Fact-checked by Grok 2 weeks ago

Local Security Authority Subsystem Service

The Local Security Authority Subsystem Service (LSASS) is a critical user-mode in Microsoft Windows operating systems that implements the Local Security Authority (LSA), handling user , password changes, and the enforcement of security policies for local and remote logons. As the central component for validating access to system objects, checking user rights, and generating security audit messages, LSASS stores credentials in memory for active user sessions and creates access tokens to authorize resource usage. LSASS plays a foundational role in Windows security architecture, integrating with components like the Security Support Provider Interface (SSPI) to facilitate secure communication and protocols such as and . On domain controllers, it manages authentication, contributing significantly to CPU and memory resources during high-load scenarios like logon storms. Due to its storage of sensitive credential data, LSASS is a frequent target for credential dumping attacks by malware and threat actors seeking to extract hashes or passwords for or lateral movement. To mitigate risks, recommends enabling protection features, such as running LSASS as a protected process to block unauthorized , and using Reduction rules to restrict credential access. These safeguards enhance resilience against common exploitation techniques while maintaining compatibility with legitimate authentication workflows.

Overview

Description

The Local Security Authority Subsystem Service (LSASS) is a user-mode in Microsoft Windows operating systems, executed via the lsass.exe binary located in the %windir%\System32 directory. This operates as a protected system component, typically hosted in Session 0, and is essential for maintaining the integrity of local security operations. Its primary purpose is to enforce local policies on Windows systems, including validation of user access and management of security-related tasks. LSASS runs continuously as a critical system service, automatically started during the boot sequence by the to ensure immediate availability for security functions. Key identifiers for the legitimate LSASS process include its variable process ID (), which changes across system reboots, a digital signature from Corporation verifying its authenticity, and its deep integration with the broader Windows security subsystem as the core implementation of the Local Security Authority () framework.

Role in Windows Security

The Local Security Authority Subsystem Service (LSASS) serves as a critical user-mode process within the Windows security architecture, acting as the central hub for local authentication decisions by validating user credentials against the local Security Accounts Manager (SAM) database or, in domain-joined scenarios, by interfacing with domain controllers. It generates access tokens that establish the security context for user sessions, enabling controlled resource access based on enforced policies. Additionally, LSASS handles security event logging by writing audit events to the Windows Security Log, ensuring that authentication attempts, policy violations, and other security-relevant activities are recorded for auditing and compliance purposes. LSASS integrates deeply with core Windows components to facilitate secure operations, interacting with the through Native API calls (such as those in NTDLL.dll) to perform low-level functions like credential validation and policy enforcement. It employs Local Procedure Calls (LPC), an efficient mechanism, to exchange messages with other system processes, including Winlogon for logon handling and the (CSRSS) for session management. Furthermore, LSASS communicates with services like Netlogon to support domain authentication workflows, loading Netlogon.dll to process remote logon requests and synchronize policies across networked environments. Due to its pivotal role, LSASS is designated as a protected process in modern Windows versions ( and later), which restricts unauthorized termination or injection attempts to safeguard system integrity. If LSASS is unexpectedly terminated or crashes, the operating system detects the failure as a critical error, resulting in a system shutdown and restart to prevent further compromise and ensure security boundaries are maintained. This dependency underscores LSASS's foundational status, as its absence halts all and activities. While LSASS primarily focuses on local machine security—managing standalone or workgroup s—its scope extends to interactions through dedicated services like Netlogon, which handle establishment and credential referral to controllers without LSASS directly storing secrets. This design isolates local operations from broader network dependencies, allowing LSASS to enforce machine-specific policies while deferring enterprise-scale to distributed components.

History

Introduction in Windows NT

The Local Security Authority Subsystem Service (LSASS) debuted in , released on July 27, 1993, as a core component of the operating system's security architecture. It was introduced to implement a robust, multi-user security model that addressed the limitations of earlier Windows versions like Windows 3.x, which lacked comprehensive and controls suitable for environments. LSASS operates as a user-mode protected subsystem, authenticating users and enforcing local security policies during system startup and logon processes. The initial design goals of LSASS centered on providing reliable local authentication and policy enforcement tailored for enterprise-grade operations, including verification of user logons and management of passwords within a secure framework. Developed to meet U.S. government C2 security certification standards, it emphasized , auditing capabilities, and protection of system resources to prevent unauthorized access and ensure system integrity in multi-user scenarios. This design supported the transition to a client-server model, enabling secure interactions across networked workstations and servers. Key early features of LSASS included the creation of access tokens to represent user security contexts, basic credential validation against the Security Accounts Manager (SAM) database, and integration with the NTLM authentication protocol for logon verification. Access tokens encapsulated user identifiers, group memberships, privileges, and access control lists, which the kernel's Security Reference Monitor used to authorize resource access. In the broader context of architecture, LSASS was built upon the Local Security Authority () framework to facilitate secure multi-user operations, integrating with the object manager and services for policy enforcement and protected subsystem interactions. This foundation allowed 3.1 to support concurrent user sessions and networked authentication, distinguishing it from single-user predecessors.

Evolution Across Versions

With the release of in 2000, the Local Security Authority Subsystem Service (LSASS) received enhancements for deeper integration with , enabling seamless domain-based authentication and policy enforcement. support was improved as the default protocol for environments, replacing older methods for more secure ticket-based authentication across networks. These changes also boosted scalability in server setups by optimizing LSASS's handling of multi-user domain queries and replication tasks. In (2001) and (2007), LSASS adapted to interact with emerging security features like (UAC) in , which prompted elevations for administrative tasks while LSASS validated credentials under restricted tokens. Initial hardening against process injection occurred through 's mandatory integrity levels, which restricted unauthorized DLL loading into LSASS and elevated the difficulty of memory manipulation attacks. Windows 7 (2009) and 8 (2012) introduced plugins to enhance extensibility, allowing third-party modules to hook into LSASS for custom authentication and policy extensions without core modifications. Improvements in for credential storage followed, with better isolation of sensitive data like hashes in LSASS to mitigate dumping risks during active sessions. Starting with Windows 10 (2015) and continuing in Windows 11 (2021), LSASS integrated with virtualization-based security (VBS) to isolate authentication secrets in a secure enclave, preventing even kernel-level access by malware. Credential Guard became a configurable option for mandatory enablement in enterprise editions, using VBS to offload LSASS credential handling to a hypervisor-protected container. lsass.exe can be configured to run as a Protected Process Light (PPL) starting from Windows 8.1, becoming the default in Windows 11 when Secure Boot is enabled, blocking unsigned code injection and memory reads to fortify against credential theft. As of 2025, recent updates have focused on patches for memory isolation issues, including fixes for LSASS leaks in domain controllers caused by prior security updates, ensuring stable handling of authentication data. Auditing enhancements, such as expanded System Access Control List (SACL) logging for LSASS access attempts, have been refined to better detect tactics like credential dumping in response to observed attacks.

Architecture

Components

The Local Security Authority Subsystem Service (LSASS) is implemented primarily through the core executable lsass.exe, which serves as the main responsible for hosting the server and related dynamic-link libraries (DLLs) that handle security operations on Windows systems. This runs as a protected system , loading essential modules to manage and security policies without direct user interaction. Key DLLs form the foundational modules within LSASS. The lsasrv.dll acts as the LSA server service, enforcing local policies and coordinating interactions with mechanisms. Complementing this, secur32.dll provides the Security Support Provider Interface (SSPI), enabling multiple providers to support various protocols in a unified manner. Additionally, samlib.dll facilitates access to the Security Accounts Manager () database, handling local account storage and policy enforcement through dedicated . LSASS incorporates plugins and extensions for flexibility in authentication handling. LSA authentication packages, such as MSV1_0 for NTLM-based logons and dedicated Kerberos packages for ticket-based authentication, allow modular validation of user credentials. Similarly, Security Support Providers (SSPs) extend the system by implementing specific protocols, with defaults including Negotiate for protocol selection, for secure communications, for legacy compatibility, Schannel for TLS/SSL, and Digest for HTTP authentication. These packages and providers register dynamically to integrate without altering the core LSASS codebase. Supporting structures within LSASS maintain critical security data. The LSA policy database, stored in the registry under HKEY_LOCAL_MACHINE\SECURITY, holds local security policies, a copy of the SAM database, and information to guide access decisions. Secret objects provide secure storage for sensitive credentials, such as encrypted passwords for Domain Services (AD DS) accounts, accessible only to the and protected on disk. Trust information structures manage domain relationships, including one-way or two-way trusts and transitive policies, to validate cross-domain authentication requests. The design of LSASS emphasizes modularity, enabling third-party extensibility through registered packages and credential providers that can be added without modifying the core components, thus supporting custom solutions like integration or biometric .

Process Model

The Local Security Authority Subsystem Service (LSASS) is launched during the Windows boot process by wininit.exe, which starts services.exe—the (SCM)—to initialize critical system services, including LSASS as a user-mode process running in Session 0. LSASS executes under the SYSTEM account with high integrity level and protected process status, ensuring elevated privileges and isolation from unauthorized access or . LSASS facilitates primarily through Local Procedure Call (LPC) ports, enabling secure interactions with winlogon.exe for user authentication and with other services for enforcement. In terms of , LSASS maintains in-memory storage of credentials, such as NT hashes and Kerberos tickets, for active user sessions to support seamless authentication across the system. As a , LSASS termination—whether forced or due to failure—triggers an automatic system shutdown to prevent instability, enforced by the Windows kernel. Under normal operating conditions, LSASS exhibits low CPU and memory usage, typically 100-300 MB of , with temporary spikes occurring during high-volume events.

Functions

Authentication and Authorization

The Local Security Authority Subsystem Service (LSASS), as the host process for the Local Security Authority (LSA), plays a central role in the Windows authentication process by validating user credentials during logon attempts. When a user initiates a logon, the Winlogon service collects the credentials and passes them to LSASS, where the LSA invokes appropriate authentication packages to verify the information. For local accounts, validation occurs against the Security Accounts Manager (SAM) database using the MSV1_0 package, which handles NTLM protocol challenges and responses to confirm the hashed password matches the stored value. In domain environments, LSASS communicates with Active Directory domain controllers, preferring the Kerberos protocol for ticket-based authentication when available; if Kerberos fails or is unavailable, it falls back to NTLM via the Negotiate security support provider, which selects the most suitable protocol based on network conditions and policy. Upon successful credential validation, LSASS generates s to represent the user's security context for subsequent operations. The primary access token is created for the initial logon session, containing the user's (), group SIDs, assigned s (such as SeBackupPrivilege for authorized users), and an integrity level that categorizes the session (e.g., Low, Medium, or High) to enforce (MAC). Impersonation tokens are derived from the primary token for scenarios like service impersonation, allowing threads to temporarily adopt the client's security context while restricting privileges to prevent elevation. These tokens are built by the using data from the authentication package, ensuring that only verified identities receive the appropriate security attributes. Authentication packages return the necessary and privilege information to LSASS, which then constructs the token object for use by the and user-mode applications. LSASS facilitates authorization by leveraging these access tokens to enforce both (DAC) and across the system. For DAC, the token's are compared against an object's discretionary access control list (DACL) by the during access checks, granting or denying permissions based on owner-defined rules (e.g., read access for a specific group). is implemented through Mandatory Control (MIC), where the token's integrity level is evaluated against the object's integrity label; for instance, a Low integrity process cannot write to Medium integrity files, preventing low-privilege code from tampering with higher-trust data. LSASS audits these checks via event logging when policy enables it, recording successes or failures for security monitoring. In managing passwords, LSASS processes change requests, expirations, and enforcement of complexity requirements as defined by local security policies. During a password change, the LSA notifies registered password filters—pluggable DLLs that can validate or modify the new password—before updating the SAM or entry; for example, filters enforce rules like minimum length or character variety to prevent weak passwords. If the password has expired according to (e.g., after 90 days), LSASS prompts for a change during logon and rejects until resolved. This ensures compliance with organizational standards without exposing credentials. LSASS supports through its pluggable authentication package architecture, allowing integration of additional verification factors beyond passwords. Custom or third-party authentication packages can be loaded via registry configuration to handle factors like , , or one-time passcodes, interfacing with the to combine them with primary credentials during logon. For instance, the authentication package requires both a and PIN validation, treating the combination as a single logon attempt processed by LSASS. This extensibility enables seamless support for modern multi-factor scenarios while maintaining the core validation flow.

Credential Management

The Local Security Authority Subsystem Service (LSASS) manages the storage of user credentials in memory for active logon sessions, enabling seamless access to system resources without repeated authentication prompts. For these sessions, LSASS holds various credential types, including reversibly encrypted plaintext passwords, hashes (such as the unsalted MD4-based hash), and tickets like Ticket Granting Tickets (TGTs) and service tickets. These credentials are maintained in the LSASS process memory, directly associated with specific logon sessions initiated after user login, such as local or (RDP) sessions. This in-memory storage supports efficient reuse during the session's lifetime. LSASS also handles LSA secrets, which encompass sensitive data like service account passwords and machine account passwords, stored in a protected under the hive. These secrets are encrypted on disk using system-derived keys and persist across reboots, allowing services and scheduled tasks to authenticate without manual intervention. LSASS retrieves and decrypts these secrets as needed for operations requiring elevated or service-specific privileges, ensuring they remain isolated from standard user access. For retrieval, LSASS supplies stored credentials to applications through the Security Support Provider Interface (SSPI), facilitating network authentication scenarios such as to remote services. Applications invoke SSPI functions like InitializeSecurityContext to request credentials, after which LSASS constructs a security context and without prompting the user again, provided the session remains active. This mechanism underpins protocols like and for distributed environments. LSASS oversees session management by tying credentials to individual logon sessions, clearing them upon logoff or session timeout to minimize exposure. Caching behaviors, including how long credentials persist for offline or domain logons, can be configured via settings like Interactive logon: Number of previous logons to . This ensures credentials are not indefinitely retained in post-session. To protect these in-memory credentials, LSASS integrates with the (DPAPI), which encrypts sensitive data using keys derived from user or system contexts managed within the LSASS process. DPAPI employs symmetric encryption algorithms, such as , to safeguard items like password hashes and tickets against unauthorized access while in memory, with decryption limited to authorized contexts. This integration enhances the overall security of credential handling without altering core storage mechanisms.

Security Policy Enforcement

The Local Security Authority Subsystem Service (LSASS) plays a central role in applying local policies by implementing settings derived from Objects (GPOs), such as lockout thresholds, configurations, and assignments. For instance, LSASS enforces lockout policies by monitoring failed attempts and locking accounts after a specified number of invalid logons, preventing brute-force attacks as defined in the organization's settings. Similarly, it applies policies to determine which events are logged and ensures assignments align with user rights configured in the policy database. LSASS handles auditing functions by generating and writing security events to the Windows Event Log, capturing activities like logons, privilege uses, and policy modifications for monitoring and compliance. These events, such as those for successful or failed logons (Event ID 4624 or 4625), are produced in real-time based on enabled audit policies, enabling administrators to review unauthorized access or configuration changes. The service exclusively possesses write permissions to the Security log, ensuring that only validated security-relevant actions are recorded. In environments with domain integration, LSASS merges GPO settings from with local Security Accounts Manager () policies to provide consistent enforcement across the system. This integration allows domain-level policies, such as centralized audit rules or lockout durations, to override or supplement local configurations without conflicts, maintaining a unified security posture. During processes, LSASS briefly consults these merged policies to validate access rights before proceeding. Privilege management is enforced by LSASS through the creation of access tokens that include user rights like SeDebugPrivilege, assigned or revoked according to policy definitions tied to user accounts and group memberships. For example, administrators may receive SeDebugPrivilege to enable of processes, but LSASS dynamically adjusts these based on policy updates or session contexts to minimize over-privileging. This token-based approach ensures privileges are scoped appropriately for each logon session.

Security Considerations

Vulnerabilities

The Local Authority Subsystem (LSASS) is a frequent target for adversaries due to its role in storing sensitive material in , making it vulnerable to techniques that can enable lateral and in Windows environments. One of the most prevalent attack vectors involves credential dumping, where malicious tools access LSASS process to retrieve plaintext passwords, hashes, tickets, and other authentication artifacts. This often requires obtaining the SeDebugPrivilege, which allows processes to debug and inspect LSASS, enabling tools like to perform scraping or mini-dumps without triggering immediate alerts. For instance, exploits this by invoking Windows APIs such as MiniDumpWriteDump to export LSASS contents, facilitating pass-the-hash or pass-the-ticket attacks. Another significant weakness is process injection, where attackers embed malicious code directly into the lsass.exe process to evade detection while accessing or manipulating credentials. This technique leverages methods like or thread execution hijacking to run unauthorized payloads within LSASS's protected context, bypassing user-mode hooks and allowing stealthy secret . Adversaries commonly use this to maintain or escalate privileges, as injected code inherits LSASS's high-integrity level without spawning new suspicious processes. Historically, LSASS-targeted exploits surged after with the proliferation of open-source tools that simplified memory dumping, contributing to widespread credential theft in cyber campaigns. This pattern persisted in human-operated groups, which routinely targeted LSASS to harvest domain administrator credentials post-initial compromise. Configuration weaknesses exacerbate these risks, particularly when auditing is disabled or policies fail to restrict to LSASS handles. Inadequate enforcement of SeDebugPrivilege—such as granting it to non-essential services or users—allows unauthorized debugging of LSASS, while lax process policies (e.g., not enabling object auditing for handle operations) hinder detection of anomalous interactions. Weak settings that do not limit LSASS DLL loading or further expose systems to injection-based compromises. As of 2025, threats to LSASS have evolved to include advanced evasion tactics against (EDR) tools, such as direct system calls to bypass API monitoring and process hollowing to disguise malicious activity within legitimate LSASS execution flows. These methods, including unmapping legitimate code sections in suspended LSASS instances and replacing them with payloads, enable stealthy credential access even on hardened systems. Such techniques are increasingly observed in state-sponsored and operations aiming to circumvent protections like Credential Guard.

Protection Mechanisms

The Local Security Authority (LSA) Protection feature, introduced in , configures the LSASS to run as a protected , preventing non-protected processes from injecting or reading its to mitigate credential theft risks. This protection is enabled by setting the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\RunAsPPL to 1, which leverages kernel-enforced restrictions to block unauthorized access attempts, such as those aiming to dump credentials from LSASS . Credential Guard, available starting with , employs virtualization-based security (VBS) to isolate sensitive credentials like NTLM password hashes and tickets in a secure enclave separate from the main LSASS process, thereby blocking direct access by even privileged processes. This mechanism uses a to create an isolated environment where the LSA Isolated (LSAIso) process handles authentication operations, ensuring that secrets remain inaccessible to the rest of the operating system unless requested through secure remote procedure calls. Protected Process Light (PPL) enhances LSASS security by default in Windows 11 installations, particularly for enterprise-joined devices, where the kernel enforces restrictions against debugging, code injection, and memory reading by lower-integrity processes. Unlike full protected processes, PPL provides lightweight integrity levels that allow essential system interactions while blocking malicious tools from attaching to or manipulating LSASS, configurable via Group Policy under Computer Configuration > Administrative Templates > System > Local Security Authority. Auditing and monitoring for LSASS involve configuring System Access Control Lists (SACLs) on the LSASS.exe process to access attempts, such as handle opens or memory reads, which generate events like ID 4663 in the Windows for forensic . Integration with Defender for Endpoint enables real-time detection of anomalous LSASS interactions through reduction (ASR) rules, such as blocking credential stealing from LSASS, alerting on suspicious behaviors without disrupting legitimate operations. Best practices for securing LSASS include enabling LSA Protection and Credential Guard via Group Policy Objects (GPOs) linked at the domain level to ensure consistent deployment across endpoints, alongside applying regular security patches to address known exploitation vectors. Additionally, restricting the SeDebugPrivilege user right to administrators only via GPO under Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment prevents non-administrative accounts from debugging LSASS, further reducing the attack surface.

References

  1. [1]
    What actually the process LSASS does and why it ... - Microsoft Learn
    Sep 30, 2020 · LSASS is the Local Security Authority Subsystem Service, it is the security process that manages user login on the server, password management, creating Access ...
  2. [2]
    Windows Authentication Architecture | Microsoft Learn
    Nov 1, 2024 · The LSA subsystem provides services for validating access to objects, checking user rights, and generating audit messages. Security Support ...
  3. [3]
    Credentials Processes in Windows Authentication - Microsoft Learn
    Jun 30, 2025 · The Local Security Authority Subsystem Service (LSASS) stores credentials in memory on behalf of users with active Windows sessions. The stored ...Windows Credentials... · Credential Provider... · Local Security Authority
  4. [4]
    LSA Authentication - Win32 apps - Microsoft Learn
    Jan 7, 2021 · LSA Authentication describes the parts of the Local Security Authority (LSA) that applications can use to authenticate and log users on to the local system.
  5. [5]
    Troubleshoot high Lsass.exe CPU usage - Windows Server
    Jan 15, 2025 · Local Security Authority Subsystem Service (Lsass.exe) is the process on an Active Directory domain controller. It's responsible for ...
  6. [6]
    Memory usage considerations in AD DS performance tuning
    May 18, 2022 · LSASS is responsible for management of local security authority (LSA) domain authentication and Active Directory management. LSASS handles ...<|control11|><|separator|>
  7. [7]
    Detecting and preventing LSASS credential dumping attacks
    Oct 5, 2022 · In this blog, we share examples of various threat actors that we've recently observed using the LSASS credential dumping technique.
  8. [8]
    Configure added LSA protection - Microsoft Learn
    Mar 26, 2025 · This article explains how to configure added protection for the Local Security Authority (LSA) process to prevent code injection that can compromise ...Protected process... · Audit for LSA plug-ins and...
  9. [9]
    Attack surface reduction rules reference - Microsoft Learn
    This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS). LSASS authenticates users who sign in on a ...Per Asr Rule Alert And... · Per Rule Descriptions · Block Credential Stealing...
  10. [10]
    Credentials Protection and Management | Microsoft Learn
    Jul 29, 2021 · LSA protection​​ The Local Security Authority (LSA), which resides within the Local Security Authority Security Service (LSASS) process, ...
  11. [11]
    Event Logging Security - Win32 apps | Microsoft Learn
    Aug 14, 2025 · The Security log is for system use, but users can read/clear it with SE_SECURITY_NAME. Only Lsass.exe can write. Access to other logs is ...
  12. [12]
    Local Procedure Calls (LPCs) - Microsoft® Windows® Internals
    A local procedure call (LPC) is an interprocess communication facility for high-speed message passing. It is not directly available through the Windows API.
  13. [13]
    [PDF] Windows Kernel Internals Lightweight Procedure Calls
    LPC is an internal interface for NT components. • Communications between two user mode components (csrss and win32, winlogon and lsass). • Communications ...
  14. [14]
    Resolved issues in Windows 10, version 22H2 | Microsoft Learn
    ​Event ID 1074 might appear in the System event log, with the text: "The system process 'C:\WINDOWS\system32\lsass.exe' terminated unexpectedly with status code ...
  15. [15]
    Microsoft Security Bulletin MS08-002 - Important
    The Local Security Authority Subsystem Service (LSASS) provides an interface for managing local security, domain authentication, and Active Directory service ...Lsass Bypass Vulnerability... · Faq For Lsass Bypass... · Security Update Information
  16. [16]
    Windows NT 3.1 - BetaWiki
    Windows NT 3.1, codenamed Razzle, was the first 32-bit Windows NT, released on July 27, 1993, and was initially intended for OS/2 3.0.Build 196 · Windows NT 3.5 · Windows NT 3.1 build 311 · Windows NT 3.1 build 404
  17. [17]
    Chapter 2: Windows NT Security Model - GlobalSpec
    Windows NT has a very strong "security model" when compared with other operating systems such as DOS (with or without Windows 3.1), Windows 95, or even UNIX.Missing: x | Show results with:x
  18. [18]
    [PDF] Custer_Inside_Windows_NT_19...
    Custer, Helen, 1961-. Inside windows NT / Helen Custer. p. cm. Includes bibliographical references and index. ISBN 1-55615-481-X. 1. Operating systems ...
  19. [19]
    Service overview and network port requirements - Windows Server
    Jan 15, 2025 · Active Directory (local security authority). Active Directory runs under the Lsass.exe process and includes the authentication and replication ...
  20. [20]
    Kerberos authentication defined: Maximizing security - The Quest Blog
    Jan 3, 2022 · Kerberos has been the default authentication protocol in Active Directory since Windows Server 2000. Learn about the latest updates. Read ...
  21. [21]
    Teach Your Apps To Work With Windows Vista User Account Control
    Because Windows Installer has been integrated with UAC, installation packages (MSI files) have become an even more attractive method for installation. They ...Missing: LSASS | Show results with:LSASS
  22. [22]
    [PDF] Windows Vista Security Internals - Black Hat
    Feb 18, 2009 · DLL injection – particularly with LSASS – can be problematic due to the concept of Integrity Levels in Vista for system services. ASLR may ...
  23. [23]
    Credential Guard overview - Microsoft Learn
    Feb 25, 2025 · Learn about Credential Guard and how it isolates secrets so that only privileged system software can access them.
  24. [24]
    Microsoft releases out-of-band updates to fix LSASS memory leaks ...
    Mar 23, 2024 · Microsoft has released a set of out-of-band updates (OOB) to resolve issues with LSASS memory leaks in some Windows Server versions.
  25. [25]
    LSASS Memory - Red Canary Threat Detection Report
    Adversaries commonly abuse the Local Security Authority Subsystem Service (LSASS) to dump credentials for privilege escalation, data theft, and lateral ...
  26. [26]
    July 22, 2025—KB5062660 (OS Build 26100.4770) Preview
    Jul 22, 2025 · [Authentication] Fixed: This update addresses an issue that affects the Local Security Authority Subsystem Service (LSASS). · [File Explorer] ...
  27. [27]
    Problems with wininit.exe - Microsoft Q&A
    Feb 7, 2015 · Wininit EXE is a core process that is present in Windows. Wininit EXE's job is to start some of the main background services ... (LSASS) and ...<|separator|>
  28. [28]
    Windows Logon Scenarios - Microsoft Learn
    Jul 8, 2025 · Windows logon scenarios include interactive, network, smart card, and biometric logon. Interactive logon can be local or domain.Interactive Logon · Local And Domain Logon · Smart Card LogonMissing: LSASS LPC
  29. [29]
    A critical system process, C:\Windows\system32\lsass.exe, failed ...
    Jul 11, 2024 · The system process 'C:\Windows\system32\lsass.exe' terminated unexpectedly with status code -1073740791. The system will now shut down and restart.
  30. [30]
    Authentication Packages - Win32 apps | Microsoft Learn
    Jan 7, 2021 · After successfully authenticating a security principal's credentials, an authentication package is responsible for creating a new LSA logon ...Missing: upon | Show results with:upon
  31. [31]
    Access Tokens - Win32 apps - Microsoft Learn
    Jul 8, 2025 · An access token is an object that describes the security context of a process or thread. The information in a token includes the identity and privileges of the ...Missing: LSASS | Show results with:LSASS
  32. [32]
    Mandatory Integrity Control - Win32 apps - Microsoft Learn
    Jul 8, 2025 · Mandatory Integrity Control (MIC) provides a mechanism for controlling access to securable objects. This mechanism is in addition to discretionary access ...
  33. [33]
    Password Filters - Win32 apps - Microsoft Learn
    Jan 7, 2021 · When a password change request is made, the Local Security Authority (LSA) calls the password filters registered on the system. Each password ...Missing: LSASS | Show results with:LSASS
  34. [34]
    LSA Authentication Model - Win32 apps | Microsoft Learn
    Jan 7, 2021 · The Local Security Authority (LSA) authentication model has the following features: LSA authentication supports custom authentication packages.
  35. [35]
    Cached and Stored Credentials Technical Overview
    ### Summary: LSASS Storing Credentials in Process Memory
  36. [36]
    Security Support Provider Interface Architecture - Microsoft Learn
    Jul 29, 2021 · Learn about the Windows authentication protocols that are used within the Security Support Provider Interface (SSPI) architecture.<|control11|><|separator|>
  37. [37]
    Security Enhancements in the .NET Framework 2.0 - Microsoft Learn
    Oct 17, 2019 · The encryption key is managed by the local security authority subsystem (LSASS.EXE) and through the DPAPI, the data can be decrypted via ...<|separator|>
  38. [38]
    Security policy settings - Windows 10 | Microsoft Learn
    Apr 18, 2017 · The Security Settings extension to Group Policy provides an integrated policy-based management infrastructure to help you manage and enforce ...
  39. [39]
    Generate security audits - Windows 10 | Microsoft Learn
    Apr 18, 2017 · The Local Security Authority Subsystem Service (LSASS) writes events to the log. You can use the information in the security event log to trace ...
  40. [40]
    OS Credential Dumping: LSASS Memory, Sub-technique T1003.001
    Feb 11, 2020 · Adversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS).Missing: plugins | Show results with:plugins
  41. [41]
    Mimikatz, Software S0002 - MITRE ATT&CK®
    May 31, 2017 · Mimikatz is a credential dumper capable of obtaining plaintext Windows account logins and passwords, along with many other features that make it ...
  42. [42]
    Process Injection, Technique T1055 - Enterprise | MITRE ATT&CK®
    Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges. Process injection is a method of ...Process Hollowing · Process Doppelgänging · Portable Executable Injection
  43. [43]
    Human-operated ransomware attacks: A preventable disaster
    Mar 5, 2020 · Human-operated ransomware campaigns pose a significant and growing threat to businesses and represent one of the most impactful trends in cyberattacks today.<|separator|>
  44. [44]
    Native API, Technique T1106 - Enterprise - MITRE ATT&CK®
    BADHATCH can utilize Native API functions such as, ToolHelp32 and Rt1AdjustPrivilege to enable SeDebugPrivilege on a compromised machine. ... Carberp Under the ...
  45. [45]
    Process Hollowing, Sub-technique T1055.012 - MITRE ATT&CK®
    Process hollowing is commonly performed by creating a process in a suspended state then unmapping/hollowing its memory, which can then be replaced with ...Missing: EDR | Show results with:EDR
  46. [46]
    How Credential Guard works | Microsoft Learn
    Jun 12, 2025 · With Credential Guard enabled, the LSA process in the operating system talks to a component called the isolated LSA process that stores and protects those ...
  47. [47]
    LocalSecurityAuthority Policy CSP - Microsoft Learn
    Mar 12, 2025 · The LocalSecurityAuthority Policy CSP controls custom SSPs/APs loading and LSASS configuration, including if it runs as a protected process.<|control11|><|separator|>
  48. [48]
    What's new in Windows 10 Enterprise LTSC 2015 - Microsoft Learn
    Jul 9, 2024 · In Windows 10, a default process SACL was added to LSASS.exe to log processes attempting to access LSASS.exe. The SACL is L"S:(AU;SAFA;0x0010;;; ...