<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Windows LAPS feedback Ideas</title>
    <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/idb-p/Windows-LAPS-feedback</link>
    <description>Windows LAPS feedback Ideas</description>
    <pubDate>Sun, 26 Apr 2026 05:21:56 GMT</pubDate>
    <dc:creator>Windows-LAPS-feedback</dc:creator>
    <dc:date>2026-04-26T05:21:56Z</dc:date>
    <item>
      <title>LAPS Passwords Should Always Be Removed from AD When switching to Entra password backup</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/laps-passwords-should-always-be-removed-from-ad-when-switching/idi-p/4437858</link>
      <description>&lt;P&gt;In our deployment of Windows LAPS, we've discovered two scenarios where the Legacy LAPS password details persists in Active Directory even though the device is now using Windows LAPS:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;When changing a device's backup directory from Active Directory to Entra ID&lt;/LI&gt;
&lt;LI&gt;When changing a device's LAPS password type from a password to a passphrase&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;In both of these scenarios, the &lt;STRONG&gt;ms-Mcs-AdmPwd&lt;/STRONG&gt; and &lt;STRONG&gt;ms-Mcs-AdmPwdExpirationTime&lt;/STRONG&gt; properties retain information about the last LAPS password before the Windows LAPS policy was processed. These properties will now need to be cleared out to remove the no longer relevant data.&lt;/P&gt;
&lt;P&gt;This does not happen for devices that continue to backup LAPS passwords in AD and continue to use passwords instead of passphrases. Those devices clear the &lt;STRONG&gt;ms-Mcs-AdmPwd&lt;/STRONG&gt; and &lt;STRONG&gt;ms-Mcs-AdmPwdExpirationTime&lt;/STRONG&gt; properties and then store data in the new msLAPS properties.&lt;/P&gt;
&lt;P&gt;We believe that the &lt;STRONG&gt;ms-Mcs-AdmPwd&lt;/STRONG&gt; and &lt;STRONG&gt;ms-Mcs-AdmPwdExpirationTime&lt;/STRONG&gt; properties should always be cleared when a new Windows LAPS policy is processed regardless of backup directory nor password type.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2025 19:54:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/laps-passwords-should-always-be-removed-from-ad-when-switching/idi-p/4437858</guid>
      <dc:creator>bmkaiser00</dc:creator>
      <dc:date>2025-09-22T19:54:21Z</dc:date>
    </item>
    <item>
      <title>Need help with new LAPS</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/need-help-with-new-laps/idi-p/4389079</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Several months ago I configured LAPS on an AD network with Windows 11 workstations, using the LAPS MSI file pushed out by a GPO.&amp;nbsp; I recently installed a new Windows 11 machine on the network, and thought the GPO would push the MSI file out to it, and thus, get the new machine's local admin pw to be managed by LAPS.&amp;nbsp; That didn't happen, so I tried running the MSI on the new machine locally, but got a message saying that the legacy LAPS msi was blocked from running because it was a newer version of Windows 11.&amp;nbsp; My question is, how do I enable LAPS to work on a newly-added computer running the latest version of Windows 11?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Mar 2025 21:21:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/need-help-with-new-laps/idi-p/4389079</guid>
      <dc:creator>it-support-person</dc:creator>
      <dc:date>2025-03-04T21:21:27Z</dc:date>
    </item>
    <item>
      <title>Windows System Virtual Admin Credentials</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/windows-system-virtual-admin-credentials/idi-p/4384719</link>
      <description>&lt;P&gt;I’m Manash Sarkar from Kolkata India. An innovative concept builder &amp;amp; out of box thinker. Every challenges for a smooth proper IT service delivery have instigated me to think new ways for ease in providing services.&lt;/P&gt;&lt;P&gt;System local admin password have seen lot of changes. Concept of changing the system local admin password (quarterly / half yearly or annually) manually to Microsoft LAPS (local admin policy system) automated across the landscape ….&lt;/P&gt;&lt;P&gt;Recently while performing an activity which req. the admin password credentials, faced challenge to type easily (v complex with alpha numeric &amp;amp; special character) LAPS. As per ISO or Microsoft credit level, LAPS is the current technology implemented across major orz. Also, the password gets automatically changed on the system as per defined domain policy.&lt;/P&gt;&lt;P&gt;This prompted me to think differently. Immediate need some changes….&lt;SPAN class="lia-text-color-8"&gt;&lt;SPAN class="lia-text-color-10"&gt;&lt;EM&gt;&lt;SPAN class="lia-text-color-8"&gt;windows should develop wherein copy/ paste admin credential facility is available for windows OS system&lt;/SPAN&gt;&lt;SPAN class="lia-text-color-8"&gt;s&lt;/SPAN&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN class="lia-text-color-8"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;Sharing more advanced feature for the MS tech team to check &amp;amp; have a testing done in labs.&lt;/P&gt;&lt;P&gt;Virtual Admin profile: Currently all windows login profile is visible physically. Develop a login (only single admin profile) which will have the admin privilege role but will not be visible in windows. When setting up windows for the first time or installing OS, Virtual Admin can be created, with password.&lt;/P&gt;&lt;P&gt;Result: More enhanced &amp;amp; secure feature.&lt;/P&gt;&lt;P&gt;Also roll out the concept of disable the view (blackout) front view in Windows OS, &lt;SPAN class="lia-text-color-15"&gt;&lt;U&gt;ONLY WHILE remotely accessing the system for Admin Credentials.&lt;/U&gt;&lt;/SPAN&gt; Such identical feature already available for Microsoft Authenticator. If mobile phone screen sharing is done while providing the authenticator code, other side gets blackout. Only after providing the code the screen gets visible. Same feature should be extended for Windows, so that admin password remains secure.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 10:41:56 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/windows-system-virtual-admin-credentials/idi-p/4384719</guid>
      <dc:creator>Manash_Sarkar</dc:creator>
      <dc:date>2025-02-23T10:41:56Z</dc:date>
    </item>
    <item>
      <title>Allow multiple groups for Decrypt permissions</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/allow-multiple-groups-for-decrypt-permissions/idi-p/4341569</link>
      <description>&lt;P&gt;Request to enable the assignment of decrypt permissions to multiple groups independently.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently, we can assign the decrypt permission to only one group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In our case, this requires a universal group in our forest containing both domain admins and Tier 2 admins. However, combining these two roles into a single group poses a security risk, as it increases the potential for mismanagement. Best practices generally advise against merging such privileged administrative groups.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because of this limitation we have disabled the new encryption feature.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What are your thoughts on this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2024 14:56:47 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/allow-multiple-groups-for-decrypt-permissions/idi-p/4341569</guid>
      <dc:creator>Vico_Manolo</dc:creator>
      <dc:date>2024-11-27T14:56:47Z</dc:date>
    </item>
    <item>
      <title>Support Password resets from Office Admin Portal</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/support-password-resets-from-office-admin-portal/idi-p/4230025</link>
      <description>&lt;P&gt;Please correct our ability to reset a password from the 365 Admin Center.&amp;nbsp; The ability is offered and even appears to work by sending you a confirmation email, but of course it does not work.&amp;nbsp; How can MS have this option even available if they won't support it.&lt;/P&gt;&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/concept-sspr-writeback" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/entra/identity/authentication/concept-sspr-writeback&lt;/A&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Supports password writeback when an admin resets them from the Microsoft Entra admin center&lt;/STRONG&gt;: When an admin resets a user's password in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://entra.microsoft.com/" target="_blank" rel="noopener"&gt;Microsoft Entra admin center&lt;/A&gt;, if that user is federated or password hash synchronized, the password is written back to on-premises. &lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;This functionality is currently not supported in the Office admin portal.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 27 Aug 2024 20:55:03 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/support-password-resets-from-office-admin-portal/idi-p/4230025</guid>
      <dc:creator>MVillano</dc:creator>
      <dc:date>2024-08-27T20:55:03Z</dc:date>
    </item>
    <item>
      <title>Possible Bug Report - Custom Local Admin account issue</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/possible-bug-report-custom-local-admin-account-issue/idi-p/4219315</link>
      <description>&lt;UL&gt;&lt;LI&gt;Encountered a scenario where the a custom local account was configured for LAPS management via Intune Profile (./Device/Vendor/MSFT/LAPS/Policies/AdministratorAccountName)&lt;/LI&gt;&lt;LI&gt;now we want to switch it back to have LAPS manage the built-in Local admin&lt;/LI&gt;&lt;LI&gt;Via Intune Profile, set AdministratorAccountName back to Not Configured&lt;/LI&gt;&lt;LI&gt;allowed time for policy to sync (and manual sync a few times + Invoke-LapsPolicyProcessing)&lt;/LI&gt;&lt;LI&gt;and we find the custom account is still being managed by LAPS, (LAPS events confirm this)&lt;/LI&gt;&lt;LI&gt;we find the registry key for AdministratorAccountName is still present.. when we might assume it would be removed automatically since the Policy was reversed to a Not Configured state&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Is this a bug or expected behavior?&amp;nbsp; If expected, that means we need to delete this registry key or LAPS will not switch to the built-in Admin.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 23:46:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/possible-bug-report-custom-local-admin-account-issue/idi-p/4219315</guid>
      <dc:creator>Khandre</dc:creator>
      <dc:date>2024-08-14T23:46:30Z</dc:date>
    </item>
    <item>
      <title>Clarify Documentation Regarding Schema Update and GPOs for Azure AD PW Storage Scenario</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/clarify-documentation-regarding-schema-update-and-gpos-for-azure/idi-p/4195630</link>
      <description>&lt;P&gt;I'm in the process of deploying LAPS but am a bit confused about what is needed to deploy GPOs for Windows LAPS on older domain controllers. The FAQ says it is not required to update/extend the AD schema if I'm storing passwords in Azure AD but older DCs don't have the LAPS ADMX files needed to build GPOs that configure Windows LAPS to store passwords in Azure AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It might be helpful to clarify this in the documentation. If the solution is simply to copy ADMX files from a Win10/11 machine into the DC's sysvol folders so we can "see" the Windows LAPS policy settings, then it would be good to mention that in the docs.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 00:08:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/clarify-documentation-regarding-schema-update-and-gpos-for-azure/idi-p/4195630</guid>
      <dc:creator>DanWheeler</dc:creator>
      <dc:date>2024-07-19T00:08:13Z</dc:date>
    </item>
    <item>
      <title>Update Active Directory default schema with LAPS</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/update-active-directory-default-schema-with-laps/idi-p/4059216</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Windows LAPS requires Active Directory schema update to be fully functional - such updates are often quite difficult to implement on large environments, due the amount of operational risks and approvals tied to them.&lt;/P&gt;&lt;P&gt;With LAPS now part of the operating system instead of being on a third-app level, it would make sense to add corresponding attributes and classes to default AD schema when building a new Active Directory.&lt;/P&gt;&lt;P&gt;Maybe for Windows Server vNext, which will include several AD enhancements for the first time in many years ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 12:56:44 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/update-active-directory-default-schema-with-laps/idi-p/4059216</guid>
      <dc:creator>Alban1998</dc:creator>
      <dc:date>2024-02-16T12:56:44Z</dc:date>
    </item>
    <item>
      <title>Migrate Microsoft LAPS to Windows LAPS</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/migrate-microsoft-laps-to-windows-laps/idi-p/4044798</link>
      <description>&lt;P&gt;how can you carry the above transition swiftly? Currently, we have on-prem LAPS install however we want to move to the new&amp;nbsp; Windows Laps any ideas?&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 16:53:47 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/migrate-microsoft-laps-to-windows-laps/idi-p/4044798</guid>
      <dc:creator>mrahhali</dc:creator>
      <dc:date>2024-01-31T16:53:47Z</dc:date>
    </item>
    <item>
      <title>automatic mode on windows 10</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/automatic-mode-on-windows-10/idi-p/4041198</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i tested out the laps automatic mode from the latest canary build&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;first of all, thank you for your work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i would like to know if this feature will be extended to windows 10 or will this only be on windows 11?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 11:11:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/automatic-mode-on-windows-10/idi-p/4041198</guid>
      <dc:creator>hbattilana2225</dc:creator>
      <dc:date>2024-01-27T11:11:11Z</dc:date>
    </item>
    <item>
      <title>Support Windows LAPS for Entra AD Domain Services</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/support-windows-laps-for-entra-ad-domain-services/idi-p/4038917</link>
      <description>&lt;P&gt;Many customers have asked me in passing when Windows LAPS will be supported for managed devices joined to an&amp;nbsp;Entra AD Domain Services domain (formerly known as Azure AD Domain Services). All I can share for now is that the owning team is aware of this ask and it is in their backlog. Please up-vote this feature to add your support!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would also be helpful if you are willing to PM me with your company name and the # of EADDS\AADDS devices that would be Windows LAPS-enabled once the support is available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/entra/identity/domain-services/overview" target="_self"&gt;Overview of Microsoft Entra Domain Services - Microsoft Entra ID | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks,&lt;/P&gt;
&lt;P&gt;Jay&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 16:56:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/support-windows-laps-for-entra-ad-domain-services/idi-p/4038917</guid>
      <dc:creator>JaySimmons</dc:creator>
      <dc:date>2024-01-24T16:56:55Z</dc:date>
    </item>
    <item>
      <title>Microsoft LAPS changing password every hour</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/microsoft-laps-changing-password-every-hour/idi-p/4017730</link>
      <description>&lt;P&gt;Hello Team, I'm having a issue with a device, LAPS is changing the administrator password every hour and login me off. this is happening since this week.&lt;/P&gt;&lt;P&gt;&lt;img /&gt;&lt;img /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2023 17:50:50 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/microsoft-laps-changing-password-every-hour/idi-p/4017730</guid>
      <dc:creator>fidelcalderon</dc:creator>
      <dc:date>2023-12-28T17:50:50Z</dc:date>
    </item>
    <item>
      <title>Revice Password Last Set logic to check local PasswordLastSet and msLAPS-PasswordExpirationTime</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/revice-password-last-set-logic-to-check-local-passwordlastset/idi-p/3978767</link>
      <description>&lt;P&gt;Some of our servers are non persistent and are created from a template each night. If the Password needs updating logic checked the local admin account's&amp;nbsp;PasswordLastSet and AD msLAPS-PasswordExpirationTime, LAPS would work perfectly for us.&amp;nbsp; The password would update and stay in sync with the Win LAPS password.&lt;/P&gt;&lt;P&gt;Yes, I know I could disable the local admin account through policy and choose not to use LAPS on the non-persistent servers, or add a script that clears the password last change date in AD on startup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would prefer not to have to keep separate GPOs to resolve this issue or custom hacks to resolve something that could just be built in. It could even be an optional setting in the LAPS GPO. Example: Check local admin account last password set: True.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Nov 2023 21:02:23 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/revice-password-last-set-logic-to-check-local-passwordlastset/idi-p/3978767</guid>
      <dc:creator>rk-ca-2023</dc:creator>
      <dc:date>2023-11-10T21:02:23Z</dc:date>
    </item>
    <item>
      <title>Windows LAPS updates password three time in week</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/windows-laps-updates-password-three-time-in-week/idi-p/3964087</link>
      <description>&lt;P&gt;We have user device which reset LAPS password three times a week while the policy is set to reset every 365 days.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The current LAPS policy is configured as follows:&lt;BR /&gt;Policy source: CSP&lt;BR /&gt;Backup directory: Azure Active Directory&lt;BR /&gt;Local administrator account name: local.adm&lt;BR /&gt;Password age in days: 365&lt;BR /&gt;Password complexity: 3&lt;BR /&gt;Password length: 12&lt;BR /&gt;Post authentication grace period (hours): 24&lt;BR /&gt;Post authentication actions: 0x1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Password updates when Event log shows below.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The post-authentication grace period has expired per policy. The configured post-authentication actions will now be executed.&lt;BR /&gt;Account name: Local.adm&lt;BR /&gt;Account RID: 0x3E9&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can we fix this and stop resetting the password.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Oct 2023 16:36:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/windows-laps-updates-password-three-time-in-week/idi-p/3964087</guid>
      <dc:creator>harrys80</dc:creator>
      <dc:date>2023-10-25T16:36:55Z</dc:date>
    </item>
    <item>
      <title>Auditing Access to Windows LAPS Passwords</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/auditing-access-to-windows-laps-passwords/idi-p/3919643</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am looking for a feature similar to legacy LAPS that allows a separately defined user in the domain to access the reading of LAPS-assigned passwords. This feature is called "auditing mode" and is used in Legacy LAPS by my C# application to read out certain passwords from devices.&lt;BR /&gt;I am now looking for a way to integrate this process into my programme for Windows LAPS through a specified domain user and C#.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 12:54:05 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/auditing-access-to-windows-laps-passwords/idi-p/3919643</guid>
      <dc:creator>Bordon0116</dc:creator>
      <dc:date>2023-09-06T12:54:05Z</dc:date>
    </item>
    <item>
      <title>Entra - LAPS Report Filter</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/entra-laps-report-filter/idi-p/3911730</link>
      <description>&lt;P&gt;Currently, in Entra's LAPS, you can filter reports by "Last password rotation" and "Next password rotation"&amp;nbsp;&lt;/P&gt;&lt;P&gt;It would be beneficial to also have a LAPS filter for "Password Has Expired",&amp;nbsp;&lt;SPAN&gt;enabling us to take a proactive approach in investigating instances where password rotations have not occurred on specific managed devices.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Aug 2023 16:41:37 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/entra-laps-report-filter/idi-p/3911730</guid>
      <dc:creator>bt102</dc:creator>
      <dc:date>2023-08-28T16:41:37Z</dc:date>
    </item>
    <item>
      <title>Workload Endoint Protection is it needed for Hybrid AAD devices?</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/workload-endoint-protection-is-it-needed-for-hybrid-aad-devices/idi-p/3879745</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;To make Windows LAPS feature work on Hybrid Azure AD join - Co-managed Devices&lt;/P&gt;&lt;P&gt;we have concluded on POC that we should switching the workload Endpoint protection of co-managed devices to Pilot or full intune? Is this a confirmed prerequisite for the implementation (because there is no written record on the MS forums)&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 14:11:47 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/workload-endoint-protection-is-it-needed-for-hybrid-aad-devices/idi-p/3879745</guid>
      <dc:creator>RBOULARES</dc:creator>
      <dc:date>2023-07-20T14:11:47Z</dc:date>
    </item>
    <item>
      <title>PAA 'Reset the password and reboot' fails when device is manually rebooted before PAA is executed</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/paa-reset-the-password-and-reboot-fails-when-device-is-manually/idi-p/3877249</link>
      <description>&lt;P&gt;We are currently using the following PAA option within the LAPS policy:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Reset the password and reboot: upon expiry of the grace period, the managed account password will be reset and the managed device will be immediately rebooted."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you login as the LAPS admin on the device the following event will be generated:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;##############################&lt;/P&gt;&lt;P&gt;10042&lt;/P&gt;&lt;P&gt;The post-authentication grace period has expired per policy. The configured post-authentication actions will now be executed.&lt;/P&gt;&lt;P&gt;##############################&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you now reboot the device manually before PAA execute LAPS will follow up with the following events:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;##############################&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;10047&lt;/P&gt;&lt;P&gt;A pending post-authentication reset timer has been rescheduled after a reboot.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;10051&lt;/P&gt;&lt;P&gt;LAPS is updating the managed account password in response to a post-authentication action.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;10030&lt;/P&gt;&lt;P&gt;LAPS is sending a message to the following endpoint.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://enterpriseregistration.windows.net/XXXXXXX" target="_blank" rel="noopener"&gt;https://enterpriseregistration.windows.net/XXXXXXX&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;10025&lt;/P&gt;&lt;P&gt;Azure discovery failed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;10005&lt;/P&gt;&lt;P&gt;LAPS policy processing failed with the error code below.&lt;/P&gt;&lt;P&gt;Error code: 0x800706BA&lt;/P&gt;&lt;P&gt;##############################&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This results in the LAPS password not being updated in AzureAD which means the password can be used again and again untill the 'next password rotation' kicks in which is makes this solution unsecure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Microsoft docs tells us the following for eventid 10025:&lt;/P&gt;&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/windows-security/windows-laps-troubleshooting-guidance#event-id-10025" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/troubleshoot/windows-server/windows-security/windows-laps-troubleshooting-guidance#event-id-10025&lt;/A&gt;&lt;/P&gt;&lt;P&gt;1) Verify that you can connect successfully to the registration endpoint (&lt;A href="https://enterpriseregistration.windows.net" target="_blank" rel="noopener"&gt;https://enterpriseregistration.windows.net&lt;/A&gt;). If you open Microsoft Edge or Google Chrome and connect to the registration endpoint (&lt;A href="https://enterpriseregistration.windows.net" target="_blank" rel="noopener"&gt;https://enterpriseregistration.windows.net&lt;/A&gt;), you get a message "Endpoint not found". This message means you can connect to the Enterprise Registration Endpoint.&lt;/P&gt;&lt;P&gt;2) If you're using a proxy server, verify that your proxy is configured under the system context. You can open an elevated command prompt and run the netsh winhttp show proxy command to display the proxy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've tested this and visting &lt;A href="https://enterpriseregistration.windows.net" target="_blank" rel="noopener"&gt;https://enterpriseregistration.windows.net&lt;/A&gt; gives us the expected response ("Endpoint not found").&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also 10 minutes after the 10025 event it starts the processing the LAPS policy again which it does succesfully, but does not update the password as part of the PAA:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;##############################&lt;/P&gt;&lt;P&gt;10016&lt;/P&gt;&lt;P&gt;The managed account password does not need to be updated at this time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;10004&lt;/P&gt;&lt;P&gt;LAPS policy processing succeeded.&lt;/P&gt;&lt;P&gt;##############################&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This also shows there is no problem reaching &lt;A href="https://enterpriseregistration.windows.net" target="_blank" rel="noopener"&gt;https://enterpriseregistration.windows.net&lt;/A&gt;. We've tested this both on Windows 10 and Windows 11 with latest updates.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 10:23:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/paa-reset-the-password-and-reboot-fails-when-device-is-manually/idi-p/3877249</guid>
      <dc:creator>Atitej</dc:creator>
      <dc:date>2023-07-18T10:23:31Z</dc:date>
    </item>
    <item>
      <title>Post-Authentication failed when occurs offline</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/post-authentication-failed-when-occurs-offline/idi-p/3873823</link>
      <description>&lt;P&gt;Bonjour &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;We experience a problem with post-authentication action.&amp;nbsp;&lt;BR /&gt;Windows LAPS detect when local admin logs on.&amp;nbsp;&lt;BR /&gt;It also writes in the event log that the password needs to be changed after the delay (24 hours)&lt;BR /&gt;&lt;BR /&gt;Our workstations are turned off every night. A lot of them are connected with a VPN.&amp;nbsp;&lt;BR /&gt;When the workstation starts in the morning, VPN is down. LAPS try to change the Admin password and failed because it's offline. When VPN is up, at the next LAPS cycle, it says the password doesn't need to be changed and the password is never changed.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Is there a way to fix that ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jul 2023 17:34:49 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/post-authentication-failed-when-occurs-offline/idi-p/3873823</guid>
      <dc:creator>Fred_AGNES</dc:creator>
      <dc:date>2023-07-13T17:34:49Z</dc:date>
    </item>
    <item>
      <title>PasswordAgeDays and PostAuthenticationResetDelay 0/24</title>
      <link>https://techcommunity.microsoft.com/t5/windows-laps-feedback/passwordagedays-and-postauthenticationresetdelay-0-24/idi-p/3872315</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;would it be possible to include a feature that allows passwords to remain valid till the next rotation specified through&amp;nbsp;PasswordAgeDays after they have been used?&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We miss this feature from legacy LAPS. Unfortunately we cannot use it with our new azure AD joined devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we leave&amp;nbsp;PostAuthenticationResetDelay unconfigured the 24hour cycle is really way too tight. Leaving it at 0 makes accounts unusable after authenticating till the next scheduled or manual rotation("The password has to be changed before this account can be used").&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 12:34:50 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-laps-feedback/passwordagedays-and-postauthenticationresetdelay-0-24/idi-p/3872315</guid>
      <dc:creator>FeroG440</dc:creator>
      <dc:date>2023-07-12T12:34:50Z</dc:date>
    </item>
  </channel>
</rss>

