1. Introduction

Welcome to the official documentation for OVERLAPS for Windows LAPS.

1.1 Introducing Windows LAPS

Windows Local Administrator Password Solution (LAPS) is a free tool for securing the Windows computers in your Active Directory environment.

By performing scheduled resets on the Local Administrator account passwords on your domain-joined computers, LAPS helps to mitigate the threat of "Pass-the-Hash" type attacks against your network. It generates new passwords completely randomly, bypassing the need for shared or formulaic passwords, and stores them securely in either your on-site Active Directory or Microsoft Entra (Azure Active Directory) for the use of your Service Desk teams.

Its benefits include:

  • Protection against pass-the-hash and lateral-traversal attacks
  • Improved security for remote help desk scenarios
  • Ability to sign in to and recover devices that are otherwise inaccessible
  • A fine-grained security model (access control lists and optional password encryption) for securing passwords that are stored in Windows Server Active Directory
  • Support for the Azure role-based access control model for securing passwords that are stored in Microsoft Entra (Azure AD)

1.1.1 Microsoft LAPS vs Windows LAPS

Microsoft LAPS refers to the legacy version of the Local Administrator Password Solution, which was the version that had to be installed manually on your client devices.

Windows LAPS is the new client released by Microsoft to replace the legacy version, and has been deployed by default to all Windows 10 and 11 (Pro, Enterprise and EDU edition) devices with the Cumulative Update for April 2023.

This new client offers additional benefits over the legacy version, including Encryption when storing the passwords in Active Directory, and a password history for retrieving previous passwords (for situations such as using System Restore to recover a device back to a time before the last password reset).

1.1.2 How does LAPS work?

LAPS is a Client Side Extension (CSE) to Group Policy released for free by Microsoft. It creates new protected attributes in your Active Directory schema for computer objects which are used to store the computer's Local Admin password and expiry information. On devices on which it is enabled, it works by:

  1. LAPS retrieves the current expiry date and time for the Local Administrator password on the current computer from Active Directory.
  2. If the expiry is not blank and is still in the future, nothing happens.
  3. Otherwise a new password is required, so LAPS generates one completely randomly according to your specifications (set in Group Policy).
  4. LAPS then attempts to record the new password in Active Directory, along with when the password will next expire.
  5. If that was successful, it will only then actually change the password of the Local Administrator account.

1.1.3 What is a Pass-the-Hash attack?

Windows accounts are stored hashed (one-way encrypted) and are, in principal, accessible to anyone with access to that computer. A pass-the-hash attack uses this hash in place of the actual password to access resources on other computers on your network with the same account/password.

LAPS mitigates the threat of pass-the-hash attacks by ensuring each computer has a different password (and therefore a different hash) for their Local Administrator account.

1.1.4 What does LAPS cost?

Windows LAPS, which replaces the legacy client, was released as part of the April 2023 Cumulative Update for free, and will likely already be installed on your Windows 10 and 11 devices (Pro, Enterprise and EDU editions only).

1.1.5 What management tools come with LAPS?

LAPS is packaged with a PowerShell module for retrieving and manually expiring passwords.

1.1.6 Further Reading

For more information on Microsoft LAPS, please see the links below.

Why aren't you using Microsoft LAPS yet?

Dispelling Common Myths about Microsoft LAPS

For information about Windows LAPS, you can read more here:

Windows LAPS Overview

1.2 What is OVERLAPS?


OVERLAPS provides and alternative, self-hosted user interface for retrieving and expiring LAPS managed passwords through any modern browser on any network attached device. More than this, it removes the hassle of managing and maintaining Active Directory permissions for LAPS attributes by allowing you to specify which users or groups have access on a per-OU basis.

It provides:

  • Access to LAPS passwords whether they are set by the Legacy LAPS client or the new Windows LAPS update, whether they are encrypted or not.
  • The ability to expire passwords so that the client device resets it, which can be done immediately or at some specific point in the future.
  • Its own built-in configurable Password History.
  • Full granular permissions, offering more control over your environment than AD permissions alone can provide.
  • Self-Service access for assigning specific computers to individual users, instead of having to provide full OU access.
  • A full Request Authorisation system, allowing you provide access to LAPS passwords to your users while requiring them to submit an access request each time they do, which then can be manually authorised or denied.
  • A notification system so that you can monitor who is accessing what.
  • A full History which can be used for auditing purposes.
  • And more...

1.2.1 How does OVERLAPS work?

  1. You install it on a computer or server which will act as the web server for OVERLAPS.
  2. Configure your Active Directory permissions to allow that computer the appropriate access to the LAPS password and expiry attributes.
  3. Setup SSL/TLS encryption to make sure everything is secure.
  4. Add users and/or groups, and specify what Organizational Units or containers that they are allows to access.
  5. Users can now login to OVERLAPS and access the LAPS managed passwords as needed.

1.2.2 What are the limits/restrictions on OVERLAPS?

There aren't any. We don't specify a time limit, user limit or device limit.

1.2.3 Where can I purchase OVERLAPS?

There are three options available to you to purchase OVERLAPS:

1. Purchase directly from us using a Credit or Debit card

Click here to go to the store page and follow the on-screen instructions.

2. Request an invoice

If you would prefer to receive an invoice and have payment handled by your Finance department, contact us or fill out this form and we'll create one for you. Note that we are able to process your purchase and generate license for you faster if you are able to provide a Purchase Order via email.

3. Use a Software Reseller

Alternatively, if you have a preferred software reseller that you have existing agreements with, simply ask them to contact us and we'll do the rest.

1.3 System Requirements

1.3.1 Network Environment Requirements

A non-Cloud (not Azure) Active Directory domain is required, with Microsoft’s Local Administrator Password Solution (LAPS) installed and already configured.

1.3.2 Server Requirements

By default OVERLAPS runs as the system account on the server (NT AUTHORITY\SYSTEM), and permission must be given to this account to read and write the LAPS properties (see Active Directory Permissions for OVERLAPS). Alternatively, if you are planning to use a Service Account to allow OVERLAPS to access Active Directory then that account must have the relevant LAPS permissions.

1.3.3 Client Requirements

Any modern internet browser with Javascript enabled.

1.4 Free Trial Version

To download the trial version of OVERLAPS click the download button below and get started today.

Download the Trial Version

Requires: .NET Framework version 4.8

This trial version of the web user interface replacement for Microsoft LAPS offers customers the chance to go through the setup procedure and experience OVERLAPS for themselves before they buy. The only limitation of this demo version is that instead of displaying the LAPS managed passwords from Active Directory, the message "TRIALVERSION" is displayed in its place.