Information
This policy setting configures the Windows LAPS Password Settings policy for password age.
Because attackers can crack passwords, the more frequently the password is changed the less opportunity an attacker has to use a cracked password.
The recommended state for this setting is: Enabled: 30 or fewer
Note: Organizations that utilize third-party commercial software to manage unique & complex local Administrator passwords on domain members may opt to disregard these LAPS recommendations.
Note #2: Windows LAPS does not support standalone computers - they must be joined to an Active Directory domain or Entra ID (formerly Azure Active Directory).
Due to the difficulty in managing local Administrator passwords, many organizations choose to use the same password on all workstations and/or Member Servers when deploying them. This creates a serious attack surface security risk because if an attacker manages to compromise one system and learn the password to its local Administrator account, then they can leverage that account to instantly gain access to all other computers that also use that password for their local Administrator account.
Solution
To establish the recommended configuration via GP, set the following UI path to Enabled and configure the Password Age (Days) option to 30 or fewer :
Computer Configuration\Policies\Administrative Templates\System\LAPS\Password Settings
Note: This Group Policy path may not exist by default. It is provided by the Group Policy template LAPS.admx/adml that is included with the Microsoft Windows 11 Release 22H2 Administrative Templates v3.0 (or newer).
Impact:
None - this is the default behavior, unless set to fewer than 30 days.