Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » How to configure additional LSA Protection

How to configure additional LSA Protection

Posted on 29/06/202325/03/2024 Matthew By Matthew No Comments on How to configure additional LSA Protection
Feature image_LSA
How to configure additional LSA Protection

In today’s digital landscape, maintaining the security and integrity of sensitive data is of utmost importance. Windows operating systems provide various security features to safeguard critical system components and user credentials. Please see Smart App Control and how to enable Phishing Protection: Windows 11 New Security Features, and How to enable or disable Core Isolation Memory Integrity in Windows 10 and 11.

One such crucial component is the Local Security Authority Server Service (LSASS) process, responsible for validating user sign-ins and enforcing local security policies. Windows 8.1 and later versions offer additional protection called LSA (Local Security Authority) protection to bolster the security of the credentials managed by LSASS.

This feature aims to prevent unauthorized access, memory reading, and code injection by non-protected processes. By enabling LSA protection, administrators can reinforce the security measures surrounding user credentials, ensuring that they remain confidential and safeguarded against potential threats.

In this guide, we will explore different methods of configuration, including using the registry editor and leveraging group policies, to cater to the diverse needs and preferences of users. Additionally, we will discuss scenarios where LSA protection is automatically enabled and provide instructions on disabling the feature when necessary.

Here are other related guides on Windows security: How to turn on Windows 10 Tamper Protection for Microsoft Defender Part 1, and How to enable or disable Windows Defender Antivirus Periodic Scanning on Windows via Windows Security.

Configuring LSA Protection Using the Registry

Open the Registry Editor (RegEdit.exe) by searching for it in the Start menu.

configure additional LSA Protection - Open Registry Editor
Open Registry Editor

Navigate to the following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa

Right-click on the “RunAsPPL” value in the right pane and select “Modify.“

configure additional LSA Protection - LSA Registry settings
LSA Registry settings

Set the value of the “RunAsPPL” registry key:

  • To configure the feature with a UEFI variable, set the Value data to 1.
  • To configure the feature without a UEFI variable (only on Windows 11, 22H2), set the Value data to 2.
configure additional LSA Protection - Setting RunAsPPL Value data
Setting RunAsPPL Value data

Restart the computer for the changes to take effect.

Please see How to enable or disable Windows Defender Credential Guard, How to install additional packages via Cygwin, and how to install and configure Active Directory Certificate Services. Learn more on Environment variables in Windows 10.

Configuring LSA Protection Using Local Group Policy

Press “Windows + R” key together to open Run, type “gpedit.msc” and hit Enter to launch the Local Group Policy Editor.

Run utility
Run utility

Navigate to the following path:

Computer Configuration >> Administrative Templates >> System >> Local Security Authority

Open the “Configure LSASS to run as a protected process” policy.

configure additional LSA Protection - Local Security Authority settings
Local Security Authority settings

Set the policy to “Enabled.” Under Options, set “Configure LSA to run as a protected process” to:

  • “Enabled with UEFI Lock” to configure the feature with a UEFI variable.
  • “Enabled without UEFI Lock” to configure the feature without a UEFI variable.
Enable LSA
Enable LSA

Restart the computer for the changes to take effect.

LSA Protection Automatic Enablement

For devices running Windows RT 8.1, additional LSA protection is always enabled and cannot be turned off.

For client devices running Windows 11, 22H2, additional LSA protection will be enabled by default if the following criteria are met:

  • The device is a new install of Windows 11, 22H2 (not upgraded from a previous release).
  • The device is enterprise joined (Active Directory domain joined, Azure AD domain joined, or hybrid Azure AD domain joined).
  • The device is capable of Hypervisor-protected code integrity (HVCI).

Please note that automatic enablement of additional LSA protection on Windows 11, 22H2 does not set a UEFI variable for the feature. If you want to set a UEFI variable, you can use a registry configuration or policy.

How to Disable LSA Protection Using the Registry

Open the Registry Editor (RegEdit.exe).

Open Registry Editor

Navigate to the registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa

Set the “RunAsPPL” Value data to 0. or delete the DWORD.

Disable LSA in Registry
Disable LSA in Registry

If LSA protection was enabled with a UEFI variable, use the Local Security Authority Protected Process Opt-out tool to remove the UEFI variable.

Restart the computer.

How to Disable LSA Protection Using Local Policy on Windows

Open the Local Group Policy Editor (gpedit.msc). Navigate to the following path:

Computer Configuration >> Administrative Templates >> System >> Local Security Authority

Open the “Configure LSASS to run as a protected process” policy. Set the policy to “Enabled.”

Under Options, set “Configure LSA to” to “Disabled.”

Disbale LSA in Group Policy Editor
Disable LSA in Group Policy Editor
Restart the computer.

Note: If the policy was previously enabled and you set it to “Not Configured,” the previous setting will continue to be enforced. To disable the feature, set the policy to “Disabled” under the “Configure LSASS to run as a protected process” dropdown.

Conclusion

Configuring additional LSA protection on Windows devices is a critical step in fortifying the security of user credentials and system components. By enabling LSA protection, users can prevent unauthorized access, memory reading, and code injection, enhancing the overall security posture of their systems.

I hope you found this article useful on How to configure additional LSA Protection. Please let me know in the comment section if you have any questions.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment, Windows Tags:Microsoft Windows, Windows 10, Windows 11, Windows Defender, Windows Security

Post navigation

Previous Post: Build Docker Images with GitLab CI
Next Post: How to Disable and Enable Registry Access on Windows 11

Related Posts

  • Windows 11 taskbar features remove 1
    How to modify Windows 11 Taskbar via Intune and GPO Windows
  • img 5be0c6cdb96d8
    Is BitLocker Enabled? How to view BitLocker Disk Encryption Status in Windows Windows
  • screenshot 2020 02 09 at 21.47.28
    How to find Computer Model and Serial Number Windows
  • mdm
    Delete AssignedAccess applied via MDM WMI bridge Provider Windows
  • Missing ADML File
    Fix an appropriate resource file could not be found for LAPS Windows
  • logon failure and requested session denied
    Logon Failure: User has not been granted the requested logon type Windows

More Related Articles

Windows 11 taskbar features remove 1 How to modify Windows 11 Taskbar via Intune and GPO Windows
img 5be0c6cdb96d8 Is BitLocker Enabled? How to view BitLocker Disk Encryption Status in Windows Windows
screenshot 2020 02 09 at 21.47.28 How to find Computer Model and Serial Number Windows
mdm Delete AssignedAccess applied via MDM WMI bridge Provider Windows
Missing ADML File Fix an appropriate resource file could not be found for LAPS Windows
logon failure and requested session denied Logon Failure: User has not been granted the requested logon type Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • ubuntu 1479782 1280
    Ubuntu Linux post installation of Network Properties, Guest Integration and Web Administration using Cockpit Linux
  • banner
    How to install and configure FSRM in Microsoft Windows Server Windows Server
  • Turn Focus on Enable or disable notifications for Apps on Mac
    Turn Focus On/Off: Enable or Disable Notifications for Apps on Mac Mac
  • ccsC
    NTuser.dat file: How to correctly load Windows Registry Hive Windows
  • fba7f screenshot 2019 04 15 at 18.33.30
    File System Overview: How to decide on the right File System to use for your USB Linux
  • banner 3
    How to Create a React App with Vite Version Control System
  • deactivateandreactivate
    How to deactivate and reactivate a Slack user JIRA|Confluence|Apps
  • Active Directory Security Hardening with GPO and Policy Analyzer
    Harden Active Directory Using CIS Benchmark and MSCT 1.0 Windows Server

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,824 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.