{"id":316,"date":"2018-12-03T13:36:08","date_gmt":"2018-12-03T13:36:08","guid":{"rendered":"https:\/\/int64software.com\/blog\/?p=316"},"modified":"2019-03-08T10:44:03","modified_gmt":"2019-03-08T10:44:03","slug":"why-arent-you-using-microsofts-local-administrator-password-solution-laps-yet","status":"publish","type":"post","link":"https:\/\/int64software.com\/blog\/2018\/12\/03\/why-arent-you-using-microsofts-local-administrator-password-solution-laps-yet\/","title":{"rendered":"Why aren&#8217;t you using Microsoft&#8217;s Local Administrator Password Solution (LAPS) yet?"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">We sysadmins have many concerns over security. Whether you manage 100 or 10,000 devices, effectively securing your devices will lead you down the same routes of discussion. You\u2019ve deployed a respected antivirus solution, locked down Group Policy, and monitor for the slightest indication that you may be under attack. However, breaches still occur. Today we&#8217;re going to look at one of the frequent targets of these attacks: the Windows Local Administrator account. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Standard Operating Procedure is to disable the account, <a rel=\"noreferrer noopener\" aria-label=\"SOP is to disable the account, but they find ways to re-enable it, so you need to make sure it has a secure, non-recurring and frequently changed password. So what options do you have? (opens in a new tab)\" href=\"https:\/\/www.recoverywindowspassword.com\/enable-hiddem-admin-account-on-windows.html\" target=\"_blank\">but they find ways to re-enable it<\/a>, so you need to make sure it has a secure, non-recurring and frequently updated password. So what options do you have?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Options for Securing the Local Administrator Account<br><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The first option is one you should never adopt: setting the admin password to the same thing on all devices. This turns every device into a possible attack vector, and opens your network up to lateral attacks. The attacker can now gain admin rights to every Windows device.<br><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The second option to avoid is one I\u2019ve seen (and been forced to implement) in multiple places: the formulaic approach. By taking some value unique to each device and combining or encoding it with date values and nonce data to produce a different, but predictable password for each device.  What\u2019s wrong with this approach? <\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Your formula must be simple enough to calculate by hand, because your Service Desk team are going to need to use it in the field.<\/li><li>People who know the formula may leave your company, and take the knowledge with them.<\/li><li>If just one password on one device is brute-forced, it would an easy process to reverse engineer its formula.<\/li><\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">One way or another someone undesirable could learn the formula, and that\u2019s a bad thing, because now they have Administrator access to all of your devices.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The third, and final option provides a solid solution to all of the problems with the previous options: Microsoft LAPS (Local Administrator Password Solution) [<a rel=\"noreferrer noopener\" aria-label=\"Microsoft\u2019s free LAPS product is a solution to this problem (download version 6.2 here). (opens in a new tab)\" href=\"https:\/\/www.microsoft.com\/en-ca\/download\/details.aspx?id=46899\" target=\"_blank\">download version 6.2 here<\/a>].<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Microsoft LAPS Solution<br><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft LAPS deploys a tiny DLL to each device which is launched each time a Group Policy refresh occurs (so not a client as such, and it won\u2019t impact on your device performance). When it detects that a password refresh is due (based on the last time the password was set and how often you specify it should occur in Group Policy), it generates a cryptographically secure random password of a defined length and complexity, applies this to the Local Administrator account and records the password in a secure field in your Active Directory schema.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">You then control, through AD permissions, who can read this password value for each and every Windows device (hint: it is not recommended to use this on domain controllers of course!). This takes the onus of updating passwords regularly off of you and your Service Desk staff, guarantees a secure and completely unique password for each device.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Microsoft LAPS Pros and Cons<\/h2>\n\n\n\n<div class=\"wp-block-columns has-2-columns is-layout-flex wp-container-core-columns-is-layout-8f761849 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Pros<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Installation and setup can be done in 10 minutes<\/li><li>Increased device security<\/li><li>Unique admin passwords on each device<\/li><li>Automatic password changes on a schedule<\/li><li>Easily managed by GPO<br><\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Cons<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Requires a minor change to your AD schema<\/li><li>&#8230; that&#8217;s all I&#8217;ve got!<br><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">So it is pretty obvious that if you run a decent size Active Directory managed network of Windows computers, you\u2019re going to want to seriously think about making use of Microsoft LAPS. To further help you to take that leap, we\u2019ve prepared a few guides to show you how easy it is to setup, see the links below.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/int64software.com\/blog\/2018\/07\/17\/installing-and-configuring-microsoft-laps-a-complete-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Installing and Configuring Microsoft LAPS: A Complete Guide Part 1  (opens in a new tab)\">Installing and Configuring Microsoft LAPS: A Complete Guide Part 1<\/a> <\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/int64software.com\/blog\/2018\/11\/08\/installing-and-configuring-microsoft-laps-a-complete-guide-part-2\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Installing and Configuring Microsoft LAPS: A Complete Guide Part 2 (opens in a new tab)\">Installing and Configuring Microsoft LAPS: A Complete Guide Part 2<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a rel=\"noreferrer noopener\" aria-label=\"A Look at the Microsoft LAPS Group Policy Settings\n (opens in a new tab)\" href=\"https:\/\/int64software.com\/blog\/2018\/06\/28\/a-look-at-the-microsoft-laps-group-policy-settings\/\" target=\"_blank\">A Look at the Microsoft LAPS Group Policy Settings<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">An Alternative to the Microsoft LAPS Management Tools<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">If you&#8217;re serious about deploying Microsoft LAPS (you should be), then you may want to consider also implementing an alternative to the rather simplistic management tools that are provided by default.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>OVERLAPS <\/strong>is a self-hosted web UI for LAPS which provides a quick, easy to use way of retrieving and expiring LAPS managed Local Administrator passwords for your devices. <a rel=\"noreferrer noopener\" aria-label=\"You can find out more here. (opens in a new tab)\" href=\"https:\/\/int64software.com\/overlaps\/\" target=\"_blank\">You can find out more here.<\/a><br><br><br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"592\" height=\"650\" src=\"https:\/\/int64software.com\/blog\/wp-content\/uploads\/2019\/02\/anim-browse-and-view-pwd.gif\" alt=\"Browsing for a computer and viewing its password in OVERLAPS for Microsoft LAPS.\" class=\"wp-image-462\"\/><figcaption>Browsing for a computer and viewing its password in OVERLAPS for Microsoft LAPS.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Thanks<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Thanks for reading, I hope it helps you in your quest for network security. If you liked this article, I\u2019d really appreciate it if you could share it with your friends and colleagues. We\u2019re dedicated to providing as many great resources as we can to help out our IT Service Desk friends, so you\u2019d be helping us massively by getting the message out there.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft LAPS (Local Administrator Password Solution) is a free tool for Active Directory environments which automatically creates, sets and stores cryptographically secure passwords on your local administrator accounts. It&#8217;s powerful, free and it improves your security. So why aren&#8217;t you using it yet?<\/p>\n","protected":false},"author":1,"featured_media":317,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[13,14,47,16,50,27],"tags":[79,78,24,62,20,9],"class_list":["post-316","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-int64-software","category-microsoft-laps","category-overlaps","category-security","category-tools","tag-hacking","tag-infosec","tag-laps","tag-microsoft","tag-overlaps","tag-security"],"_links":{"self":[{"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/posts\/316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":4,"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/posts\/316\/revisions"}],"predecessor-version":[{"id":539,"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/posts\/316\/revisions\/539"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/media\/317"}],"wp:attachment":[{"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/media?parent=316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/categories?post=316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/int64software.com\/blog\/wp-json\/wp\/v2\/tags?post=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}