Managing Local Admin Access in Intune: Account Protection and LAPS
Local admin access is often overlooked, but it’s one of the biggest gaps in endpoint security.
With Microsoft Intune and Microsoft Entra, you can now enforce least privilege, deploy secure admin accounts, and manage passwords using Windows LAPS — all without needing third-party tools.
In this guide, we’ll cover:
- Why managing local admin access matters
- What tools you have in Intune
- How to set up Windows LAPS in Intune
- What to watch out for before rolling it out
Why Managing Local Admin Access Matters
Uncontrolled local admin access can lead to:
- Privilege escalation
- Circumvention of compliance policies
- Hard-to-audit changes or persistence threats
Good practice means:
- Admin access is controlled
- Admin passwords are unique per device
- All access is audited and revocable
Option 1: Assign Admin Access with Account Protection Profile
To predefine who has local admin rights:
Steps:
- Go to Intune Admin Center > Endpoint security > Account protection
- Create a policy for Windows 10 and later
- Under Account Protection, add Entra ID users or groups to the “Administrators” group
- Assign to device groups
Use this to:
- Add IT staff to admin group
- Ensure users don’t get admin unless intended
Option 2: Enforce Unique Admin Passwords Using Windows LAPS
What Is Windows LAPS?
Windows LAPS (Local Administrator Password Solution) automatically creates and manages a unique, random local admin password per device, securely backed up to Entra ID.
Before You Implement LAPS – Key Considerations:
Devices must be:
- Running Windows 10 20H2+ or Windows 11
- Entra-joined or hybrid-joined
- Managed by Intune
- Enrolled in Endpoint Security
Decide on:
- Whether to manage the default Administrator account or create a custom one
- Who will have read permissions to recovery passwords (this is critical, see RBAC in Entra)
Test on a small pilot group before organization-wide rollout
How to Set Up Windows LAPS via Intune
Step 1: Go to Intune Admin Center > Endpoint security > Account protection
Step 2: Click + Create Policy
- Platform: Windows 10 and later
- Profile type: Windows LAPS
Step 3: Configure the following settings:
Step 4: Assign to a test device group and monitor results.
How to Retrieve LAPS Passwords (Admins Only)
- Go to Microsoft Entra Admin Center
- Navigate to Devices > [Device name]
- Click on Local administrator password
- You’ll see:
Only users with proper Entra ID roles (like Global Admin or custom roles with delegated device permissions) will see the password.
Option 3: Remove Admin Rights from Users
By default, Autopilot-enrolled Entra-joined devices make the first user a local admin. You can prevent that by:
- Going to Devices > Enroll devices > Deployment profiles
- Edit your Autopilot profile
- Set User account type to Standard user
Now users will be enrolled without elevated privileges.
Best Practices for Local Admin Management
- Use LAPS for every endpoint
- Rotate passwords at least every 30 days
- Remove users from local admin unless absolutely necessary
- Log who accesses passwords and why
- Avoid static passwords or hardcoded accounts in scripts
Between LAPS, Account Protection profiles, and Autopilot controls, Microsoft Intune gives you the tools to lock down local admin access while still empowering IT.
Done right, you reduce risk, avoid credential reuse, and ensure every admin action is controlled and auditable.
Next Up:
Comments
Post a Comment