Forum Discussion
Implementing LAPS
Translated with google
Good morning, in the test environment I am trying to activate the LAPS features.
The activation seems to have been successful.
From the computer that acts as DC in AD it shows me the DSRM user password.
While from the computer account of the test PC for LAPS no account or password is displayed.
Obviously I created a GPO for the application of the LAPS parameters
I have already restarted the PC several times and performed a GPupdate /force
What can I check to have LAPS active on the client too?
This is the data of the test network
PC: W11 Pro 10.0.26100 build 26100
Server: W2025 srv Datacenter 10.0.26100 build 26100
Domain functional level 2025
Forest functional level 2025
-----------------------------------------------------------------------------------------------------------------
Buongiorno,in ambiente di test stò provando ad attivare le funzionalità LAPS.
L'attivazione sembra essere andata a buon fine.
Dal computer che fà da DC in AD mi fà vedere la password dell'utenza DSRM.
Mentre dall'account computer del PC di test per LAPS non è visualizzato nessun account e nessuna password.
Ovviamente ho creato una GPO per l'applicazione dei parametri LAPS
Ho già riavviato più volte il pc ed eseguito un GPupdate /force
Cosa posso verificare per avere LAPS attivo anche sul client?
Questi i dati della rete di test
Pc: W11 Pro 10.0.26100 build 26100
Server: W2025 srv Datacenter 10.0.26100 build 26100
Livello funzionale del dominio 2025
Livello funzionale della foresta 2025
1 Reply
Confirm schema extension and attributes
On Server 2025, the new Windows LAPS schema attributes are built-in but must be enabled for the domain:
Run this on your DC:Update-LapsADSchema
Then check that the attributes exist on a computer object in AD Users and Computers:
msLAPS-PasswordExpirationTime
msLAPS-EncryptedPasswordIf they’re missing, the schema update didn’t apply correctly.
erify Group Policy configuration
In Group Policy Management Editor, under
Computer Configuration → Administrative Templates → System → LAPS
set these policies:Policy Setting
Configure password backup directory Active Directory
Enable password backup for administrator account Enabled
Password complexity / length / age As required
Name of administrator account to manage (blank for built-in Administrator, or specify custom local admin)Apply the GPO to an OU containing your Windows 11 test PC, and confirm it is applied:
gpresult /h c:\temp\gp.html
Check that the client has the LAPS feature installed
Windows 11 26100 already includes the new LAPS client natively, but confirm:
Get-WindowsCapability -Name *LAPS* -Online
If it’s “Not Present,” install it:
Add-WindowsCapability -Name Windows.LAPS~~~~0.0.1.0 -Online
Force a password rotation and check logs
On the Windows 11 client:
Reset-LapsPassword -Verbose
Then review the event log:
Event Viewer → Applications and Services Logs → Microsoft → Windows → LAPS → Operational
Successful backup shows Event 10031 (“The password was successfully backed up to Active Directory”).
Errors such as Event 10023/10025 indicate missing permissions or schema issues.Verify AD permissions for the computer object
The SELF account of each computer must have permission to write its own LAPS attributes.
Check via PowerShell on the DC:Set-LapsADComputerSelfPermission -Identity "OU=Computers,DC=yourdomain,DC=local"
This ensures the computers in that OU can store their passwords.
View the password from the DC
Use one of the following:
PowerShell:
Get-LapsADPassword -Identity "TestPC$" -AsPlainText
Active Directory Users and Computers:
Enable Advanced Features → open the computer object → Attribute Editor → view msLAPS-Password.If it’s still empty, the client never wrote the value—recheck Event 10023 logs or permissions.
🔧 Summary
If your DC shows only the DSRM password but not the client’s local admin password, the problem is almost always one of these:
LAPS GPO not applied to the workstation OU
Client LAPS feature missing or inactive
Computer lacks permission to write its password to ADRun the steps above in order—especially Set-LapsADComputerSelfPermission and Reset-LapsPassword—and you’ll see the password populate in Active Directory within minutes.