Menu
Modern Workplace Blog
  • Home
  • About: Kenneth van Surksum
  • Cookie Policy
Modern Workplace Blog
February 11, 2020February 23, 2021

Challenges while managing administrative privileges on your Azure AD joined Windows 10 devices

By default, on Windows 10 devices which are Azure AD joined, the user performing the join is added to the Local Administrator group. Besides the user and the local administrator (which is disabled by default), two other SIDs are added without any friendly name which explain who they are. So where are those SIDs coming from?

It is possible to make the user a normal user while enrolling the device, but then you have to create a Deployment Profile and use Windows Autopilot. See: Configure Autopilot profiles or use Bulk enrollment. See: Bulk enrollment for Windows devices

Note: This post reflects the status of Azure AD local administrative privileges as of February 11th 2020. Functionality may change, even right after this post has been published.

When searching through the documentation (How to manage the local administrators group on Azure AD joined devices) you will read that these 2 SIDs represent the Azure AD Global Administrator and the Device Administrator roles.

Local Administrator Group

So basically this is really handy, you can add a user in the Azure AD role and therefore the user becomes a local administrator on the Azure AD joined devices. These a global settings, meaning that if you receive the device administrator role, you will be a local administrator on all Azure AD joined devices for your tenant.

When searching for the Device Administrator role under “Roles and Administrators” in the Azure AD portal you will notice that the Device Administrator role isn’t available.

Roles and administrators

Adding device administrators is done in a different way, you’ll need to go to “Devices -> Device Settings” where you will find the option “Additional local administrators on Azure AD joined devices”. When you add a member to this option, it will receive the Device Administrators role.

Additional local administrators on Azure AD joined devices

Note that being able to add local administrators on the Azure AD joined devices is a Azure AD premium feature.

The Device Administrator role is available within Azure AD Privileged Identity Management (PIM), so when using PIM you can assign the role from there as well and make users either permanent members or eligible.

Azure AD privileged identity management (PIM)

Challenges

Based on what is possible out of the box, from a security perspective this poses some challenges. For example, do you really want to login to another device using “Global Administrator” rights, you never know what software is running on the system (keyloggers or any other tool which can harvest credentials). If your Global Administrator account is compromised this can be considered a major security issue. Same goes for permanent Device Administrators, if their account is compromised you can basically access every Azure AD joined machine using those credentials.

There are also some challenges with the Device Administrator group, mainly because when you add a user to this role (either via the Azure AD settings or by activating the role using PIM) the change is not effective immediately on the Windows 10 client. The reason for this has to do with the PRT, which stands for Primary Refresh Token.

From the documentation:

A Primary Refresh Token (PRT) is a key artifact of Azure AD authentication on Windows 10, iOS, and Android devices. It is a JSON Web Token (JWT) specially issued to Microsoft first party token brokers to enable single sign-on (SSO) across the applications used on those devices. The CloudAP plugin renews the PRT every 4 hours during Windows sign in.

Basically this means that after a user is added to the Device admins group it can take up to 4 hours for this to be active, and vice versa (when user is removed from Device admins it stays local admin for up to 4 hours).

So what are the other options you have,

Make Me Admin

Make Me Admin is a simple, open-source application for Windows that allows standard user accounts to be elevated to administrator-level, on a temporary basis.

You could configure Make Me Admin in such a way that you either allow end-users to temporarily give them local administrator rights while you help remotely. Or start Make Me Admin with Runas for your own account and specify that account as eligible for elevation using one of the many settings (not tested)

Thanks Erik Loef for making me aware of this solution.

Serverless LAPS

This solution, created by John Seerden provides a way to maintain passwords for locally created accounts. You could for example create a local account, and have the password managed by Serverless LAPS. The main point here is not to create a local account, with a common password on all of your Azure AD Joined machines. If that account gets compromised then the attacker has access to all of your Azure AD machines. (the whole reason why Microsoft created the Local Administrator Password Solution in the first place). See: Create a local user account via Windows 10 MDM by Peter van der Woude

Use another management agents besides Intune.

There are some other Management Agents which provide solutions which can temporarily create local accounts with administrative credentials. Once the necessary work by the workplace administrator on the machine is done the management tooling removes the created account.

Script to manage the built-in administrators group, on an Azure AD Joined Windows 10 device, using an AAD Security Group created by Michael Mardahl

Michael Mardahl pointed me to a solution he build to manage the administrators group using an Azure AD Security Group and some PowerShell magic. Worthwhile to check this one out.

Oliver Kieselbach pointed me to two interesting solutions mentioned below

Intune Local Administrator Password Solution (iLAPS) by Alex Ø. T. Hansen

Another solution to manage the Local Administrator password in a similar way

LAPS for Azure AD and Hybrid Joined by Synergix

Synergix provides a free community edition called Secrets Vault, they also have an Enterprise paid edition available providing way more functionality.

Centero Carillon for Access Right Management.

Centero has a nice solution for local admin rights available. When a user needs admin rights he/she can simply request them giving a justification. This process even works if the user is not online. Central reporting is provided for admins to view the requests.

Conclusion

Microsoft still has a lot of work to do when it comes to visibility into who is local admin on Azure AD joined machines, also extending PIM to also include accounts on Azure AD joined clients would be a welcome addition. Users could then  temporarily request local administrator/power user rights and this would be effective immediately if approved.

If you have found other solutions to these challenges please reach out, I will include your solution in this blogpost with credits 🙂

Tweet
Follow me
Tweet #WPNinjasNL

Continue Reading

← Did you already modify your Azure AD consent defaults settings? Here is why you should
Stopping automatic email forwarding in your Exchange Online environment in a controlled way →

13 thoughts on “Challenges while managing administrative privileges on your Azure AD joined Windows 10 devices”

  1. Oliver Kieselbach says:
    February 11, 2020 at 9:59 pm

    Hi Kenneth,

    as a free solutions I also know this one:
    http://blog.tofte-it.dk/powershell-intune-local-administrator-password-solution-ilaps/

    and for Edu and non profit I know in addition this one:
    https://www.synergix.com/products/secrets-vault/features/laps-for-azure-ad/

    best,
    Oliver

    Reply
  2. JSK says:
    February 25, 2020 at 1:22 am

    Synergix Secrets Vault Community Edition is now FREE FOR ALL !!!

    https://www.synergix.com/products/secrets-vault/editions

    Higher Edition supports ..
    – Multiple Local Account Password Management
    – Rotation of Logon Name with rotation of passwords
    – Windows 7.0 SP1, Windows 8.x, Windows 10
    – Windows Server 2008/R2, 2012/R2, 2016, 2019

    – Azure AD Joined Windows 10
    – On Prem AD Joined Windows 7.0 SP1 to Windows Server 2019
    – Workgroup Computers
    – Azure AD Domain Service Joined computers
    – UNIX
    – MacOS

    Plus
    Audit capabilities
    Security Event Forwarding
    and Hardware + Software Information that help you perform deep analysis when performing an investigation.

    and more coming in future releases ( new release every quarter ! )

    Reply
  3. Pingback: Lessons learned while implementing Azure AD Privileged Identity Management (PIM) | Modern Workplace Blog
  4. Guus van Berge says:
    November 2, 2020 at 11:40 am

    Hi, Kenneth,

    Thanks for great article and inspiration.

    I have no clue of what I am doing wrong but I cant get the Device Administrators role to work. I tried everything and searched everywhere. The users will log in fine but does not have local admin rights. I tried on multitple tenants. Any idea what i am missing here?

    Just for facts:

    – AAD P1
    – Tried with or without license
    – Local groups are in place on the machine
    – GA accounts works fine

    Reply
    1. Kenneth says:
      November 2, 2020 at 11:43 am

      Hi Guus,

      When propagating users into the Device Administrator group, it can take a while for this to become effective. This has to do with the PRT, which refreshes every 4 hours. (so it can take up to 4 hours max)

      Did you take this into account while testing?

      Hope this helps,

      Regards,
      Kenneth

      Reply
      1. Guus says:
        November 2, 2020 at 12:17 pm

        Yes definitely. I have been working on this for a few days already. it is breaking my head lol. Also because I cannot find anybody else on the internet experiencing the same issue.

        The MS article is pretty straight forward: https://docs.microsoft.com/en-us/azure/active-directory/devices/assign-local-admin

        I really don’t see what I miss here. I tried giving the local admin user that i created for this role extra admin rights and a license as well just to see if thats the missing part but no luck still..

        Reply
        1. Kenneth says:
          November 2, 2020 at 1:16 pm

          Guus,

          Strange indeed.

          Are Global Administrators admin on the device? – can you verify if the correct groups are provisioned locally on the device? It should work, since I have tested it several times.. my experience though is that it can take some time for newly added device administrators to become active.

          Please share your findings, and reach out if I can help.

          /Kenneth

          Reply
          1. Guus says:
            November 2, 2020 at 1:38 pm

            Hi kenneth,

            Thanks a lot for your quick reply’s.

            Yes both SIDs (like mentioned in your blog) are in place on the local machine(s) and GA account acts like local admin on the machine when logging in.

            Do you assign licences to your local admin account(s)? I guess you use a dedicated account for this? thats the way I would like it to work so that our support desk staff can use it to troubleshoot remotely without the need of the GA account.

            Also do you assign any other admin roles to the user? Now it only has the Device Administrators role assigned..but tried to include the intune admin role on top to try if that works..

          2. Kenneth says:
            November 6, 2020 at 2:28 pm

            Any updates on this Guus?

  5. Guus says:
    November 9, 2020 at 10:05 am

    Still no luck..I tried giving the user a full M365Business license and additional admin roles to see if my problem is in that area. I will take a last resort action and submit a ticket with MS support today..keep you posted!

    Reply
  6. Rodney says:
    November 24, 2020 at 8:59 pm

    Under the Administrators Properties, make sure that the SID at the bottom is the actual SID for the “Device Administrator” role in your tenancy. In my case, it wasn’t. I had to create a powershell script to change it to the correct SID and things started working as expected.

    Reply
  7. James says:
    April 6, 2022 at 9:04 am

    If it’s the first time you login and you already have Azure Ad device admin role then there are no issues. The challenge is if you have already logged in without Azure Ad device admin, then was added to the role, then you need to wait for 4hr PRT refresh and re-logon.

    Reply
  8. Ben Jongsma says:
    September 7, 2022 at 5:47 am

    Hi, I’m having an issue where some devices (eg “Computer A”) my admin account (member of AADJDLA role) can elevate a process yet on other devices (eg “Computer B”) it can’t “The requested operation requires elevation”. By enabling privileged use auditing I found that on Computer B, after attempting to elevate there is a “Group membership information” ID4627 event and I can clearly see that my admin account is not a member of the AADJLA group/SID/role. I can’t figure out why this is inconsistent and why these devices don’t evaluate this membership.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Founding member of:

Recent Posts

  • MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • Navigating New Authentication Methods: SMS for Password Reset, Not for MFA
  • From SPF to DANE: Securing Microsoft 365 Email Communications
  • Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals

Books

System Center 2012 Service Manager Unleashed
Amazon
System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager
Amazon
System Center Configuration Manager Current Branch Unleashed
Amazon
Mastering Windows 7 Deployment
Amazon
System Center 2012 Configuration Manager (SCCM) Unleashed
Amazon

Archives

  • February 2025
  • January 2025
  • September 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • September 2023
  • August 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • May 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • August 2019
  • July 2019
  • November 2016
  • November 2015
  • June 2015
  • May 2015
  • November 2014
  • July 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • November 2013
  • August 2013
  • April 2013
  • March 2013
  • January 2013
  • December 2012
  • November 2012
  • August 2012
  • July 2012
  • June 2012

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • ABM (4)
  • Advanced Threat Protection (4)
  • Announcement (44)
  • Azure (3)
  • AzureAD (73)
  • Certification (2)
  • Cloud App Security (5)
  • Conditional Access (58)
  • Configuration Manager (24)
  • Entra (2)
  • Entra Id (8)
  • Events (14)
  • Exchange Online (9)
  • Identity Protection (5)
  • Intune (27)
  • Licensing (2)
  • Microsoft Defender (1)
  • Microsoft Defender for Endpoint (1)
  • Microsoft Endpoint Manager (35)
  • Mobile Application Management (4)
  • Modern Workplace (74)
  • Office 365 (10)
  • Overview (11)
  • Power Platform (1)
  • PowerShell (2)
  • Presentations (9)
  • Privileged Identity Management (5)
  • Role Based Access Control (2)
  • Security (63)
  • Service Manager (4)
  • Speaking (30)
  • Troubleshooting (4)
  • Uncategorized (11)
  • Windows 10 (15)
  • Windows 11 (5)
  • Windows Update for Business (4)
  • WMUG.nl (16)
  • WPNinjasNL (32)

Tags

#ABM #AzureAD #community #conditionalaccess #ConfigMgr #IAM #Intune #m365 #MEM #MEMCM #microsoft365 #modernworkplace #office365 #security #webinar #wmug_nl ATP authentication strength AzureAD Branding Community Conditional Access ConfigMgr ConfigMgr 2012 Email EXO Identity Intune Licensing M365 MCAS MFA Modern Workplace Office 365 OSD PIM Policy Sets Presentation RBAC roles Security System Center Task Sequence troubleshooting webinar

Recent Comments

  • brc on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • [m365weekly] #186 – M365 Weekly Newsletter on MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Dean Gross on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • nikhil tech on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • Kenneth on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)

This information is provided “AS IS” with no warranties, confers no rights and is not supported by the author.

Copyright © 2021 by Kenneth van Surksum. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

Shorthand: Don’t pass off my work as yours, it’s not nice.

©2025 Modern Workplace Blog | Powered by WordPress and Superb Themes!
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT