Local Administrator Password Management Detailed Technical Specification
Local Administrator Password Management Detailed Technical Specification
Management
Detailed Technical Specification
Published: April 2015
Authors:
Tom Ausburne, Microsoft
Jiri Formacek, Microsoft
Table of Contents
1 Installation.......................................................................1
1.1
Management Computers.........................................................................2
1.2
Managed Clients...................................................................................... 4
2 AD Preparation.................................................................5
2.1
2.2
Permissions............................................................................................. 6
2.2.1
2.2.2
2.2.3
3 Group Policy.....................................................................9
3.1
3.2
Password parameters.............................................................................. 9
3.2.1
3.3
4 Managing Clients.............................................................11
4.1
4.2
5 Troubleshooting..............................................................16
5.1
Client Logging........................................................................................... 16
5.1.2
Event IDs................................................................................................... 16
5.2
Problem Scenarios................................................................................. 19
5.3
Auditing................................................................................................. 20
1 Installation
There are two parts to the installation, the management computers and the
clients you want to manage.
The installation of binaries and related files is handled by the MSI package. This
will install the following:
-
The default is to install the CSE only. The management tools are installed on
demand.
File Reference
The installation for the Fat client UI is done to folder:
%ProgramFiles%\LAPS
AdmPwd.UI.exe
AdmPwd.Utils.config
AdmPwd.Utils.dll
The installation for the PowerShell modules is done to folder:
%WINDIR
%\System32\WindowsPowerShell\v1.0\Modules\AdmPwd.PS
AdmPwd.PS.dll
AdmPwd.PS.format.ps1xml
AdmPwd.PS.psd1
AdmPwd.Utils.config
AdmPwd.Utils.dll
%WINDIR
%\System32\WindowsPowerShell\v1.0\Modules\AdmPwd.PS\en-us
AdmPwd.PS.dll-Help.xml
The installation for the CSE is done to folder:
%ProgramFiles%\LAPS\CSE
AdmPwd.dll
The installation for the Group Policy files is done to folders:
%WINDIR%\PolicyDefinitions
AdmPwd.admx
%WINDIR%\PolicyDefinitions\en-US
AdmPwd.adml
Click Next.
Click Install.
Click Finish.
Note: If you install by just registering the dll it will not show up in Program and
Features as shown below.
2 AD Preparation
2.1 Modifying the Schema
The Active Directory Schema needs to be extended by two new attributes that
store the password of the built-in Administrator account for each computer and
the timestamp of password expiration. Both attributes are added to the maycontain attribute set of the computer class.
ms-MCS-AdmPwd Stores the password in clear text
ms-MCS-AdmPwdExpirationTime Stores the time to reset the password
To update the Schema you first need to import the PowerShell module. Open up
an Administrative PowerShell window and use this command:
Import-module AdmPwd.PS
Note: If you have an RODC installed in the environment and you need to
replicate the value of the attribute ms-MCS-AdmPwd to the RODC, you will need to
change the 10th bit of the searchFlags attribute value for ms-MCS-AdmPwd schema
objet to 0 (substract 512 from the current value of the searchFlags attribute).
For more information on Adding Attributes to the RODC Filtered Attribute Set,
please refer to http://technet.microsoft.com/enus/library/cc754794(v=WS.10).aspx.
2.2 Permissions
The Active Directory infrastructure offers advanced tools for implementation of
the security model for this solution by allowing for per-attribute Access Lists
(ACLs) and implementing confidential attributes for password storage. There are
four sets of rights that need to be modified.
Important:
Repeat this procedure for any additional OUs that contain computer accounts
that are in scope of the solution and are not subcontainers of already processed
containers.
Note: You can use multiple groups and users in the same command separated by
comma.
Example:
Set-AdmPwdReadPasswordPermission -OrgUnit Servers -AllowedPrincipals
contoso\Administrator,contoso\HelpDesk,contoso\PwdAdmins
Note: You can use multiple groups and users in the same command separated by
comma.
Example:
3 Group Policy
3.1 Changing the Group Policy Settings
The settings are located in under Computer Configuration\Administrative
Templates\LAPS.
You can change the individual password settings to fits your needs.
Note: DO NOT configure when you use the built-in admin account, even if you
renamed it. That account is auto-detected by well-known SID. DO configure when
you use a custom local admin account.
4 Managing Clients
4.1 Viewing password settings
Once everything is configured, and Group Policy has refreshed on the clients, you
can look at the properties of the computer object and see the new settings.
The password is stored in plain text. The Expiration date is stored as the number
of 100-nanosecond intervals that have elapsed since the 0 hour on January 1,
1601 untill the date/time that is being stored. The time is always stored in
Greenwich Mean Time (GMT) in the Active Directory. If you want to manually
convert it use this command:
w32tm /ntte <number you want to convert>
There is also a graphical interface available. When you install the program on a
computer where you want the ability to easily retrieve the password just select
the Fat client UI option.
Or this on Windows 7.
Launch the interface, enter the client name and click Search.
What happens if a user who hasnt been granted rights to see the local
Administrators password tries to access it? If they were to gain access to the
GUI interface the password wont be displayed.
If they have installed the RSAT tools and run Active Directory Users and
Computers (ADUC) to view the password it will show as <not set>.
This information is not seen because the extended rights were removed and only
certain individuals and groups were granted the rights to see this.
5 Troubleshooting
This solution generates a variety of logging options for troubleshooting purposes.
Meaning
Severi
ty
Description
Comment
Error
I
D
Severi
ty
Description
Comment
%1 is a placeholder for error code returned
by function that retrieves local computer
name, converts it to DN and connects to
object, specified by the DN
Error
Error
Error
Informat
ion
Error
Error
1
0
Warnin
g
1
1
Informat
ion
It is not necessary to
change password yet.
Days to change: %1.
Local Administrator's
password has been
1
2
Informa
tion
I
D
Severi
ty
Description
Comment
changed.
account
1
3
Informat
ion
Local Administrator's
password has been
reported to AD.
1
4
Informa
tion
Finished successfully
1
5
Informat
ion
Beginning processing
1
6
Informa
tion
Admin account
management not
enabled, exiting
Note: Generally, all events with severity Error are blocking. When any error
occurs, no other tasks are performed and CSE terminates processing.
Symptom: Users that havent been specifically granted permissions can still see
the password.
Solution: This is usually due to not removing the All Extended rights
permission from groups and users. Check the effective rights on the computer in
question.
5.3 Auditing
Auditing users who successfully query and read the local administrator password
for a computer can be accomplished by using a PowerShell cmdlet. You may
need to run Import-module AdmPwd.PS if this is a new window.
Set-AdmPwdAuditing OrgUnit: <name of OU on which you want to setup
the auditing> -AuditedPrincipals: :<identification of users/groups whose
access to password shall be audited>
When a password is successfully read, a 4662 event is logged in the Security log
of the Domain Controller.
You will notice that the schemaIDGUID is reflected in the Event properties.