The actual risk
Local administrator passwords are rarely the first topic in an AD project. In attack paths, they still matter: one reused local password, overly broad helpdesk access or an unclear recovery process can turn a client issue into a domain path.
Windows LAPS is therefore not a cosmetic baseline item. It is a control against lateral movement and operational pressure during incidents.
Rollout without surprises
- Separate scopes: clients, servers, special devices and domain controllers have different risks.
- Choose the backup target deliberately: AD DS, Microsoft Entra or a hybrid model.
- Delegate read permissions tightly; password retrieval is privileged access.
- Test rotation after use and after role changes.
- Include DSRM passwords for domain controllers in the operational process.
Early checks
- Which OUs receive which LAPS policy?
- Who can read passwords and who can only rotate them?
- Are retrievals logged and reviewed?
- Do old local admin groups undermine the control?
- Does recovery still work after hours?
What gets better
- Reused local administrator passwords disappear from the attack path.
- Helpdesk access becomes traceable because retrieval and rotation can be documented.
- DSRM and local recovery scenarios can be operated with more control.
Where it can hurt
- Broad read permissions make LAPS itself an attractive target.
- Old local admin groups or manual password processes can undermine the control.
- If rotation after retrieval is not tested, passwords remain usable longer than intended.
Checks before rollout
- Which OUs receive which policy?
- Who can read, rotate and delegate?
- Are retrievals logged and reviewed?
- Are DSRM and break-glass processes part of the operating model?
Bottom line
LAPS is easy to enable. It becomes a security control only when permissions, rotation and operations are clean as well.