Windows LAPS and Legacy LAPS – Key Differences

Windows LAPS (Local Administrator Password Solution) is the successor to the legacy LAPS, offering significant improvements and new features while maintaining some of the core functionalities of its predecessor. Below is a detailed comparison of the two versions.

Key Differences Between Legacy and Windows Windows Local Administrator Password Solution

FeatureLegacy Microsoft LAPSWindows LAPS
IntegrationRequires separate installation via MSIBuilt into Windows 10, 11, and Server platforms (with updates from April 2023 or later)
Password Storage OptionsActive Directory onlySupports both Active Directory and Azure Active Directory for password storage
Password EncryptionNot availableSupports encryption of passwords in Windows Server Active Directory
Password HistoryNot availableStores password history for auditing or recovery purposes
DSRM Account ManagementNot supportedCan manage and back up Directory Services Restore Mode (DSRM) passwords on domain controllers
Automatic ActionsLimitedIncludes automatic responses to password usage (e.g., resetting after retrieval)
Migration SupportNot applicableOffers a legacy emulation mode to ease migration from legacy Microsoft LAPS

Advantages of microsoft laps vs windows laps

What are the true advantages?

  • Native Integration: Built into supported operating systems, eliminating the need for installing additional software on client devices.
  • Enhanced Security Features: It introduces password encryption and history tracking, which were absent in the legacy version. These features enhance security and provide better control over password management.
  • Cloud Compatibility: Windows LAPS supports Azure Active Directory, enabling organizations to manage local administrator passwords in hybrid or cloud-only environments.
  • DSRM Password Management: The ability to manage DSRM passwords adds another layer of functionality for domain controllers.
  • Ease of Migration: A legacy emulation mode allows organizations to transition smoothly from legacy Microsoft Local Administrator Password Solution while maintaining compatibility during the migration process.
  • PostAuthenticationActions: Create Action to limit the time of how long a Windows LAPS password can be used and what the follow up actions are.
Windows LAPS Post Authentication Actions
Post Authentication Actions

For more details check here.

Legacy Microsoft Schema vs new Schema

Windows LAPS Schema ElementLegacy Microsoft LAPS Schema Element
msLAPS-PasswordExpirationTimems-Mcs-AdmPwdExpirationTime
msLAPS-Passwordms-Mcs-AdmPwd
msLAPS-EncryptedPasswordNot available / not used
msLAPS-EncryptedPasswordHistoryNot available / not used
msLAPS-EncryptedDSRMPasswordNot available / not used
msLAPS-EncryptedDRSMPasswordHistoryNot available / not used
msLAPS-Encrypted-Password-AttributesNot available / not used

Deployment Considerations

While Windows LAPS provides substantial improvements, there are some considerations:

  • Legacy Microsoft LAPS is deprecated on newer operating systems, making migration to Windows LAPS necessary for long-term support.
  • A side-by-side deployment of both versions is possible for testing purposes but requires careful management as each version can only manage one password per local administrator account.

In conclusion, Windows LAPS represents a modernized and more secure approach to managing local administrator passwords compared to its predecessor. Organizations using legacy Microsoft LAPS are encouraged to migrate to Windows LAPS to benefit from its enhanced features and integration with modern IT environments.

Learn how to deploy Windows LAPS here.

Spread the knowledge
Avatar for Andreas Hartig
Andreas Hartig - MVP - Cloud and Datacenter Management, Microsoft Azure

Related Posts

IT Operations Dragon happy about QoL on Servers

Automation using Group Policy – Quality of Life GPO

Quality of Life GPOs. Finally. My favorite settings. In our previous articles, we established the Group Policies Foundation and discussed the Background of Automation. We also implemented some important GPOs….

Spread the knowledge
Read more
dragon it security happy world time clock

Automation using Group Policy – Configure Time Zone using GPOs

Setting the time zone on a server was often a manual step during the “Out of Box Experience” (OOBE). Let’s Configure Time Zone using GPOs as it might be something…

Spread the knowledge
Read more
dragon it operations windows firewall

Automation using Group Policy – Allow Ping on Windows Server 2025

Let’s be honest: There is nothing more frustrating than deploying a fresh Windows Server 2025 instance, trying to ping it to verify connectivity, and getting a “Request Timed Out.” We…

Spread the knowledge
Read more
dragon it system engineer

What are Microsoft Security Baselines for Windows Server 2025

If you run Windows Server 2025 in production (on-prem, Azure, Azure Arc, “Adaptive Cloud”, homelab-with-a-budget — doesn’t matter), you need to understand “Microsoft Security Baselines for Windows Server 2025” and…

Spread the knowledge
Read more
IT Architect Dragon being hands on with a NAS Ugreen 4800 Pro

Windows Server 2025 on Ugreen NAS: Fixing annoying CPU Compatibility via CLI

I’ve been testing Windows Server 2025 in my HomeLab, specifically running on a Ugreen NAS. While Ugreen’s hardware is fantastic for storage, its virtualization manager (based on KVM/QEMU) sometimes applies…

Spread the knowledge
Read more
IT Security Dragon reading Windows Event Logs

Windows Server Event Log and Event Log Policies

Windows Server Event Log for most teams are only used when something already smells like incident:💥 DC misbehaving,💥 file server “mysteriously slow”,💥 SOC asking for “all the logs you have…

Spread the knowledge
Read more