Azure Laps with Windows AD and Intune

Author

Reads 298

Young woman in casual clothes helping senior man in formal shirt with paying credit card in Internet using laptop while sitting at table
Credit: pexels.com, Young woman in casual clothes helping senior man in formal shirt with paying credit card in Internet using laptop while sitting at table

Azure Laps with Windows AD and Intune is a powerful combination for securing devices.

Azure Laps allows you to manage and secure devices that are not domain-joined, such as personal laptops or tablets.

This feature integrates with Windows AD and Intune to provide a seamless experience.

With Azure Laps, you can enforce policies, configure settings, and deploy software to non-domain-joined devices.

Azure Laps also enables you to monitor and report on device compliance, ensuring that your organization's security policies are being followed.

Azure Laps Configuration

To configure Azure LAPS, you'll need to enable Windows LAPS for Azure AD in the Azure AD management portal. This involves setting the Enable Azure AD Local Administrator Password Solution (LAPS) to Yes and saving the changes.

To create a LAPS configuration profile, click Create Policy and select Windows LAPS from the drop-down list. You'll then define your Azure AD LAPS configuration settings, such as the Administrator Account Name, Password Complexity, and Post Authentication Actions.

Credit: youtube.com, Windows LAPS in 9 mins: Hackers DON’T watch this!

Some settings have default values, which are:

  • Administrator Account Name: The default admin SID will be used, regardless of whether the account has been renamed.
  • Password Complexity: Large letters + small letters + numbers + special characters
  • Password Length: 14 characters
  • Post Authentication Actions: Reset the password and log off the managed account
  • Post Authentication Reset Delay: 24 hours.

You can also configure settings such as Backup Directory and Password Complexity to suit your organization's needs.

Windows AD Configuration

Windows AD Configuration is a crucial step in setting up Azure LAPS. You'll need to configure the Backup Directory setting to back up the Local Administrator password to Azure Active Directory or Active Directory.

To manage the Local Administrator account, you can specify the Administrator Account Name, but be aware that if you do so, the account must be created via other means. The password complexity and length can also be configured to meet your organization's needs.

The Post Authentication Actions setting allows you to specify what LAPS should do after a successful authentication, such as logging off the managed account and resetting the password. The Post Authentication Reset Delay setting determines how long it will wait before performing the specified action.

Here are the key settings to consider when configuring Windows AD:

Create Configuration Profile

Credit: youtube.com, How to Configure Intune Clients with Configuration Profiles

After enabling LAPS for your tenant, you're ready to create a configuration profile that will contain all the settings for Azure AD LAPS to apply to your devices.

Click Create Policy to create a new Endpoint Protection Policy for Azure AD LAPS.

In the pop-out window, select Windows LAPS from the drop-down list and click Create.

You'll need to define your Azure AD LAPS configuration settings. For password complexity, you'll want to use a combination of large letters, small letters, numbers, and special characters.

The password length should be at least 14 characters.

For post-authentication actions, you can reset the password and log off the managed account.

A 24-hour delay is recommended for the post-authentication reset delay.

Here are the recommended settings in a quick reference format:

  • Administrator Account Name: The default admin SID will be used.
  • Password Complexity: Large letters + small letters + numbers + special characters
  • Password Length: 14 characters
  • Post Authentication Actions: Reset the password and log off the managed account
  • Post Authentication Reset Delay: 24 hours

Azure Laps with Intune

Azure LAPS with Intune is a game-changer for securing your devices.

It's backed by the new Windows LAPS capabilities built directly into the Windows operating system, making it easy to deploy without additional client software.

Readers also liked: Windows Azure Platform

Credit: youtube.com, 79. How to configure Windows LAPS in Microsoft Intune | Azure AD

However, it's only supported in the latest operating systems, so make sure you're current with Windows feature updates.

The requirements are all or nothing, so if you leave a hole the hacker will find it.

Fortunately, deployment is simplified using Microsoft Intune, and it's the recommended choice due to its simplicity and good reporting features.

You can also deploy it via group policies, manually through registry keys, or using Windows CSP settings in Intune, but Intune will always take precedence.

To view the LAPS password from the Intune Portal, select your device and go to Local Admin password > Show local admin password.

To rotate the password before the set expiration period, select the device and click Rotate local admin password.

LAPS will also block external attempts to change the password, including when you use the 'reset password' function in Azure for virtual machines.

This is a great security feature, and you can see the log in the Windows event log with Event ID: 10031.

The Azure AD LAPS scenario is a powerful tool for securing your devices, and with the right deployment method, you can reap the security benefits.

Check this out: Laps Azure Ad Intune

Azure Laps Security

Credit: youtube.com, Windows Intune LAPS + Azure Active Directory. Now Available and Easy Steps to Configure

Azure Laps Security is a top priority for any organization considering cloud migration. Azure Laps is a security feature that provides real-time threat intelligence and analytics to detect and prevent attacks.

It uses machine learning algorithms to analyze network traffic and identify potential threats. Azure Laps can detect and block malicious traffic in real-time, preventing attacks from reaching your applications.

Azure Laps integrates with other Azure security services to provide comprehensive security coverage. This includes integration with Azure Sentinel for security information and event management (SIEM) and Azure Active Directory (Azure AD) for identity and access management.

Azure Laps Identity

Azure LAPS uses Azure Active Directory (Azure AD) to store passwords in Microsoft Azure on Azure device objects. This allows for secure and centralized password management.

To create an Azure AD registered app to retrieve Windows LAPS passwords, you need to create a new application called IntuneLAPSadmin using PowerShell. This application requires the Device.Read.All permission and one of the following two permissions: DeviceLocalCredential.ReadBasic.All or DeviceLocalCredential.Read.All.

Credit: youtube.com, How to deploy Microsoft Entra Local Administrator Password Solution LAPS

The DeviceLocalCredential.ReadBasic.All permission grants permissions for reading non-sensitive metadata about persisted Windows LAPS passwords, including the time the password was backed up to Azure and the expected expiration time of a password. This is appropriate for reporting and compliance applications.

The DeviceLocalCredential.Read.All permission grants full permissions for reading everything about persisted Windows LAPS passwords, including the clear-text passwords themselves. This permissions level is sensitive and should be used carefully.

Here are the permission IDs for reference:

Azure Laps Enablement

To enable Azure AD LAPS, you can do so from either the Microsoft Entra admin center or Azure Active Directory Portal.

You can enable Azure AD Local Administrator Password Solution (LAPS) by following these steps:

  • Go to https://entra.microsoft.com – Devices – Overview – Device Settings – Enable Azure AD Local Administrator Password Solutions (LAPS): Yes
  • Or go to https://portal.azure.com – Azure Active Directory – Devices – Device Settings – Enable Azure AD Local Administrator Password Solutions (LAPS): Yes

To support the implementation of Azure AD LAPS, you must first enable Windows LAPS for Azure AD in the Azure AD management portal.

To do this, login to https://aad.portal.azure.com/, then select Azure Active Directory, and then Devices. Set Enable Azure AD Local Administrator Password Solution (LAPS) to Yes, then click Save.

This will set the IsEnabled field for the localadminpassword setting to True in Microsoft Graph.

Walter Brekke

Lead Writer

Walter Brekke is a seasoned writer with a passion for creating informative and engaging content. With a strong background in technology, Walter has established himself as a go-to expert in the field of cloud storage and collaboration. His articles have been widely read and respected, providing valuable insights and solutions to readers.

Love What You Read? Stay Updated!

Join our community for insights, tips, and more.