Skip to content

Latest commit

 

History

History
25 lines (21 loc) · 1.61 KB

File metadata and controls

25 lines (21 loc) · 1.61 KB
title Local administrator credentials on Windows are protected by Windows LAPS
ms.author brenduns
author brenduns
ms.topic include
ms.date 10/01/2025
ms.custom Intune-Secure-Recommendation

Without enforcing Local Administrator Password Solution (LAPS) policies, threat actors who gain access to endpoints can exploit static or weak local administrator passwords to escalate privileges, move laterally, and establish persistence. The attack chain typically begins with device compromise—via phishing, malware, or physical access—followed by attempts to harvest local admin credentials. Without LAPS, attackers can reuse compromised credentials across multiple devices, increasing the risk of privilege escalation and domain-wide compromise.

Enforcing Windows LAPS on all corporate Windows devices ensures unique, regularly rotated local administrator passwords. This disrupts the attack chain at the credential access and lateral movement stages, significantly reducing the risk of widespread compromise.

Remediation action

Use Intune to enforce Windows LAPS policies that rotate strong and unique local admin passwords, and that back them up securely:

For more information, see: