Skip to content
EC-Council Cybersecurity Exchange Logo
  • Articles
  • Online Degree
    • Masters of Cyber Security
    • Master of Science in Computer Science
    • Masters In Business Administration
    • Bachelors of Science in Cyber Security
    • Graduate Certificate Program
  • Whitepapers
  • Cyber Talks
  • Success Stories
  • Train & Certify
    • Certifications

      ETHICAL HACKING
      • Certified Ethical Hacker (C|EH)
      • C|EH (MASTER)

      EXECUTIVE MANAGEMENT

      Certified Chief Information Security Officer (C|CISO)
      Associate C|CISO
      COMPUTER FORENSICS
      • Computer Hacking Forensic Investigator (C|HFI)
      NETWORK SECURITY
      • Certified Network Defender (C|ND)
      • ICS/SCADA Cybersecurity
      ENCRYPTION
      • Certified Encryption Specialist (E|CES)
      Pen testing
      • Certified Penetration Testing Professional (C|PENT)
      INCIDENT HANDLING
      • Certified Incident Handler (E|CIH)
      • Certified Threat Intelligence Analyst (C|TIA)
      • Certified SOC Analyst (C|SA)
      CLOUD SECURITY
      • Certified Cloud Security Engineer (C|CSE)
      DevSecOps
      • Certified DevSecOps Engineer (E|CDE)
      CYBER TECHNICIAN
      • Certified Cybersecurity Technician (C|CT)
      BLOCKCHAIN
      • Blockchain Developer Certification (B|DC)
      • Blockchain Fintech Certification (B|FC)
      • Blockchain Business Leader Certification (B|BLC)
      BUSINESS CONTINUITY AND DISASTER RECOVERY
      • Disaster Recovery Professional (E|DRP)
      FUNDAMENTALS
      • Certified Secure Computer User (C|SCU)
      • EC-Council Certified Security Specialist (E|CSS)
      ESSENTIALS SERIES
      • Network Defense Essentials (N|DE)
      • Ethical Hacking Essentials (E|HE)
      • Digital Forensics Essentials (D|FE)
      • DevSecOps Essentials (D|SE)
      • SOC Essentials (S|CE)
      • Cloud Security Essentials (C|SE)
      • IoT Security Essentials (I|SE)
      • Threat Intelligence Essentials (T|IE)

      APPLICATION SECURITY

      Certified Application Security Engineer (C|ASE .NET)
      Certified Application Security Engineer (C|ASE Java)
      Web Application Hacking and Security (W|AHS)

      Micro Learning

      Python Programming for Beginners
      Learn Python Online: From Novice to Pro
      Microdegree in Python Security
      Microdegree in PHP Security
      Identity and Access Management
      Linux Fundamentals
      Linux-Server Administration
      Cybersecurity for Blockchain from Ground Up
      Cybersecurity for Business
      Email Phishing
EC-Council_Cybersecurity-Exchange-tab
LAPS-WP-Mobile.jpg
LAPS-WP-Mobile.jpg
LAPS-WP-Mobile.jpg

LAPS Implementation Guide: Securing Local Administrator User Accounts and Improving Password Security.

  • April 17, 2023
  • Tas Jalali
  • Data Security

EC-Council’s whitepaper on LAPS Implementation Guide: Securing Local Administrator User Accounts and Improving Password Security, authored by Tas Jalali, Head of Cybersecurity, AC Transit, is a comprehensive guide on implementing Microsoft’s Local Administrator Password Solution (LAPS) to improve the security of local administrator accounts. The whitepaper provides insights into the challenges of managing local administrator accounts, the benefits of using LAPS, and a step-by-step guide on implementing LAPS in an organization.

One of the key challenges highlighted in the whitepaper is managing local administrator accounts. These accounts often have weak and shared passwords, which attackers can easily compromise. Additionally, these accounts often need to be properly managed or monitored, which can lead to security breaches. The whitepaper emphasizes the importance of implementing strong password policies for local administrator accounts and monitoring their use to prevent unauthorized access.

The whitepaper introduces LAPS as a solution to these challenges. LAPS is a free tool from Microsoft that allows organizations to manage the passwords of local administrator accounts. With LAPS, each local administrator account is assigned a unique, randomly generated password stored securely in Active Directory. This ensures that each account has a strong, unique password that is changed regularly and that the passwords are not shared or easily discoverable.

The whitepaper provides a step-by-step guide on implementing LAPS in an organization. The guide covers the prerequisites for implementing LAPS, such as setting up Active Directory and configuring Group Policy settings. It also provides detailed instructions on how to install and configure LAPS on individual computers and how to manage the passwords of local administrator accounts using LAPS. Overall, the whitepaper provides valuable insights into the importance of securing local administrator accounts and the benefits of using LAPS. The step-by-step guide makes it easy for organizations to implement LAPS and improve their password security.

In conclusion, EC-Council’s LAPS Implementation Guide whitepaper is a must-read for organizations that want to improve the security of their local administrator accounts. By following the step-by-step guide, organizations can easily implement LAPS and ensure that their local administrator accounts have strong, unique passwords that are regularly changed and not easily discoverable. To learn more, download the whitepaper by submitting the details in the form below.

Submit the Form Below to Download this Whitepaper

"*" indicates required fields

Country*
I agree to the privacy policy.*
Please confirm by checking the box below that you consent to EC-Council contacting you regarding the product interest you have indicated above. Your information will not be shared with any third party. Please see our full privacy policy here.

Tags

  • Account Security, Authentication Security, cybersecurity, Cybersecurity Solutions, Cybersecurity Strategies, Cybersecurity Whitepaper, IT Risk Management, IT security, LAPS, Local Administrator Password Solution, Network Security, Password Management, Password Policy, Password Protection, Password Security, Security Best Practices
Picture of Tas Jalali

Tas Jalali

All posts by this author

About the Author

Tas Jalali - Author

Tas Jalali

Head of Cybersecurity, AC Transit

Tas is an accomplished cybersecurity leader with 17+ years of experience in startups and Fortune 500 companies. He specializes in risk-based Information Security programs, Compliance, and Privacy, aligning security with business strategies. Tas has led security teams, developed secure products, managed technology risk, and achieved regulatory compliance. He has consulted for Fortune 500 companies, improving their security strategies and risk management. Tas is the head of cybersecurity at AC Transit and holds a BS in Engineering and a Master’s (ALM) from Harvard University.
Share this Article
Facebook
Twitter
LinkedIn
WhatsApp
Pinterest
Picture of Tas Jalali

Tas Jalali

All posts by this author
You may also like
From Data to Defense: A Guide to Cyber Threat Analysis
From Data to Defense: A Guide to Cyber Threat Analysis
March 31, 2025
Disaster Recovery as a Service (DRaaS)
Disaster Recovery as a Service (DRaaS): A Key to Cyber Resilience
March 25, 2025
Securing Healthcare: Overcoming Cyber Threats in a Digital Era
March 13, 2025
Recent Whitepapers
From Data to Defense: A Guide to Cyber Threat Analysis
From Data to Defense: A Guide to Cyber…
March 31, 2025
Disaster Recovery as a Service (DRaaS)
Disaster Recovery as a Service (DRaaS): A Key…
March 25, 2025
Securing Healthcare: Overcoming Cyber Threats in a Digital…
March 13, 2025
The-Role-of-Zero-Trust-Security-Model-in-Cybersecurity
The Role of the Zero Trust Security Model…
December 13, 2024
EC-Council Logo
EC-Council was formed in 2001 after very disheartening research following the 9/11 attack on the World Trade Center. Founder and CEO of the EC-Council Group, Jay Bavisi, after watching the attacks unfold, raised the question, what if a similar attack were to be carried out on the cyber battlefield? Read More…
Facebook X-twitter Youtube Linkedin Instagram
CAREER TRACKS

Vulnerability Assessment And Penetration Testing (VAPT)

Network Defense And Operation

Digital Forensic

Application Security

Incident Handling And Response

TRENDING CERTIFICATIONS

Certified Ethical Hacker (C|EH)

Certified Chief Information Security Officer (C|CISO)

Computer Hacking Forensic Investigator (C|HFI)

Certified Network Defender (C|ND)

Certified Incident Handler (E|CIH)

Certified Penetration Testing Professional (C|PENT)

Certified SOC Analyst (C|SA)

Certified Cybersecurity Technician (C|CT)

CUSTOMER SERVICE

Partner With Us

Have A Question

Report Grievance

Training Partner Portal

Bug Bounty Program

Community

COMPANY

About

Contact Us

Pressroom

About

Contact Us

Careers

Pressroom

Copyright © EC-Council All Rights Reserved.
Partner With Us
Legal
EC-Council Logo
Linkedin-in Twitter Facebook-f Youtube

© 2025 EC-Council

Get Training
Partner With Us
Terms Of Use
Privacy Policy
Report Issue
Publishing Guidelines
Sitemap

© 2024 EC-Council

Get training
Partner With Us
Terms Of Use
Privacy Policy
Report Issue
Publishing Guidelines
Sitemap
Go to Top
  • Articles
  • Online Degree
    • Masters of Cyber Security
    • Master of Science in Computer Science
    • Masters In Business Administration
    • Bachelors of Science in Cyber Security
    • Graduate Certificate Program
  • Whitepapers
  • Cyber Talks
  • Success Stories
  • Train & Certify
YES, I WANT TO APPLY!