Skip to content
EC-Council Cybersecurity Exchange Logo
  • Articles
  • Whitepapers
  • Cyber Talks
  • Train & Certify
    • Certifications

      ETHICAL HACKING
      • Certified Ethical Hacker (C|EH)
      • C|EH (MASTER)

      EXECUTIVE MANAGEMENT

      Certified Chief Information Security Officer (C|CISO)
      COMPUTER FORENSICS
      • Computer Hacking Forensic Investigator (C|HFI)
      NETWORK SECURITY
      • Certified Network Defender (C|ND)
      ENCRYPTION
      • Certified Encryption Specialist (E|CES)
      Pen testing
      • Certified Penetration Testing Professional (C|PENT)
      INCIDENT HANDLING
      • Certified Incident Handler (E|CIH)
      • Certified Threat Intelligence Analyst (C|TIA)
      • Certified SOC Analyst (C|SA)
      CLOUD SECURITY
      • Certified Cloud Security Engineer (C|CSE)
      DevSecOps
      • Certified DevSecOps Engineer (E|CDE)
      CYBER TECHNICIAN
      • Certified Cybersecurity Technician (C|CT)
      BLOCKCHAIN
      • Blockchain Developer Certification (B|DC)
      • Blockchain Fintech Certification (B|FC)
      • Blockchain Business Leader Certification (B|BLC)
      BUSINESS CONTINUITY AND DISASTER RECOVERY
      • Disaster Recovery Professional (E|DRP)
      FUNDAMENTALS
      • Certified Secure Computer User (C|SCU)
      • EC-Council Certified Security Specialist (E|CSS)
      ESSENTIALS SERIES
      • Network Defense Essentials (N|DE)
      • Ethical Hacking Essentials (E|HE)
      • Digital Forensics Essentials (D|FE)

      APPLICATION SECURITY

      Certified Application Security Engineer (C|ASE .NET)
      Certified Application Security Engineer (C|ASE Java)
      Web Application Hacking and Security

      Micro Learning

      Python Programming for Beginners
      Learn Python Online: From Novice to Pro
      Microdegree in Python Security
      Microdegree in PHP Security
      Identity and Access Management
      Linux Fundamentals
      Linux-Server Administration
      Cybersecurity for Blockchain from Ground Up
      Cybersecurity for Business
      Email Phishing
EC-Council_Cybersecurity-Exchange-tab
LAPS-WP-Mobile.jpg
LAPS-WP-Mobile.jpg

LAPS Implementation Guide: Securing Local Administrator User Accounts and Improving Password Security.

  • April 17, 2023
  • Tas Jalali
  • Data Security

EC-Council’s whitepaper on LAPS Implementation Guide: Securing Local Administrator User Accounts and Improving Password Security, authored by Tas Jalali, Head of Cybersecurity, AC Transit, is a comprehensive guide on implementing Microsoft’s Local Administrator Password Solution (LAPS) to improve the security of local administrator accounts. The whitepaper provides insights into the challenges of managing local administrator accounts, the benefits of using LAPS, and a step-by-step guide on implementing LAPS in an organization.

One of the key challenges highlighted in the whitepaper is managing local administrator accounts. These accounts often have weak and shared passwords, which attackers can easily compromise. Additionally, these accounts often need to be properly managed or monitored, which can lead to security breaches. The whitepaper emphasizes the importance of implementing strong password policies for local administrator accounts and monitoring their use to prevent unauthorized access.

The whitepaper introduces LAPS as a solution to these challenges. LAPS is a free tool from Microsoft that allows organizations to manage the passwords of local administrator accounts. With LAPS, each local administrator account is assigned a unique, randomly generated password stored securely in Active Directory. This ensures that each account has a strong, unique password that is changed regularly and that the passwords are not shared or easily discoverable.

The whitepaper provides a step-by-step guide on implementing LAPS in an organization. The guide covers the prerequisites for implementing LAPS, such as setting up Active Directory and configuring Group Policy settings. It also provides detailed instructions on how to install and configure LAPS on individual computers and how to manage the passwords of local administrator accounts using LAPS. Overall, the whitepaper provides valuable insights into the importance of securing local administrator accounts and the benefits of using LAPS. The step-by-step guide makes it easy for organizations to implement LAPS and improve their password security.

In conclusion, EC-Council’s LAPS Implementation Guide whitepaper is a must-read for organizations that want to improve the security of their local administrator accounts. By following the step-by-step guide, organizations can easily implement LAPS and ensure that their local administrator accounts have strong, unique passwords that are regularly changed and not easily discoverable. To learn more, download the whitepaper by submitting the details in the form below.

Submit the Form Below to Download this Whitepaper

"*" indicates required fields

Name*
Country*
I agree to the privacy policy.*
Please confirm by checking the box below that you consent to EC-Council contacting you regarding the product interest you have indicated above. Your information will not be shared with any third party. Please see our full privacy policy here.

Tags

  • Account Security, Authentication Security, cybersecurity, Cybersecurity Solutions, Cybersecurity Strategies, Cybersecurity Whitepaper, IT Risk Management, IT security, LAPS, Local Administrator Password Solution, Network Security, Password Management, Password Policy, Password Protection, Password Security, Security Best Practices
Tas Jalali

Tas Jalali

All posts by this author

About the Author

Tas Jalali - Author

Tas Jalali

Head of Cybersecurity, AC Transit

Tas is an accomplished cybersecurity leader with 17+ years of experience in startups and Fortune 500 companies. He specializes in risk-based Information Security programs, Compliance, and Privacy, aligning security with business strategies. Tas has led security teams, developed secure products, managed technology risk, and achieved regulatory compliance. He has consulted for Fortune 500 companies, improving their security strategies and risk management. Tas is the head of cybersecurity at AC Transit and holds a BS in Engineering and a Master’s (ALM) from Harvard University.
Share this Article
Facebook
Twitter
LinkedIn
WhatsApp
Pinterest
Tas Jalali

Tas Jalali

All posts by this author
You may also like
Securing-Kubernetes-Mobile-thumbnail.jpg
Securing Kubernetes Workloads in the Cloud: Best Practices for Next Gen Business Applications
May 18, 2023
SOC-Mobile-Thumbnail
From Reactive to Proactive: How Your SOC Needs to Evolve for Effective Threat Detection and Response
May 15, 2023
IAAS
A Guide to Cloud Forensics in IaaS: Overcoming Challenges and Strengthening Security Measures
May 11, 2023
Recent Whitepapers
Securing-Kubernetes-Mobile-thumbnail.jpg
Securing Kubernetes Workloads in the Cloud: Best Practices…
May 18, 2023
SOC-Mobile-Thumbnail
From Reactive to Proactive: How Your SOC Needs…
May 15, 2023
IAAS
A Guide to Cloud Forensics in IaaS: Overcoming…
May 11, 2023
Rootkit
The Rise of Rootkit Malware: Understanding the Threat…
May 3, 2023
Ad - CodeRed Annual Subscription - 30Percent off
EC-Council Logo
Linkedin-in Twitter Facebook-f Youtube
© 2023 EC-Council
Get Training
Partner With Us
Terms Of Use
Privacy Policy
Report Issue
Publishing Guidelines
Sitemap

© 2022 EC-Council

Get training
Partner With Us
Terms Of Use
Privacy Policy
Report Issue
Publishing Guidelines
Sitemap
Go to Top
  • Articles
  • Whitepapers
  • Cyber Talks
  • Train & Certify