Skip to content
EC-Council Cybersecurity Exchange Logo
  • Articles
  • Whitepapers
  • Cyber Talks
  • Success Stories
  • Train & Certify
    • Certifications

      ETHICAL HACKING
      • Certified Ethical Hacker (C|EH)
      • C|EH (MASTER)

      EXECUTIVE MANAGEMENT

      Certified Chief Information Security Officer (C|CISO)
      COMPUTER FORENSICS
      • Computer Hacking Forensic Investigator (C|HFI)
      NETWORK SECURITY
      • Certified Network Defender (C|ND)
      ENCRYPTION
      • Certified Encryption Specialist (E|CES)
      Pen testing
      • Certified Penetration Testing Professional (C|PENT)
      INCIDENT HANDLING
      • Certified Incident Handler (E|CIH)
      • Certified Threat Intelligence Analyst (C|TIA)
      • Certified SOC Analyst (C|SA)
      CLOUD SECURITY
      • Certified Cloud Security Engineer (C|CSE)
      DevSecOps
      • Certified DevSecOps Engineer (E|CDE)
      CYBER TECHNICIAN
      • Certified Cybersecurity Technician (C|CT)
      BLOCKCHAIN
      • Blockchain Developer Certification (B|DC)
      • Blockchain Fintech Certification (B|FC)
      • Blockchain Business Leader Certification (B|BLC)
      BUSINESS CONTINUITY AND DISASTER RECOVERY
      • Disaster Recovery Professional (E|DRP)
      FUNDAMENTALS
      • Certified Secure Computer User (C|SCU)
      • EC-Council Certified Security Specialist (E|CSS)
      ESSENTIALS SERIES
      • Network Defense Essentials (N|DE)
      • Ethical Hacking Essentials (E|HE)
      • Digital Forensics Essentials (D|FE)

      APPLICATION SECURITY

      Certified Application Security Engineer (C|ASE .NET)
      Certified Application Security Engineer (C|ASE Java)
      Web Application Hacking and Security

      Micro Learning

      Python Programming for Beginners
      Learn Python Online: From Novice to Pro
      Microdegree in Python Security
      Microdegree in PHP Security
      Identity and Access Management
      Linux Fundamentals
      Linux-Server Administration
      Cybersecurity for Blockchain from Ground Up
      Cybersecurity for Business
      Email Phishing
EC-Council_Cybersecurity-Exchange-tab
LAPS - WP - Mobile
LAPS - WP - Desktop
LAPS - WP - Mobile

LAPS Implementation Guide: Securing Local Administrator User Accounts and Improving Password Security.

  • April 7, 2023
  • Tas Jalali
  • Data Security

EC-Council’s whitepaper on LAPS Implementation Guide: Securing Local Administrator User Accounts and Improving Password Security, authored by Tas Jalali, Head of Cybersecurity, AC Transit, is a comprehensive guide on implementing Microsoft’s Local Administrator Password Solution (LAPS) to improve the security of local administrator accounts. The whitepaper provides insights into the challenges of managing local administrator accounts, the benefits of using LAPS, and a step-by-step guide on implementing LAPS in an organization.

One of the key challenges highlighted in the whitepaper is managing local administrator accounts. These accounts often have weak and shared passwords, which attackers can easily compromise. Additionally, these accounts often need to be properly managed or monitored, which can lead to security breaches. The whitepaper emphasizes the importance of implementing strong password policies for local administrator accounts and monitoring their use to prevent unauthorized access.

LAPS - infographic

The whitepaper introduces LAPS as a solution to these challenges. LAPS is a free tool from Microsoft that allows organizations to manage the passwords of local administrator accounts. With LAPS, each local administrator account is assigned a unique, randomly generated password stored securely in Active Directory. This ensures that each account has a strong, unique password that is changed regularly and that the passwords are not shared or easily discoverable.

The whitepaper provides a step-by-step guide on implementing LAPS in an organization. The guide covers the prerequisites for implementing LAPS, such as setting up Active Directory and configuring Group Policy settings. It also provides detailed instructions on how to install and configure LAPS on individual computers and how to manage the passwords of local administrator accounts using LAPS. Overall, the whitepaper provides valuable insights into the importance of securing local administrator accounts and the benefits of using LAPS. The step-by-step guide makes it easy for organizations to implement LAPS and improve their password security.

In conclusion, EC-Council’s LAPS Implementation Guide whitepaper is a must-read for organizations that want to improve the security of their local administrator accounts. By following the step-by-step guide, organizations can easily implement LAPS and ensure that their local administrator accounts have strong, unique passwords that are regularly changed and not easily discoverable. To learn more, download the whitepaper by submitting the details in the form below.

Please Fill Out This Form to Download the White Paper

"*" indicates required fields

Name*
Country*
I agree to the privacy policy.*
Please confirm by checking the box below that you consent to EC-Council contacting you regarding the product interest you have indicated above. Your information will not be shared with any third party. Please see our full privacy policy here.

About the Author

Picture of EC-Council University

EC-Council University

All posts by this author
Tas Jalali

Tas Jalali

Head of Cybersecurity, AC Transit

Tas is an accomplished cybersecurity leader with 17+ years of experience in startups and Fortune 500 companies. He specializes in risk-based Information Security programs, Compliance, and Privacy, aligning security with business strategies. Tas has led security teams, developed secure products, managed technology risk, and achieved regulatory compliance. He has consulted for Fortune 500 companies, improving their security strategies and risk management. Tas is the head of cybersecurity at AC Transit and holds a BS in Engineering and a Master’s (ALM) from Harvard University.
Share this Article
Facebook
Twitter
LinkedIn
WhatsApp
Pinterest
Picture of EC-Council University

EC-Council University

All posts by this author
You may also like
From Data to Defense: A Guide to Cyber Threat Analysis
April 1, 2025
Disaster Recovery as a Service (DRaaS): A Key to Cyber Resilience
April 1, 2025
Disaster Recovery as a Service (DRaaS)
Disaster Recovery as a Service (DRaaS): A Key to Cyber Resilience
March 25, 2025
Recent Whitepapers
From Data to Defense: A Guide to Cyber…
April 1, 2025
Disaster Recovery as a Service (DRaaS): A Key…
April 1, 2025
Disaster Recovery as a Service (DRaaS)
Disaster Recovery as a Service (DRaaS): A Key…
March 25, 2025
Securing Healthcare: Overcoming Cyber Threats in a Digital…
March 12, 2025
EC-Council Logo
Linkedin-in Twitter Facebook-f Youtube

© 2022 EC-Council

Get Training
Partner With Us
Terms Of Use
Privacy Policy
Report Issue
Publishing Guidelines
Sitemap

© 2022 EC-Council

Get training
Partner With Us
Terms Of Use
Privacy Policy
Report Issue
Publishing Guidelines
Sitemap
Go to Top
  • Articles
  • Whitepapers
  • Cyber Talks
  • Success Stories
  • Train & Certify