience. However, if you wish to avoid this, try to limit the number groups that users are a member of and keep your permissions simple.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Computer List<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"711\" height=\"199\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/computer-list.png\" alt=\"\" class=\"wp-image-776\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/computer-list.png 711w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/computer-list-300x84.png 300w\" sizes=\"auto, (max-width: 711px) 100vw, 711px\" \/><figcaption>An Active Directory container with Computers<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">When a valid container with computers is selected, you will see the computers in a list. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Viewing a Computer&#8217;s Local Administrator Password<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">From here you can click on a computer to display its LAPS managed Local Administrator password.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"502\" height=\"372\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/current-password-modal.png\" alt=\"\" class=\"wp-image-777\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/current-password-modal.png 502w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/current-password-modal-300x222.png 300w\" sizes=\"auto, (max-width: 502px) 100vw, 502px\" \/><figcaption>Viewing a single computer&#8217;s password in OVERLAPS<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">From this window you can click the \u201cCopy to Clipboard\u201d\nbutton to have the password copied to your system clipboard. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">You can also click \u201cExpire Password\u201d to trigger a password reset on the computer. Note that this will happen when the computer next performs a Group Policy update.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Phonetic Alphabet View<\/h4>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"479\" height=\"275\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/phonetic-alphabet-computer-nato-full-cropped.png\" alt=\"\" class=\"wp-image-778\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/phonetic-alphabet-computer-nato-full-cropped.png 479w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/phonetic-alphabet-computer-nato-full-cropped-300x172.png 300w\" sizes=\"auto, (max-width: 479px) 100vw, 479px\" \/><figcaption>Phonetic Alphabet view of a password<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Clicking the phone tab button switches the view to the Phonetic Alphabet view. There are several of these available (selected the Config page), this example shows the full NATO version.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Batch Password Retrieval<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Clicking the \u201cDisplay Passwords for Selected Computers\u201d button will retrieve the current password information for all of the selected computers. When retrieved, passwords are blurred for security reasons and can be displayed by hovering over the password or toggled between blurred and displayed by clicking. <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"686\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/03\/overlaps-1.2-ui-batch-1200x686.png\" alt=\"Batch Password Retrieval in OVERLAPS\" class=\"wp-image-549\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/03\/overlaps-1.2-ui-batch-1200x686.png 1200w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/03\/overlaps-1.2-ui-batch-300x172.png 300w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/03\/overlaps-1.2-ui-batch-768x439.png 768w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/03\/overlaps-1.2-ui-batch.png 1247w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><figcaption>Batch Password Retrieval in OVERLAPS<\/figcaption><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Computer Status Alerts<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\"> Each computer may show an alert icon on the right side of its entry. This indicates that the state of that computer\u2019s LAPS managed password: <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"25\" height=\"30\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/03\/overlaps-1.2-expired.png\" alt=\"\" class=\"wp-image-550\"\/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">This symbol indicates that the LAPS password has expired and is due to be refreshed by the system. If this remains in this state for a long time, it may indicate that the computer is not processing its LAPS policy correctly.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"33\" height=\"35\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/03\/overlaps-1.2-notset.png\" alt=\"\" class=\"wp-image-551\"\/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">This alert indicates that the computer does not have any LAPS password data in Active Directory. If your LAPS installation is new, or the computer has only recently been added then this may be normal.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Notifications<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">If you have configured an email server then the Notifications system becomes available. When this happens, a new button will appear in each container.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"205\" height=\"48\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/manage-notifications-button.png\" alt=\"\" class=\"wp-image-780\"\/><figcaption>Manage Notifications button<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Clicking this brings up the Manage Notifications window where you can set or remove what notifications you want to receive and how often.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"810\" height=\"683\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/manage-notifications.png\" alt=\"\" class=\"wp-image-779\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/manage-notifications.png 810w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/manage-notifications-300x253.png 300w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/manage-notifications-768x648.png 768w\" sizes=\"auto, (max-width: 810px) 100vw, 810px\" \/><figcaption>Manage Notification Settings for this Container<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">You can have notifications sent to you when anyone reads the password of a computer in this Organisational Unit, expires a password, or both.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Setting the Maximum Notification Frequency will prevent you receiving a notification every time one of these actions happens. Instead they will be grouped together and only sent at the specified frequency.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Finally, you can opt to also apply these notification settings to every Organisational Unit under the currently open container by checking the \u201cApply to all child containers\u201d box.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">History<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Navigating to the History section allows you to view historical data from users using OVERLAPS. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1093\" height=\"432\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/history.png\" alt=\"\" class=\"wp-image-781\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/history.png 1093w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/history-300x119.png 300w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/history-768x304.png 768w\" sizes=\"auto, (max-width: 1093px) 100vw, 1093px\" \/><figcaption>Viewing Event History in OVERLAPS<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The \u201cAction\u201d provides a quick reference image for each possible type of event that is recorded, where the \u201cMessage\u201d field provides more detailed information.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">You can filter the History log by Date, Text (both the username and message fields are searched), or by the type of action by using the \u201cActions\u201d menu and checking the boxes for the type of events you want to see.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"659\" height=\"401\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/history-filter.png\" alt=\"\" class=\"wp-image-782\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/history-filter.png 659w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/history-filter-300x183.png 300w\" sizes=\"auto, (max-width: 659px) 100vw, 659px\" \/><figcaption>Filtering the History<\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Search<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"501\" height=\"74\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/computer-search.png\" alt=\"\" class=\"wp-image-783\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/computer-search.png 501w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/computer-search-300x44.png 300w\" sizes=\"auto, (max-width: 501px) 100vw, 501px\" \/><figcaption>Initiating a Computer Search<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Clicking the Search menu item will present you with a dialog to find computers by their hostname. OVERLAPS will remember the last 10 searches you performed within 30 days and allow you to select from them to perform the search again.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Search results are grouped by Active Directory container, and function just like a normal computer list.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Clicking your search term at the top of the results allows you to refine your search or to include the computer\u2019s description in the search.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"922\" height=\"291\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/03\/overlaps-1.2-search-refine.png\" alt=\"Refining a Computer Search\" class=\"wp-image-554\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/03\/overlaps-1.2-search-refine.png 922w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/03\/overlaps-1.2-search-refine-300x95.png 300w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/03\/overlaps-1.2-search-refine-768x242.png 768w\" sizes=\"auto, (max-width: 922px) 100vw, 922px\" \/><figcaption>Refining a Computer Search<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Self Service<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The Self Service feature allows you to specify individual computers that a user will have permission to retrieve the Administrator password for.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If a user has Self Service computers assigned to them, they will receive an additional menu item (note: if the user has no other Active Directory permissions, then the Browse button will not be available to them).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Computers can be assigned to users in one of two ways when setting up Self Service for that user\/group:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>By manually and individually adding the computers,<\/li><li>By checking the \u201cInclude Computers Managed by the User(s)\u201d checkbox.<\/li><\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">The latter option will allow the user (or member users if it is a group) to access the passwords for computers which they are identified as the owner of through the Active Directory \u201cManaged By\u201d option.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">When they log in, or click Self-Service menu button, the user will be shown their list of Self Service computers and a button for displaying the current Local Administrator password.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1115\" height=\"203\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/self-service-computer-list.png\" alt=\"\" class=\"wp-image-784\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/self-service-computer-list.png 1115w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/self-service-computer-list-300x55.png 300w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/self-service-computer-list-768x140.png 768w\" sizes=\"auto, (max-width: 1115px) 100vw, 1115px\" \/><figcaption>Self Service Computer<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">All the user needs to do is click the \u201cView Password\u201d button to display that computer\u2019s password.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Profile<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Each user now has a few settings that they can change regarding their own experience within OVERLAPS. They get to this by clicking the Profile main menu item.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Language<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">We have done all of the back-end work required to introduce multiple language support to OVERLAPS now, and we will start to add additional languages as we get the translations done. For now, however, this just acts as a placeholder.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Two Factor Authentication (2FA\/TFA\/MFA)<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Two Factor Authentication (or Multi-Factor Authentication) allows users to further secure their account by requiring the use of a compatible One-Time Password generating app (such as Google Authenticator) on their smartphone.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">With this enabled, logging in from a new device will prompt the user to enter an additional code as well as their username and password. The device can then be \u201cremembered\u201d, so they do not need to enter a code the next time, or they can continue to be prompted. Remembered devices are only validated for 30 days, after which they will need to provide a fresh Two Factor Authentication token.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This adds an additional layer of security so that just knowing someone\u2019s domain username and password is not enough to login to OVERLAPS, and it is recommended for all users.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"503\" height=\"631\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/tfa-enable_2.png\" alt=\"\" class=\"wp-image-786\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/tfa-enable_2.png 503w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/tfa-enable_2-239x300.png 239w\" sizes=\"auto, (max-width: 503px) 100vw, 503px\" \/><figcaption>Enabling Two Factor Authentication<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">We recommend, and have tested extensively, using the official Google Authenticator app available on the Android Play Store and the Apple App Store.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Other compatible apps may also work.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Once enabled, the user will immediately be taken to the TFA authentication screen to confirm their code. This is the same screen they will see when a new token is required during login.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"673\" height=\"552\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/tfa-login.png\" alt=\"\" class=\"wp-image-787\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/tfa-login.png 673w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/tfa-login-300x246.png 300w\" sizes=\"auto, (max-width: 673px) 100vw, 673px\" \/><figcaption>Logging in with TFA enabled<\/figcaption><\/figure><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">Remembering your Last Container<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Checking this box means that whenever you open the homepage or the Browser window, you will automatically be taken back to the last Organizational Unit that you visited.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Configuration<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Use the Config menu item to take you to the OVERLAPS configuration page. Only users with the \u201cEdit Settings\u201d permission are able to view this page.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Users and Groups<\/h4>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1055\" height=\"208\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-user-list.png\" alt=\"\" class=\"wp-image-788\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-user-list.png 1055w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-user-list-300x59.png 300w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-user-list-768x151.png 768w\" sizes=\"auto, (max-width: 1055px) 100vw, 1055px\" \/><figcaption>Managing Users and Groups in OVERLAPS<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Users are managed through the Config page\u2019s Users and Groups section.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Here you will see a list of all of the users and groups that have been added to OVERLAPS and have the ability to edit or remove them.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Add a New User or&nbsp;Group<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To add a user, click the \u201cNew User\/Group\u201d, a window will appear allowing you to enter the user or group\u2019s account (user) name.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"503\" height=\"547\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-add-user.png\" alt=\"\" class=\"wp-image-790\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-add-user.png 503w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-add-user-276x300.png 276w\" sizes=\"auto, (max-width: 503px) 100vw, 503px\" \/><figcaption>Add a New User or Group to OVERLAPS<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Start typing the username and OVERLAPS will search Active Directory for potential matches for you to select from.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Here you may also select whether the user should be granted Administrator privileges and whether they should be able to view the event history or not.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Edit a User<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Select one or more users or groups by checking their entry in the user list, the click the Edit User button to see the options available. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">When editing multiple users, you will be shown a dropdown with the selected users.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"460\" height=\"187\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/03\/overlaps-1.2-user-ad-perm-list.png\" alt=\"List of Users\/Groups currently selected for edit\" class=\"wp-image-558\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/03\/overlaps-1.2-user-ad-perm-list.png 460w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/03\/overlaps-1.2-user-ad-perm-list-300x122.png 300w\" sizes=\"auto, (max-width: 460px) 100vw, 460px\" \/><figcaption>List of Users\/Groups currently selected for edit<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Clicking a user will deselect them, and any changes made when clicking \u201cSave Changes\u201d will not apply to them. Clicking the user again will re-select them.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Rate Limits<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"804\" height=\"472\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-edit-rate-limit-requests.png\" alt=\"\" class=\"wp-image-794\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-edit-rate-limit-requests.png 804w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-edit-rate-limit-requests-300x176.png 300w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-edit-rate-limit-requests-768x451.png 768w\" sizes=\"auto, (max-width: 804px) 100vw, 804px\" \/><figcaption>OVERLAPS User Rate Limits<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">You can set a configurable limit on users and groups which controls how many: a) Password Requests, and b) Password Resets, those users can perform in a given time period.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This can be useful to prevent over-exposure of your Local Administrator passwords, and to prevent a user from mass-exporting them.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Password Request limits and Password Reset limits can be controlled independently. To set a limit:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Click the checkbox to Enable the limit you want to impose,<\/li><li>Specify a maximum number of requests (Maximum Requests\/Resets) that can be performed in a specific time frame,<\/li><li>Specify the time span and period that this will be monitored over,<\/li><li>If the user(s) attempt more than the maximum requests in the given time period, they will be blocked.<\/li><\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">For example, for a normal user you may want them to stay under 25  requests per day, so you would set it to &#8211; Maximum: 25, Every: 1,  Period: Day.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>A warning note on group memberships<\/strong><br>In order to handle multi-group membership in an efficient and minimally  complex way, there is an important point to remember. Where a user is a  member of multiple groups, each with its own rate limit, OVERLAPS will  select the lowest value all of the rate limit time periods AND the  minimum number of requests.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This  means if you have a group with a limit of <strong>5 requests every day<\/strong>, and  another with a limit of <strong>25 requests every 10 minutes<\/strong>, a member of both  groups will end up with the limit <strong>5 requests every 10 minutes<\/strong>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This is done to be in-line with least privilege best practices. If the  need arises to override the rate limit a user is experiencing because of  their group memberships, the correct way would be to add the user  explicitly to OVERLAPS as explicit users always take priority over group  memberships. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>User Access Level<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"501\" height=\"510\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-edit-site-access.png\" alt=\"\" class=\"wp-image-795\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-edit-site-access.png 501w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-edit-site-access-295x300.png 295w\" sizes=\"auto, (max-width: 501px) 100vw, 501px\" \/><figcaption>Editing a User&#8217;s Access Level<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">This window allows you to change the overall access that the user(s) have to the OVERLAPS website.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Administrators (users with the Edit Settings permission) have full access to every Active Directory container, and the ability to modify users and site settings. This should be limited to only a few trusted users.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">People with \u201cView History\u201d permission have the ability to view a history of all actions undertaken within OVERLAPS. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">When editing multiple users, setting an option to \u201cNo Change\u201d means that no changes to each users\u2019 current access will be made. Setting it to \u201cRemove\u201d disables the selected access for all selected users, and \u201cEnable\u201d will grant the selected access. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Remove a User<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"502\" height=\"502\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-remove.png\" alt=\"\" class=\"wp-image-796\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-remove.png 502w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-remove-300x300.png 300w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/settings-users-remove-150x150.png 150w\" sizes=\"auto, (max-width: 502px) 100vw, 502px\" \/><figcaption>Removing a User\/Group from OVERLAPS<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Selecting one or more users and clicking the \u201cRemove\u201d button will prompt you to confirm that you want to remove the user completely from OVERLAPS.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Active Directory Permissions<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">The user-based permissions have now been replaced with a much simpler Organizational-Unit-based permissions. This is now more like the permissions you would expect to see in Windows or Active Directory itself.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The Permissions section is split vertically into two parts: A navigation tree for finding the container you want to edit, and a list of the Users\/Groups who have permission to the currently selected container.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1049\" height=\"649\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/container-permissions-interface.png\" alt=\"\" class=\"wp-image-792\" srcset=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/container-permissions-interface.png 1049w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/container-permissions-interface-300x186.png 300w, https:\/\/int64software.com\/blog\/wp-content\/uploads\/2020\/04\/container-permissions-interface-768x475.png 768w\" sizes=\"auto, (max-width: 1049px) 100vw, 1049px\" \/><figcaption>Managing user Active Directory permissions<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">With a valid container selected, you can add or remove users using the relevant buttons, and change their permissions (see below) accordingly, but the permissions are only saved when you click the Save Changes button.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For a full list of the permissions available, see the Setup Guide (<a rel=\"noreferrer noopener\" href=\"https:\/\/int64software.com\/download\/74\/\" target=\"_blank\">download<\/a>).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Settings, Host and Email Settings<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">The Settings, Host and Email sections provide access to the OVERLAPS configuration options. For a full explanation of each option, please consult the Setup Guide (<a href=\"https:\/\/int64software.com\/download\/74\/\" target=\"_blank\" rel=\"noreferrer noopener\">download<\/a>).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"5d99\">Conclusion<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Congratulations!\n You now have an incredible simple yet powerful interface to the \nwonderful security benefits offered by Microsoft LAPS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In our last article we showed how carry out a fresh install and configuration Microsoft\u2019s Local Administrator Password Solution (LAPS) in your Active Directory environment. Today we&#8217;re going to continue that by installing OVERLAPS, a web interface to Microsoft&#8217;s LAPS.<\/p>\n","protected":false},"author":1,"featured_media":480,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[47,16,50,7],"tags":[24,62,23,9,21],"class_list":["post-263","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-laps","category-overlaps","category-security","category-tutorial","tag-laps","tag-microsoft","tag-password","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/posts\/263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/comments?post=263"}],"version-history":[{"count":6,"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/posts\/263\/revisions"}],"predecessor-version":[{"id":797,"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/posts\/263\/revisions\/797"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/media\/480"}],"wp:attachment":[{"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/media?parent=263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/categories?post=263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/tags?post=263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}