Yes; admins should not be rotating their passwords either. As an administrator my passwords are completely randomized and stored encrypted. For me to change my password only adds "secret" rotation. However, me changing my password to yet another random password doesn't add any security in whether or not the password can be cracked or not. I would actually argue that if your current random password is not in a dictionary somewhere and then a new random password you pick you're rolling the dice that the password is also not in a dictionary somewhere and also harder to crack; so each time you change the password when there is no reason to you are rolling the dice that the password may be harder to crack.
NIST SP 800-63B agrees with me believe it or not:
Verifiers SHOULD NOT impose other composition rules (e.g., requiring mixtures of different character types or prohibiting consecutively repeated characters) for memorized secrets. Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.
Basically, with the assumption that your password policy is sufficiently complex, you should only have users change their password if they feel like it (personal preference) or force them to if you suspect their account may have been compromised.
Another valid reason to not change your password regularly when its un-needed is that normal users will almost always use a simple variation of the previous password. For example, if their password was mTpaGFrsYht12
they make it 1mTpaGFrsYht12
; if their account was compromised then any password cracking tool like john
would discover that new "rotated" password. Not to mention, if someone has compromised the network and is collecting hashes, each new password change is a hash and therefore a new password that the attacker can store in their database and attempt to crack offline.
The problem with passwords in security authorization is weak passwords, not strong passwords with weak secret rotation.