Windows LAPS and Legacy LAPS – Key Differences

Windows LAPS (Local Administrator Password Solution) is the successor to the legacy LAPS, offering significant improvements and new features while maintaining some of the core functionalities of its predecessor. Below is a detailed comparison of the two versions.

Key Differences Between Legacy and Windows Windows Local Administrator Password Solution

FeatureLegacy Microsoft LAPSWindows LAPS
IntegrationRequires separate installation via MSIBuilt into Windows 10, 11, and Server platforms (with updates from April 2023 or later)
Password Storage OptionsActive Directory onlySupports both Active Directory and Azure Active Directory for password storage
Password EncryptionNot availableSupports encryption of passwords in Windows Server Active Directory
Password HistoryNot availableStores password history for auditing or recovery purposes
DSRM Account ManagementNot supportedCan manage and back up Directory Services Restore Mode (DSRM) passwords on domain controllers
Automatic ActionsLimitedIncludes automatic responses to password usage (e.g., resetting after retrieval)
Migration SupportNot applicableOffers a legacy emulation mode to ease migration from legacy Microsoft LAPS

Advantages of microsoft laps vs windows laps

What are the true advantages?

  • Native Integration: Built into supported operating systems, eliminating the need for installing additional software on client devices.
  • Enhanced Security Features: It introduces password encryption and history tracking, which were absent in the legacy version. These features enhance security and provide better control over password management.
  • Cloud Compatibility: Windows LAPS supports Azure Active Directory, enabling organizations to manage local administrator passwords in hybrid or cloud-only environments.
  • DSRM Password Management: The ability to manage DSRM passwords adds another layer of functionality for domain controllers.
  • Ease of Migration: A legacy emulation mode allows organizations to transition smoothly from legacy Microsoft Local Administrator Password Solution while maintaining compatibility during the migration process.
  • PostAuthenticationActions: Create Action to limit the time of how long a Windows LAPS password can be used and what the follow up actions are.
Windows LAPS Post Authentication Actions
Post Authentication Actions

For more details check here.

Legacy Microsoft Schema vs new Schema

Windows LAPS Schema ElementLegacy Microsoft LAPS Schema Element
msLAPS-PasswordExpirationTimems-Mcs-AdmPwdExpirationTime
msLAPS-Passwordms-Mcs-AdmPwd
msLAPS-EncryptedPasswordNot available / not used
msLAPS-EncryptedPasswordHistoryNot available / not used
msLAPS-EncryptedDSRMPasswordNot available / not used
msLAPS-EncryptedDRSMPasswordHistoryNot available / not used
msLAPS-Encrypted-Password-AttributesNot available / not used

Deployment Considerations

While Windows LAPS provides substantial improvements, there are some considerations:

  • Legacy Microsoft LAPS is deprecated on newer operating systems, making migration to Windows LAPS necessary for long-term support.
  • A side-by-side deployment of both versions is possible for testing purposes but requires careful management as each version can only manage one password per local administrator account.

In conclusion, Windows LAPS represents a modernized and more secure approach to managing local administrator passwords compared to its predecessor. Organizations using legacy Microsoft LAPS are encouraged to migrate to Windows LAPS to benefit from its enhanced features and integration with modern IT environments.

Learn how to deploy Windows LAPS here.

Spread the knowledge
Avatar for Andreas Hartig
Andreas Hartig - MVP - Cloud and Datacenter Management, Microsoft Azure

Related Posts

IT System Engineer Dragon Protect object from accidental deletion

The 2nd Thing to Enable in Every AD – Protect object from accidental deletion

Protect object from accidential deletion is your 1st line of protection, if you value your OU structure. The checkbox “Protect object from accidental deletion” stops both accidental deletes and moves….

Spread the knowledge
Read more
Dragon Active Directory Recycle Bin

The First Thing to Enable in Every AD – Active Directory Recycle Bin

The Active Directory Recycle Bin is not a “nice-to-have” in 2025 — it’s mandatory. It allows fast, attribute-preserving recovery of deleted AD objects without the pain of authoritative restores. It…

Spread the knowledge
Read more
Automation via Group Policyv2

Automation using Group Policy – Background

Automation using Group Policy is most likely the easiest step in your environment for custimzation. In one of the latest Blog articles we looked into “Group Policies and Group Policies…

Spread the knowledge
Read more
Cyber dragon designs IT architecture and taking a risk among glowing screens

Windows Server 2025 Autologon: When and Why?

Windows Server 2025 Autologon is a challenging discussion. Learn why, when and how to enable Autologon in Windows Server 2025 safely, plus robust mitigation strategies. A reboot that lands on…

Spread the knowledge
Read more
Cyber dragon sits at a bright wooden desk coding on a Windows Server screen with stack of books

Group Policies and Group Policies Preferences (2025)

For Group Policies the time between Windows Server 2022 and Windows Server 2025 had a focus to move Group Policies and Group Policies Preferences towards being code-driven solution rather than…

Spread the knowledge
Read more
A Shadowrun style dr

Windows Server 2025 – Part 8 (Configuring Highly Available DHCP)

Highly Available DHCP is the backbone of network connectivity in modern infrastructures. When DHCP fails, clients lose IP leases, hindering access to services. Windows Server 2025’s built-in DHCP failover ensures…

Spread the knowledge
Read more