Managing Local Admin Access in Intune: Account Protection and LAPS

 Local admin access is often overlooked, but it’s one of the biggest gaps in endpoint security.

With Microsoft Intune and Microsoft Entra, you can now enforce least privilege, deploy secure admin accounts, and manage passwords using Windows LAPS — all without needing third-party tools.

In this guide, we’ll cover:

  • Why managing local admin access matters
  • What tools you have in Intune
  • How to set up Windows LAPS in Intune
  • What to watch out for before rolling it out

Why Managing Local Admin Access Matters

Uncontrolled local admin access can lead to:

  • Privilege escalation
  • Circumvention of compliance policies
  • Hard-to-audit changes or persistence threats

Good practice means:

  • Admin access is controlled
  • Admin passwords are unique per device
  • All access is audited and revocable

Option 1: Assign Admin Access with Account Protection Profile

To predefine who has local admin rights:

Steps:

  1. Go to Intune Admin Center > Endpoint security > Account protection
  2. Create a policy for Windows 10 and later
  3. Under Account Protection, add Entra ID users or groups to the “Administrators” group
  4. Assign to device groups

Use this to:

  • Add IT staff to admin group
  • Ensure users don’t get admin unless intended

Article content

Option 2: Enforce Unique Admin Passwords Using Windows LAPS

What Is Windows LAPS?

Windows LAPS (Local Administrator Password Solution) automatically creates and manages a unique, random local admin password per device, securely backed up to Entra ID.

Before You Implement LAPS – Key Considerations:

Devices must be:

  • Running Windows 10 20H2+ or Windows 11
  • Entra-joined or hybrid-joined
  • Managed by Intune
  • Enrolled in Endpoint Security

Decide on:

  • Whether to manage the default Administrator account or create a custom one
  • Who will have read permissions to recovery passwords (this is critical, see RBAC in Entra)

Test on a small pilot group before organization-wide rollout

How to Set Up Windows LAPS via Intune

Step 1: Go to Intune Admin Center > Endpoint security > Account protection

Step 2: Click + Create Policy

  • Platform: Windows 10 and later
  • Profile type: Windows LAPS

Step 3: Configure the following settings:

Article content

Step 4: Assign to a test device group and monitor results.

Article content

How to Retrieve LAPS Passwords (Admins Only)

  1. Go to Microsoft Entra Admin Center
  2. Navigate to Devices > [Device name]
  3. Click on Local administrator password
  4. You’ll see:

Only users with proper Entra ID roles (like Global Admin or custom roles with delegated device permissions) will see the password.

Option 3: Remove Admin Rights from Users

By default, Autopilot-enrolled Entra-joined devices make the first user a local admin. You can prevent that by:

  • Going to Devices > Enroll devices > Deployment profiles
  • Edit your Autopilot profile
  • Set User account type to Standard user

Now users will be enrolled without elevated privileges.

Article content

Best Practices for Local Admin Management

  • Use LAPS for every endpoint
  • Rotate passwords at least every 30 days
  • Remove users from local admin unless absolutely necessary
  • Log who accesses passwords and why
  • Avoid static passwords or hardcoded accounts in scripts

Between LAPS, Account Protection profiles, and Autopilot controls, Microsoft Intune gives you the tools to lock down local admin access while still empowering IT.

Done right, you reduce risk, avoid credential reuse, and ensure every admin action is controlled and auditable.

Next Up:

Comments

Popular posts from this blog

4 Most common Issues while registering devices with Microsoft Intune MDM

Managing Windows Updates with Intune: Best Practices with Update Rings

The Intune Device Lifecycle: From Onboarding to Retirement (Best Practices)