📖 ~1 min read
Table of contents
Symptom & Impact
Local Administrator Password Solution (LAPS) fails to rotate the local admin password on Windows Server 2019 members, leaving stale or default credentials in use.
Environment & Reproduction
Common after agent install on hosts that lack proper AD schema rights or GPO targeting.
Get-AdmPwdPassword -ComputerName SRV01
Get-WinEvent -LogName 'Microsoft-Windows-LAPS/Operational' -MaxEvents 20
Root Cause Analysis
Causes include missing AD permissions on computer objects, agent not installed, or GPO not applied to the right OU.
Quick Triage
Check LAPS client and AD attribute health.
Get-WindowsFeature -Name AdmPwd*
Get-AdmPwdPassword -ComputerName SRV01
Get-ADComputer SRV01 -Properties ms-Mcs-AdmPwd,ms-Mcs-AdmPwdExpirationTime
Step-by-Step Diagnosis
Validate GPO scope and SELF permissions on computer objects.
gpresult /h C:Tempgp.html /f
Find-AdmPwdExtendedRights -Identity 'OU=Servers,DC=corp,DC=local'
Get-ACL 'AD:CN=SRV01,OU=Servers,DC=corp,DC=local' | Format-List
Solution – Primary Fix
Reinstall agent, grant SELF write rights, and force password reset.
Still having issues? Our IT Consulting team can diagnose and resolve this for you. Get in touch for a free consultation.
Set-AdmPwdComputerSelfPermission -Identity 'OU=Servers,DC=corp,DC=local'
Reset-AdmPwdPassword -ComputerName SRV01
gpupdate /force
Solution – Alternative Approaches
Use Windows LAPS (Microsoft LAPS) modern stack if legacy LAPS agent is end-of-life.
Update-LapsADSchema
Set-LapsADComputerSelfPermission -Identity 'OU=Servers,DC=corp,DC=local'
Invoke-LapsPolicyProcessing
Verification & Acceptance Criteria
Password attribute updates and the rotation timestamp moves forward.
Get-ADComputer SRV01 -Properties ms-Mcs-AdmPwdExpirationTime
Get-AdmPwdPassword -ComputerName SRV01
Rollback Plan
Reapply prior agent or schema settings if rollout disrupts other tooling.
Uninstall-WindowsFeature AdmPwd.PS
Reset-AdmPwdPassword -ComputerName SRV01
Prevention & Hardening
Standardise on Windows LAPS, audit OUs, and alert on stale expiration timestamps.
Get-ADComputer -Filter * -SearchBase 'OU=Servers,DC=corp,DC=local' -Properties ms-Mcs-AdmPwdExpirationTime | Where {$_.'ms-Mcs-AdmPwdExpirationTime' -lt (Get-Date).AddDays(-30)}
Related Errors & Cross-Refs
Linked with GPO denied issues, password policy enforcement, and JIT admin workflows.
Related tutorial: View the step-by-step tutorial for Windows Server 2019.
View all Windows Server 2019 tutorials on the Tutorials Hub →
Browse all common problems & solutions on the Tutorials Hub.
References & Further Reading
Microsoft Learn: Windows LAPS migration and Microsoft LAPS legacy product guidance.


Need Expert Help?
If you cannot resolve this yourself, our team offers hands-on Server Management, Managed IT Services, and flexible Support Plans. Contact us today — we respond within one business day.