User Tools

Site Tools


despliegue_de_laps

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
despliegue_de_laps [2025/10/27 20:32] – [2. Extender el esquema de Active Directory] osodespliegue_de_laps [2025/11/26 16:37] (current) oso
Line 1: Line 1:
-====== Despliegue de LAPS ======+====== Despliegue de Microsoft LAPS (viejo) ======
  
 ===== 1. Preparación ===== ===== 1. Preparación =====
Line 106: Line 106:
   * **Set-AdmPwdReadPasswordPermission** – delega lectura.   * **Set-AdmPwdReadPasswordPermission** – delega lectura.
   * **Set-AdmPwdResetPasswordPermission** – delega reseteo.   * **Set-AdmPwdResetPasswordPermission** – delega reseteo.
 +
 +
 +
 +====== Windows LAPS Deployment Steps (current) ======
 +
 +===== 1. Update Domain Controllers =====
 +  * Ensure all DCs are patched to at least the April 11, 2023 update (Windows Server 2019/2022 or newer).
 +  * Run Windows Update on *all* DCs before schema extension.
 +
 +===== 2. Extend Active Directory Schema =====
 +  * Open PowerShell as Administrator on a supported DC.
 +  * Import the LAPS module:
 +<code>
 +ipmo LAPS
 +</code>
 +  * Verify module:
 +<code>
 +gcm -Module LAPS
 +</code>
 +  * Extend schema:
 +<code>
 +Update-LapsADSchema
 +</code>
 +
 +===== 3. Verify LAPS Attributes =====
 +  * Run again with verbose:
 +<code>
 +Update-LapsADSchema -Verbose
 +</code>
 +  * Confirm attributes like **msLAPS-Password**, **msLAPS-EncryptedPassword**, etc. are present.
 +
 +===== 4. Set Computer Self-Permission =====
 +  * Grant managed devices permission to update their own password:
 +<code>
 +Set-LapsADComputerSelfPermission -Identity "OU=Company,DC=domain,DC=local"
 +</code>
 +
 +===== 5. Configure Group Policy =====
 +  * Create a new GPO (e.g., **C_LAPS**).
 +  * Navigate: **Computer Configuration → Policies → Administrative Templates → System → LAPS**.
 +  * Enable and configure:
 +    - **Configure password backup directory** → Active Directory or Entra ID
 +    - **Password Settings** → complexity, length, expiration
 +    - **Name of administrator account to manage** → leave *Not Configured* to manage built-in .\Administrator, or set to custom (e.g., lapsadmin)
 +    - **Configure authorized password decryptors** → define who can read/reset passwords
 +
 +===== 6. Create/Manage Local Admin Account =====
 +  * If using a custom account (e.g., lapsadmin), deploy it via GPO or script.
 +  * Disable other local admin accounts for security.
 +
 +===== 7. Retrieve Passwords =====
 +  * **GUI**: ADUC → Computer object → *LAPS tab* → Show Password
 +  * **PowerShell**:
 +<code>
 +Get-LapsADPassword -Identity "PCNAME" -AsPlainText
 +</code>
 +
 +===== 8. Test & Reset =====
 +  * Sign in with the managed account and password.
 +  * Reset manually if needed:
 +<code>
 +Reset-LapsPassword
 +</code>
 +
 +----
 +
 +==== Key Notes ====
 +  * No MSI client install required — Windows LAPS is built into supported OS versions.
 +  * Legacy LAPS UI does **not** work with Windows LAPS; use ADUC or PowerShell.
 +  * Best practice: start with .\Administrator, later switch to a custom account if desired.
 +
 +https://www.alitajran.com/windows-laps/#h-how-to-configure-windows-laps
 +
despliegue_de_laps.1761597137.txt.gz · Last modified: 2025/10/27 20:32 by oso