Skip to content
EC-Council Cybersecurity Exchange Logo
  • Articles
  • Whitepapers
  • Cyber Talks
  • Success Stories
  • Train & Certify
    • Certifications

      ETHICAL HACKING
      • Certified Ethical Hacker (C|EH)
      • C|EH (MASTER)

      EXECUTIVE MANAGEMENT

      Certified Chief Information Security Officer (C|CISO)
      Associate C|CISO
      COMPUTER FORENSICS
      • Computer Hacking Forensic Investigator (C|HFI)
      NETWORK SECURITY
      • Certified Network Defender (C|ND)
      • ICS/SCADA Cybersecurity
      ENCRYPTION
      • Certified Encryption Specialist (E|CES)
      Pen testing
      • Certified Penetration Testing Professional (C|PENT)
      INCIDENT HANDLING
      • Certified Incident Handler (E|CIH)
      • Certified Threat Intelligence Analyst (C|TIA)
      • Certified SOC Analyst (C|SA)
      CLOUD SECURITY
      • Certified Cloud Security Engineer (C|CSE)
      DevSecOps
      • Certified DevSecOps Engineer (E|CDE)
      CYBER TECHNICIAN
      • Certified Cybersecurity Technician (C|CT)
      BLOCKCHAIN
      • Blockchain Developer Certification (B|DC)
      • Blockchain Fintech Certification (B|FC)
      • Blockchain Business Leader Certification (B|BLC)
      BUSINESS CONTINUITY AND DISASTER RECOVERY
      • Disaster Recovery Professional (E|DRP)
      FUNDAMENTALS
      • Certified Secure Computer User (C|SCU)
      • EC-Council Certified Security Specialist (E|CSS)
      ESSENTIALS SERIES
      • Network Defense Essentials (N|DE)
      • Ethical Hacking Essentials (E|HE)
      • Digital Forensics Essentials (D|FE)

      APPLICATION SECURITY

      Certified Application Security Engineer (C|ASE .NET)
      Certified Application Security Engineer (C|ASE Java)
      Web Application Hacking and Security (W|AHS)

      Micro Learning

      Python Programming for Beginners
      Learn Python Online: From Novice to Pro
      Microdegree in Python Security
      Microdegree in PHP Security
      Identity and Access Management
      Linux Fundamentals
      Linux-Server Administration
      Cybersecurity for Blockchain from Ground Up
      Cybersecurity for Business
      Email Phishing
EC-Council_Cybersecurity-Exchange-tab
LAPS-WP-Mobile.jpg
LAPS-WP-Mobile.jpg

LAPS Implementation Guide: Securing Local Administrator User Accounts and Improving Password Security.

  • April 17, 2023
  • Tas Jalali
  • Data Security

EC-Council’s whitepaper on LAPS Implementation Guide: Securing Local Administrator User Accounts and Improving Password Security, authored by Tas Jalali, Head of Cybersecurity, AC Transit, is a comprehensive guide on implementing Microsoft’s Local Administrator Password Solution (LAPS) to improve the security of local administrator accounts. The whitepaper provides insights into the challenges of managing local administrator accounts, the benefits of using LAPS, and a step-by-step guide on implementing LAPS in an organization.

One of the key challenges highlighted in the whitepaper is managing local administrator accounts. These accounts often have weak and shared passwords, which attackers can easily compromise. Additionally, these accounts often need to be properly managed or monitored, which can lead to security breaches. The whitepaper emphasizes the importance of implementing strong password policies for local administrator accounts and monitoring their use to prevent unauthorized access.

The whitepaper introduces LAPS as a solution to these challenges. LAPS is a free tool from Microsoft that allows organizations to manage the passwords of local administrator accounts. With LAPS, each local administrator account is assigned a unique, randomly generated password stored securely in Active Directory. This ensures that each account has a strong, unique password that is changed regularly and that the passwords are not shared or easily discoverable.

The whitepaper provides a step-by-step guide on implementing LAPS in an organization. The guide covers the prerequisites for implementing LAPS, such as setting up Active Directory and configuring Group Policy settings. It also provides detailed instructions on how to install and configure LAPS on individual computers and how to manage the passwords of local administrator accounts using LAPS. Overall, the whitepaper provides valuable insights into the importance of securing local administrator accounts and the benefits of using LAPS. The step-by-step guide makes it easy for organizations to implement LAPS and improve their password security.

In conclusion, EC-Council’s LAPS Implementation Guide whitepaper is a must-read for organizations that want to improve the security of their local administrator accounts. By following the step-by-step guide, organizations can easily implement LAPS and ensure that their local administrator accounts have strong, unique passwords that are regularly changed and not easily discoverable. To learn more, download the whitepaper by submitting the details in the form below.

Submit the Form Below to Download this Whitepaper

"*" indicates required fields

Country*
I agree to the privacy policy.*
Please confirm by checking the box below that you consent to EC-Council contacting you regarding the product interest you have indicated above. Your information will not be shared with any third party. Please see our full privacy policy here.

Tags

  • Account Security, Authentication Security, cybersecurity, Cybersecurity Solutions, Cybersecurity Strategies, Cybersecurity Whitepaper, IT Risk Management, IT security, LAPS, Local Administrator Password Solution, Network Security, Password Management, Password Policy, Password Protection, Password Security, Security Best Practices
Tas Jalali

Tas Jalali

All posts by this author

About the Author

Tas Jalali - Author

Tas Jalali

Head of Cybersecurity, AC Transit

Tas is an accomplished cybersecurity leader with 17+ years of experience in startups and Fortune 500 companies. He specializes in risk-based Information Security programs, Compliance, and Privacy, aligning security with business strategies. Tas has led security teams, developed secure products, managed technology risk, and achieved regulatory compliance. He has consulted for Fortune 500 companies, improving their security strategies and risk management. Tas is the head of cybersecurity at AC Transit and holds a BS in Engineering and a Master’s (ALM) from Harvard University.
Share this Article
Facebook
Twitter
LinkedIn
WhatsApp
Pinterest
Tas Jalali

Tas Jalali

All posts by this author
You may also like
Operational Technology (OT) and Information Technology (IT) Understanding the Differences and Cyber Security Best Practices
September 27, 2023
Phishing Outlook 2023: Statistics, Real-Life Incidents, and Best Practices
August 17, 2023
Securing the Future of Finance: Top Cybersecurity Best Practices for Financial Institutions
August 3, 2023
Recent Whitepapers
Operational Technology (OT) and Information Technology (IT) Understanding…
September 27, 2023
Phishing Outlook 2023: Statistics, Real-Life Incidents, and Best…
August 17, 2023
Securing the Future of Finance: Top Cybersecurity Best…
August 3, 2023
The Importance of IoT Security: Understanding and Addressing…
July 20, 2023
Linkedin-in Twitter Facebook-f Youtube

© 2022 EC-Council

Get Training
Partner With Us
Terms Of Use
Privacy Policy
Report Issue
Publishing Guidelines
Sitemap

© 2022 EC-Council

Get training
Partner With Us
Terms Of Use
Privacy Policy
Report Issue
Publishing Guidelines
Sitemap
Go to Top
  • Articles
  • Whitepapers
  • Cyber Talks
  • Success Stories
  • Train & Certify
YES, I WANT TO APPLY!