When you talk to executives about privileged access, they hear “passwords” and “admin rights.” What they don’t hear is that the default Windows admin model gives every local administrator a static, reusable password that lives forever on the machine.
Why LAPS Matters
LAPS (Local Administrator Password Solution) solves the "same password on every workstation" problem by randomizing each machine’s local admin password and storing it in AD. The secret sauce is that the password rotates automatically every 30 days (by default) and is only readable by a tightly scoped security group.
In practice, LAPS eliminates the "admin password spreadsheet" and forces you to treat each local admin account as a one‑time secret.
PAW – The Workstation You Actually Trust
A Privileged Access Workstation (PAW) is a hardened, air‑gapped machine that you use exclusively for admin tasks. The idea is simple: separate the high‑risk browsing environment from the low‑risk admin environment.
- Locked down OS image (no browsers, no Office)
- Only domain‑joined, with BitLocker and Credential Guard enabled
- RDP/SSH only to domain controllers, not to user workstations
- All admin tools (RSAT, PowerShell, Sysinternals) pre‑installed
Deploying PAWs reduces the attack surface dramatically. If a user clicks a malicious link on their regular laptop, the attacker never reaches the PAW because there is no network path to it.
Just‑In‑Time (JIT) Elevation
Even with LAPS and PAWs, you still need to grant privileged rights occasionally. JIT gives you a temporary token that expires after a short window (usually 1‑4 hours). Azure AD Privileged Identity Management (PIM) is the most common implementation, but you can roll your own with a simple script and AD group membership.
Key points for a secure JIT implementation:
- Require MFA for the request
- Log every grant/revoke event (Event ID 4728/4732)
- Set a short maximum duration (1‑4 hours)
- Notify the security team on each grant
Putting It All Together – A Practical Blueprint
Below is a checklist you can copy‑paste into your runbook:
Final Thought
LAPS, PAWs, and JIT are not silver bullets. They each solve a piece of the privileged‑access puzzle. Used together, they create a layered defense that forces an attacker to break three independent controls before gaining lasting domain admin.
Implement them, enforce the process, and you’ll see a dramatic drop in "admin password reuse" findings during audits.