Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows » Windows Cached Credentials: How does cached domain logon work?
  • ysvxdf
    Install and configure BigBlueButton on Ubuntu Linux Linux
  • windows hello la gi
    All you need to know before deploying Windows Hello for Business Key and Certificate Trust Windows
  • FailedRegistration
    DNS Bad key 9017: The Cluster Name registration failed of one or more associated DNS names Virtualization
  • Protect OOTBI
    Best Storage for Veeam: Comparing OOTBI by ObjectFirst to VHR Backup
  • 960x0
    How to resolve request timed out when pinging Windows Server
  • GitLab 1
    How to Setup GitLab Runner on WSL Linux
  • Perform Site Maintenance or reset this site greyed out
    Fix “Perform Site Maintenance or reset this site” greyed out Windows Server
  • Force bitlocker encryption
    Force BitLocker Recovery mode: How to unlock BitLocker Protected Drive Network | Monitoring

Windows Cached Credentials: How does cached domain logon work?

Posted on 09/10/202003/09/2023 Christian By Christian 4 Comments on Windows Cached Credentials: How does cached domain logon work?
cached credentials

This article discusses how credentials are formed in Windows and how they are being consumed by the Operating System. Before proceeding, let us discuss some key terms. If a user or service wants to access a computing resource, they must provide information that proves their identity. This identity is typically in the form of their account’s user name. This might be the user name that is the Security Accounts Manager (SAM) account name or the User Principal Name (UPN). But to prove their identity, they must provide secret information, which is called the authenticator. An authenticator can take various forms depending on the authentication protocol and method. The combination of an identity and an authenticator is called an authentication credential. Creating, submitting, and verifying credentials is described simply as authentication, which is implemented through various authentication protocols, such as the Kerberos, NTLM, TACACSs+, and RADIUS protocols.

You may also want to visit the following interesting articles. What are the merits and demerits of Local System Account and Service Logon Account, how to delete and restore objects using Active Directory Administrative Center, and what are the differences between an Active Directory contact and a user account object?

Authentication establishes the identity of the user, but not responsible for the Authorization. depending on the protocol used, this can be defined at a later stage and this is referred to as Authorization. Credentials are created or converted to a form that is required by the authentication protocols that are available on a device and these credentials can be stored in the Local Security Authority Subsystem Service (LSASS) process memory for use by the account during a session. Credentials must also be stored on a hard disk drive in authoritative databases, such as the SAM database and in the database that is used by Active Directory Domain Services (AD DS).

Resilient Logon Solution

Furthermore, Cached credentials, also known as cached logon data, are a piece of information that a user uses to logon into a corporate network when the domain controller is unavailable.
Note: You can check in the security log, what kind of logon type you used. Each logon type has its own number. However, If you are interested, then you can always search the MSDN for the logon type and you’re going to find appropriate information.

When you log on to Windows by using cached logon information, if the domain controller is unavailable to validate your account, you cannot access network resources that require domain validation. However, you can access network resources that do not require domain validation.

Moreover, Through the registry and a resource kit utility (Regkey.exe), you can change the number of previous logon attempts a server will cache. The valid range of values for this parameter is 0 to 50. In addition, A value of 0 turns off logon caching, and any value above 50 will only cache 50 logon attempts. By default, all versions of Windows remember 10 cached logons except Windows Server 2008. For more on Windows Registry, see the following link.

Cached login information is controlled by the following Registry keys below or Group Policy Objects:
– Via The Windows Registry: follow the steps below to launch the registry editor. From the Windows search box, type “regedit.exe” to launch the Windows Registry Editor as shown below.

domain logon

Nonetheless, This will Open the Registry Editor, as shown below. Navigate through the following hive and find the “winlogon” key.

Windows authentication
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\Current
Version\Winlogon\
- Value name: CachedLogonsCount
- Data type: REG_SZ
- Values: 0 - 50
Any changes you make to this key require that you restart the computer for the changes to take effect

– Via Group Policy:

You can find an item called “Interactive logon: Number of previous logons to cache and this can be configured to suit our need in case the domain controller is not available”. Lunch Group Policy by using the Windows Search, type “gpedit.msc” as shown below For more on Group policies, kindly see the following link1 and link2.

credential caching

This will open the Group Policy Editor, navigate thorough the following "Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\"

In this policy setting, a value of 0 disables logon caching. Any value above 50 only caches 50 logon attempts. Default number: 10. See the images below for more information. Double-click the “Interactive logon: Number of previous logons to cache” policy to configure it as needed when the domain controller is unavailable.

Screenshot 2020 10 09 at 16.30.31
Screenshot 2020 10 09 at 16.30.31
Screenshot 2020 10 09 at 16.31.08
Screenshot 2020 10 09 at 16.31.08

What is Windows Logon Cached Password Verifiers?


These verifiers, not credentials, can’t be presented for remote authentication. They validate credentials locally, stored in the local computer’s registry, when AD DS connection isn’t possible during logon. These “cached logons” or more
Manage cached domain account info with the security policy setting “Interactive logon: Number of previous logons to cache” when the domain controller isn’t available.

What are the various forms of Credential Authenticators?


1: NT hash: The NT hash of the password is calculated by using an unsalted MD4 hash algorithm. MD4 is a cryptographic one-way function which produces a mathematical representation of a password. This hashing function is designed to always produce the same result from the same password input, and to minimize collisions where two different passwords can produce the same result. This hash is always the same length and cannot be directly decrypted to reveal the plaintext password. Because the NT hash only changes when the password changes, an NT hash is valid for authentication until a user’s password is changed.

Note: To protect against brute-force attacks on the NT hashes or online systems, users who authenticate with passwords should set strong passwords or passphrases that include characters from multiple sets and are as long as the user can easily remember

2: Plaintext Credentials: A user signing into a Windows computer provides a plaintext username and credential information. The user’s identity authentication protocol requires converting the plaintext password, and some Windows versions retain an encrypted copy for authentication methods like Digest authentication.

Note: Windows operating systems never store any plaintext credentials in memory or on the hard disk drive. Only reversibly encrypted credentials are stored there. When later access to the plaintext forms of the credentials is required, Windows stores the passwords in an encrypted form that can only be decrypted by the operating system to provide access in authorized circumstances.

3: LM Hash: LAN Manager (LM) hashes are derived from the user password. Legacy support for LM hashes and the LAN Manager authentication protocol remains in the NTLM protocol suite. Default configurations in Windows and Microsoft
security guidance have discouraged its use.

  • LM hashes inherently are more vulnerable to attacks because:
  • – LM hashes require a password to be less than 15 characters long and they contain only ASCII characters.
  • – LM hashes do not differentiate between uppercase and lowercase letters.

Where are Windows credentials stored?

I will be emphasizing more on how credentials are stored in Window Operating
System (OS).  Windows credentials are composed of a combination of an account name and the authenticator. These are stored and retrieved from the following locations depending on the status of the user’s session, which
might be active or inactive, and local or networked.

1: Security Accounts Manager (SAM) database: The SAM database is stored as a file on the local hard disk drive, and it is
the authoritative credential store for local accounts on each Windows computer. This database holds all computer-specific credentials, including the built-in local Administrator account and other local accounts.

The SAM database stores information on each account, including the user name and the NT password hash. By default, the SAM database does not store LM hashes on current versions of Windows. No password is ever stored in a SAM database—only the password hashes. The NT password hash is an unsalted MD4 hash of the account’s password. This means that if two accounts use an identical password, they will also have an identical NT password hash.

2: LSASS process memory: LSASS stores credentials in memory for Windows users with active sessions. Furthermore, Users can access network resources like file shares, Exchange Server mailboxes, and SharePoint sites seamlessly. You do it without re-entering credentials for each remote service.

LSASS can store credentials in multiple forms, including:
 – Reversibly encrypted plaintext
 – Kerberos tickets (TGTs, service tickets)
 – NT hash
 – LM hash

LSASS stores the account’s NT hash value and the smart card’s plaintext PIN when the user logs onto Windows with a smart card, not a plaintext password. Enable the account attribute for a required smart card. It will automatically generate a random NT hash value instead of the original password hash. The password hash is automatically generated when the attribute is set does not change.

If a user logs on to Windows with a password that is compatible with LM hashes, this authenticator will be present in memory. The storage of plaintext credentials in memory cannot be disabled, even if the credential providers that require them are disabled.

I hope you found this blog post helpful. If you have any questions, please let me know in the comment session.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Pocket (Opens in new window) Pocket
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Tags:Auto Logon, Domain, Domain Controller, logon, Windows 10

Post navigation

Previous Post: How to remove a Bluetooth device and connect a new Bluetooth device to Macbook
Next Post: Windows Profile: How to determine your windows username

Related Posts

  • View installed Updates on Windows
    Get lists of installed Microsoft Windows Updates Windows
  • spell
    Disable Cloud-Based Spell Checker in Microsoft Edge and Google Chrome Windows
  • GoogleTimeError
    Google Chrome reports your clock is behind: How to fix clock synchronization issues in Windows Windows
  • edge7
    How to enable Adblocker on Microsoft Edge Windows
  • Harica cert request and CSR
    Generate CSR and Request a Certificate from Herica CA Windows
  • image 8
    Enable or disable Core Isolation Memory Integrity in Windows 10 and 11 Windows

More Related Articles

View installed Updates on Windows Get lists of installed Microsoft Windows Updates Windows
spell Disable Cloud-Based Spell Checker in Microsoft Edge and Google Chrome Windows
GoogleTimeError Google Chrome reports your clock is behind: How to fix clock synchronization issues in Windows Windows
edge7 How to enable Adblocker on Microsoft Edge Windows
Harica cert request and CSR Generate CSR and Request a Certificate from Herica CA Windows
image 8 Enable or disable Core Isolation Memory Integrity in Windows 10 and 11 Windows

Comments (4) on “Windows Cached Credentials: How does cached domain logon work?”

  1. Avatar photo operation420.net says:
    26/08/2021 at 10:04 PM

    Hello,

    How can one view/set this value from the command line (on an unrelated note, is this option in gpedit.msc or just the registry?)

    Reg Query “HKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTCurrentVersionWinlogon”

    works but

    Reg Query “HKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTCurrentVersionWinlogonCachedLogCachedLogonsCount”
    Gives error:
    ERROR: The system was unable to find the specified registry key or value.

    Log in to Reply
    1. chris Christian says:
      26/08/2021 at 10:19 PM

      Maybe you should create it!

      Log in to Reply
  2. Avatar photo operation420.net says:
    26/08/2021 at 10:10 PM

    Can you change this value from the command line? Do you run this on the client, server or can you run it on both?

    I am experimenting with using a Samba (Linux) Domain Controller…

    Log in to Reply
    1. chris Christian says:
      26/08/2021 at 10:19 PM

      Hello,

      You can also use REG followed by the operation type and /? to get more help. For example, REG QUERY /? or REG ADD /?.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • ysvxdf
    Install and configure BigBlueButton on Ubuntu Linux Linux
  • windows hello la gi
    All you need to know before deploying Windows Hello for Business Key and Certificate Trust Windows
  • FailedRegistration
    DNS Bad key 9017: The Cluster Name registration failed of one or more associated DNS names Virtualization
  • Protect OOTBI
    Best Storage for Veeam: Comparing OOTBI by ObjectFirst to VHR Backup
  • 960x0
    How to resolve request timed out when pinging Windows Server
  • GitLab 1
    How to Setup GitLab Runner on WSL Linux
  • Perform Site Maintenance or reset this site greyed out
    Fix “Perform Site Maintenance or reset this site” greyed out Windows Server
  • Force bitlocker encryption
    Force BitLocker Recovery mode: How to unlock BitLocker Protected Drive Network | Monitoring

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,827 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.