Home About Tools Projects Guides & Blog ⚡ Hire Me ✦ Websites Contact →
💻 Intune

How to Enable LAPS in Microsoft 365 Using Intune

Shared local administrator passwords are one of the most exploited weaknesses in Windows environments. Once an attacker has one, they can move laterally across your entire fleet, every device with the same password is instantly compromised. Windows LAPS fixes this by automatically generating a unique, rotating password for each device and backing it up securely to Entra ID.

This guide walks through every step: enabling LAPS in Entra, creating the Intune policy, verifying the deployment, and retrieving passwords when you need them.

What is Windows LAPS?

LAPS (Local Administrator Password Solution) is a Microsoft solution that programmatically generates a unique, complex password for the local administrator account on each managed Windows device. The password is stored as an encrypted attribute on the corresponding computer object in Entra ID (or on-premises Active Directory) and automatically rotated on a schedule you define.

The key security win: even if an attacker compromises one device's local admin account, that password is useless everywhere else. Lateral movement attacks that rely on credential reuse are stopped cold.

🚫
Stops Lateral Movement
Unique per-device passwords mean a compromised credential on one machine can't be reused to access others.
☁️
Cloud-Native Management
Intune handles policy deployment across your entire fleet from a single console. No GPO, no SCCM required.
🔄
Automated Rotation
Passwords auto-rotate on your defined schedule and immediately after use, no manual password changes needed.
📋
Full Audit Trail
Every password retrieval is logged, who accessed it, when, and for which device. Essential for compliance.
Just-in-Time Access
Passwords are retrieved on-demand only when needed, then automatically reset, no persistent shared credentials.
🔒
Encrypted at Rest
Passwords stored in Entra ID are encrypted, adding another layer of protection to these sensitive credentials.

Step 1, Enable LAPS in Microsoft Entra

🔧 Entra Admin Centre

Before any Intune policy will work, you need to turn on LAPS at the tenant level in Entra ID. This is a single toggle that accesss the feature for all devices in your organisation.

  1. 1Sign into the Microsoft Entra admin centre as a Global Administrator or Cloud Device Administrator.
  2. 2Go to Entra ID → Devices → Device Settings.
Microsoft Entra admin centre showing Devices > Device Settings navigation
Entra ID → Devices → Device Settings
  1. 3Scroll down to find Enable Microsoft Entra Local Administrator Password Solution (LAPS) and toggle it to Yes.
  2. 4Click Save.
LAPS toggle set to Yes in Entra Device Settings
Toggle LAPS to Yes and save
ℹ️
Tenant-level prerequisite
This toggle must be enabled before the Intune LAPS policy will take effect on devices. Skipping this step means the policy deploys but passwords are never backed up.

Step 2, Enable the Local Administrator Account

🔧 Intune Admin Centre

By default, the built-in local administrator account is disabled on modern Windows installations. LAPS can't manage an account that doesn't exist in an active state, so this needs to be enabled first across your managed devices.

The most efficient way to do this across large fleets is with an Intune Account Protection policy. Sign into the Intune Admin Centre and go to Endpoint Security → Account Protection → Create Policy.

Intune Admin Centre showing Endpoint Security > Account Protection with Create Policy highlighted
Endpoint Security → Account Protection → Create Policy

On the Create a profile screen, select:

PlatformWindows
ProfileLocal admin password solution (Windows LAPS)
Create a profile showing Windows platform and Local admin password solution profile selected
Select Windows → Local admin password solution (Windows LAPS)

On the Basics tab, name the policy clearly:

NameWindows LAPS Policy
DescriptionPolicy to manage and back up the local admin password for managed Windows devices.
Policy Basics tab with name 'Windows LAPS Policy' filled in
Give the policy a clear name and description

Step 3, Configure the LAPS Policy Settings

⚙️ Configuration Settings

This is where you define the behaviour of LAPS, where to store passwords, how complex they should be, how often they rotate, and what happens after they're used. Work through each setting below.

Backup Directory

Specifies where the generated password is stored. For cloud-only or Entra-joined devices, choose Azure AD only. For hybrid environments with on-prem AD, choose Active Directory only.

Backup Directory dropdown set to 'Backup the password to Azure AD only'
Set Backup Directory to Azure AD only for Entra-joined devices

Password Age (Days)

How long before LAPS automatically generates a new password. The minimum for Entra backups is 7 days; for on-prem AD it's 1 day. The default of 30 days is a sensible starting point for most environments.

Password Age Days set to 30
Password Age Days: 30 (recommended default)

Administrator Account Name

Leave this blank to target the built-in administrator account, LAPS identifies it by its well-known SID, even if it's been renamed. Only enter a name here if you've created a specific custom local admin account you want LAPS to manage instead.

Administrator Account Name field with a custom account name entered
Enter a custom account name, or leave blank to target the built-in administrator

Password Complexity

Controls which character types LAPS uses when generating passwords. The improved readability option is the best choice for most organisations, it uses maximum complexity but excludes easily-confused characters (0/O, 1/l), making passwords easier to type manually when needed.

Password Complexity dropdown showing options including large+small+numbers+special characters improved readability
Recommended: Large + small + numbers + special characters (improved readability)

Password Length

Can be set between 8 and 64 characters. The default of 14 characters is the recommended starting point, long enough to resist modern brute-force attacks while remaining practical.

Password Length set to 14
Password Length: 14 (default recommended)

Post Authentication Actions

Defines what happens after an admin uses the LAPS password and the grace period expires. Options:

  • Reset password, generates a new password silently, keeps the session active
  • Reset password and log off, the most secure default; ends the session immediately
  • Reset password and reboot, useful after maintenance tasks requiring a restart
Post Authentication Actions dropdown showing Reset password option
Post Authentication Action: Reset password

Post Authentication Reset Delay (Hours)

The grace period, how long an admin has to work on the device before the post-auth action kicks in. Ranges from 0 (disabled) to 24 hours. The default of 24 hours gives admins ample time to complete tasks.

Post Authentication Reset Delay set to 24 hours
Post Authentication Reset Delay: 24 hours

Settings Summary

Here's the full configuration at a glance, along with what the completed settings page looks like in Intune:

Recommended LAPS Policy Settings
Backup DirectoryAzure AD only
Password Age (Days)30
Administrator Account NameBlank (built-in) or custom name
Password ComplexityMax + improved readability
Password Length14
Post Auth ActionReset password
Post Auth Reset Delay24 hours
Completed LAPS Configuration Settings page in Intune showing all settings filled in
The completed Configuration Settings page in Intune

Step 4, Assign the Policy to Devices

👥 Assignments

On the Scope Tags tab, add any relevant tags if your organisation uses RBAC scoping, then click Next.

Scope Tags step in policy creation
Add scope tags if needed, otherwise leave default

On the Assignments tab, click Add groups under Included groups. Start with a pilot security group to validate the policy before rolling out to your full device fleet.

Assignments tab showing JDJ-CORP-WIN group added as an included group
Start with a pilot group, expand to all devices after validating
Always pilot first
Deploy to a small test group of 3–5 devices before assigning org-wide. Verify password backup is working and retrieval is successful before expanding the scope.

On the final Review + Create tab, check all settings are correct and click Create to deploy the policy.

Review + Create page showing summary of all policy settings before creating
Review all settings then click Create to deploy

Step 5, Trigger an Intune Sync

🔄 Sync Device

After creating the policy, devices will pick it up at their next scheduled Intune check-in. To force an immediate sync on a specific device, do it directly from the Admin Centre:

  1. 1Go to Devices → Windows in the Intune Admin Centre.
  2. 2Select the target device from the list.
  3. 3Click the Sync button in the top action bar, then confirm with Yes.
Intune device page showing the Sync button in the action bar alongside Retire, Wipe, and Delete
Click Sync on the device page to trigger an immediate policy check-in

Step 6, Validate the Deployment

✅ Verification

Don't assume the policy applied, verify it from two places on the target device.

Event Viewer, LAPS Operational Log

LAPS has its own dedicated Event Viewer channel, separate from the standard Intune MDM logs. Open Event Viewer (run eventvwr.msc) and go to:

Event Viewer Path
Applications and Services Logs → Microsoft → Windows → LAPS → Operational

Filter the log for Event ID 10022, this event provides a full summary of the LAPS policy settings applied by Intune, confirming the configuration arrived correctly.

Event Viewer showing LAPS Event ID 10022 with policy configuration details
Event ID 10022, confirms LAPS policy settings received from Intune

Registry, LAPS Policy Key

You can also confirm the settings directly in the Windows Registry. Open Registry Editor (regedit.exe) and go to:

Registry Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Policies\LAPS

The values here should match your policy configuration:

  • PasswordAgeDays = 30
  • PasswordLength = 14
  • BackupDirectory = 1 (1 = Entra ID, 2 = Active Directory)
  • PasswordComplexity = 5 (5 = max complexity with improved readability)
Registry Editor showing HKLM\SOFTWARE\Microsoft\Policies\LAPS with values matching the configured policy
Registry values confirming LAPS policy is applied, values match the Intune configuration

Retrieving the LAPS Password

🔑 Password Retrieval
⚠️
Required roles
To view a LAPS password, you must have one of: Global Administrator, Cloud Device Administrator, or Intune Administrator. All password retrievals are audited.

There are three ways to retrieve a LAPS-managed password depending on your preference and workflow.

Method 1, Microsoft Intune Admin Centre

  1. 1Go to Devices → Windows and select the target device.
  2. 2On the device overview page, click Local admin password in the left panel.
  3. 3Click Show local administrator password to reveal the current password.
Intune device page showing Local admin password option with Show local administrator password highlighted
Devices → select device → Local admin password → Show local administrator password

Method 2, Microsoft Entra Admin Centre

  1. 1Go to Identity → Devices → All devices.
  2. 2Under Help and support in the left nav, select Local administrator password recovery.
  3. 3Search for the device name, then click Show local administrator password.
  4. 4Click Show to reveal in plain text, or Copy to grab it without displaying it on screen.
Entra admin centre showing Local administrator password recovery with Show local administrator password option
Entra admin centre → Local administrator password recovery

Method 3, PowerShell (Microsoft Graph)

For scripted or automated retrieval, use the Get-LapsAADPassword cmdlet from the Microsoft Graph PowerShell module.

📋
Prerequisites
You need the DeviceLocalCredential.Read.All Microsoft Graph permission assigned to your account, and the Microsoft.Graph PowerShell module installed.

First, install the required module and connect to Microsoft Graph:

PowerShell
# Install the Microsoft Graph module if not already present
Install-Module -Name Microsoft.Graph -Force -AllowClobber

# Connect with the required permission scope
Connect-MgGraph -Scopes "DeviceLocalCredential.Read.All"

A Microsoft sign-in window will appear, log in with your admin account and consent to the required permissions on first use.

Then retrieve the LAPS password for a specific device:

PowerShell
# Retrieve LAPS password for a specific device
# Replace YOUR-DEVICE-NAME with the actual computer name
$DeviceName = "YOUR-DEVICE-NAME"

$LapsResult = Get-LapsAADPassword -DeviceNameOrId $DeviceName -IncludePasswords -AsPlainText

if ($LapsResult) {
    Write-Host "Device      : $($LapsResult.DeviceName)" -ForegroundColor Cyan
    Write-Host "Account     : $($LapsResult.Account)"     -ForegroundColor Cyan
    Write-Host "Password    : $($LapsResult.Password)"     -ForegroundColor Yellow
    Write-Host "Expires     : $($LapsResult.PasswordExpirationTime)"
} else {
    Write-Warning "No LAPS password found for '$DeviceName'. Has the policy synced yet?"
}
No password found?
If the cmdlet returns nothing, the device either hasn't synced the policy yet, or the local administrator account wasn't enabled before the policy was applied. Force a sync and check the LAPS Event Viewer log (Event ID 10022) on the device to confirm the policy arrived.
J
Jack Davies
IT Engineer · M365 & Intune Specialist

Jack is an IT Technical Engineer based in the UK, working day-to-day with Microsoft 365, Intune, and Entra ID across a range of businesses. He holds the MS-900 certification and is studying for a BSc in Cyber Security through the Open University. Outside of work he builds and documents home lab projects, writes guides on this site, and takes on M365 consulting work for small businesses.

About Jack → LinkedIn →
// monthly tips

Get M365 tips in your inbox

Practical Intune and Microsoft 365 tips, once a month. No spam, no fluff.