Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » How to configure additional LSA Protection
  • Open Outlook links from your default browser
    How to stop Outlook from opening links in Edge Browser Network | Monitoring
  • Remote Desktop Connection
    Connect to the Remote Desktop Console from Command Prompt Windows
  • Featured Image 1
    System Drive Conversion: MBR to GPT on Windows 10 Storage
  • Snapshot
    Create or delete snapshots on VMware Workstation Backup
  • FIX RDP Authentication Error
    Fix Remote Connection Issue: An Authentication Error Has Occurred with Code 0x80004005 Windows
  • Windows 11 Taskmanager 1
    How to end a program via the Task Manager in Windows 11 Windows
  • Database Collation
    Change SQL Database Collation: ePO events DB and SQL server should match with ePO core collation Oracle/MSSQL/MySQL
  • showdefenderupdate
    View Microsoft Defender Antivirus Update Details on Windows Image Windows

How to configure additional LSA Protection

Posted on 29/06/202325/03/2024 Matthew By Matthew No Comments on How to configure additional LSA Protection
Feature image_LSA
How to configure additional LSA Protection

In today’s digital landscape, maintaining the security and integrity of sensitive data is of utmost importance. Windows operating systems provide various security features to safeguard critical system components and user credentials. Please see Smart App Control and how to enable Phishing Protection: Windows 11 New Security Features, and How to enable or disable Core Isolation Memory Integrity in Windows 10 and 11.

One such crucial component is the Local Security Authority Server Service (LSASS) process, responsible for validating user sign-ins and enforcing local security policies. Windows 8.1 and later versions offer additional protection called LSA (Local Security Authority) protection to bolster the security of the credentials managed by LSASS.

This feature aims to prevent unauthorized access, memory reading, and code injection by non-protected processes. By enabling LSA protection, administrators can reinforce the security measures surrounding user credentials, ensuring that they remain confidential and safeguarded against potential threats.

In this guide, we will explore different methods of configuration, including using the registry editor and leveraging group policies, to cater to the diverse needs and preferences of users. Additionally, we will discuss scenarios where LSA protection is automatically enabled and provide instructions on disabling the feature when necessary.

Here are other related guides on Windows security: How to turn on Windows 10 Tamper Protection for Microsoft Defender Part 1, and How to enable or disable Windows Defender Antivirus Periodic Scanning on Windows via Windows Security.

Configuring LSA Protection Using the Registry

Open the Registry Editor (RegEdit.exe) by searching for it in the Start menu.

configure additional LSA Protection - Open Registry Editor
Open Registry Editor

Navigate to the following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa

Right-click on the “RunAsPPL” value in the right pane and select “Modify.“

configure additional LSA Protection - LSA Registry settings
LSA Registry settings

Set the value of the “RunAsPPL” registry key:

  • To configure the feature with a UEFI variable, set the Value data to 1.
  • To configure the feature without a UEFI variable (only on Windows 11, 22H2), set the Value data to 2.
configure additional LSA Protection - Setting RunAsPPL Value data
Setting RunAsPPL Value data

Restart the computer for the changes to take effect.

Please see How to enable or disable Windows Defender Credential Guard, How to install additional packages via Cygwin, and how to install and configure Active Directory Certificate Services. Learn more on Environment variables in Windows 10.

Configuring LSA Protection Using Local Group Policy

Press “Windows + R” key together to open Run, type “gpedit.msc” and hit Enter to launch the Local Group Policy Editor.

Run utility
Run utility

Navigate to the following path:

Computer Configuration >> Administrative Templates >> System >> Local Security Authority

Open the “Configure LSASS to run as a protected process” policy.

configure additional LSA Protection - Local Security Authority settings
Local Security Authority settings

Set the policy to “Enabled.” Under Options, set “Configure LSA to run as a protected process” to:

  • “Enabled with UEFI Lock” to configure the feature with a UEFI variable.
  • “Enabled without UEFI Lock” to configure the feature without a UEFI variable.
Enable LSA
Enable LSA

Restart the computer for the changes to take effect.

LSA Protection Automatic Enablement

For devices running Windows RT 8.1, additional LSA protection is always enabled and cannot be turned off.

For client devices running Windows 11, 22H2, additional LSA protection will be enabled by default if the following criteria are met:

  • The device is a new install of Windows 11, 22H2 (not upgraded from a previous release).
  • The device is enterprise joined (Active Directory domain joined, Azure AD domain joined, or hybrid Azure AD domain joined).
  • The device is capable of Hypervisor-protected code integrity (HVCI).

Please note that automatic enablement of additional LSA protection on Windows 11, 22H2 does not set a UEFI variable for the feature. If you want to set a UEFI variable, you can use a registry configuration or policy.

How to Disable LSA Protection Using the Registry

Open the Registry Editor (RegEdit.exe).

Open Registry Editor

Navigate to the registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa

Set the “RunAsPPL” Value data to 0. or delete the DWORD.

Disable LSA in Registry
Disable LSA in Registry

If LSA protection was enabled with a UEFI variable, use the Local Security Authority Protected Process Opt-out tool to remove the UEFI variable.

Restart the computer.

How to Disable LSA Protection Using Local Policy on Windows

Open the Local Group Policy Editor (gpedit.msc). Navigate to the following path:

Computer Configuration >> Administrative Templates >> System >> Local Security Authority

Open the “Configure LSASS to run as a protected process” policy. Set the policy to “Enabled.”

Under Options, set “Configure LSA to” to “Disabled.”

Disbale LSA in Group Policy Editor
Disable LSA in Group Policy Editor
Restart the computer.

Note: If the policy was previously enabled and you set it to “Not Configured,” the previous setting will continue to be enforced. To disable the feature, set the policy to “Disabled” under the “Configure LSASS to run as a protected process” dropdown.

Conclusion

Configuring additional LSA protection on Windows devices is a critical step in fortifying the security of user credentials and system components. By enabling LSA protection, users can prevent unauthorized access, memory reading, and code injection, enhancing the overall security posture of their systems.

I hope you found this article useful on How to configure additional LSA Protection. Please let me know in the comment section if you have any questions.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment, Windows Tags:Microsoft Windows, Windows 10, Windows 11, Windows Defender, Windows Security

Post navigation

Previous Post: Build Docker Images with GitLab CI
Next Post: How to Disable and Enable Registry Access on Windows 11

Related Posts

  • article 1280x720.13392821
    How to use command prompt to shutdown and restart your computer Windows
  • microsoft ntlm2
    NT LAN Manager: How to prevent NTLM credentials from being sent to remote servers Security | Vulnerability Scans and Assessment
  • change keyboard layout windows 10 thumb800
    How to use the On-Screen Keyboard Windows
  • Capture 2
    MDT Invalid credentials: The network was not found Windows
  • Remove Frequently Used Folders from Quick Access in Windows 11
    How to Remove Frequently Used Folders from Quick Access in Windows 11 Windows
  • showdefenderupdate
    View Microsoft Defender Antivirus Update Details on Windows Image Windows

More Related Articles

article 1280x720.13392821 How to use command prompt to shutdown and restart your computer Windows
microsoft ntlm2 NT LAN Manager: How to prevent NTLM credentials from being sent to remote servers Security | Vulnerability Scans and Assessment
change keyboard layout windows 10 thumb800 How to use the On-Screen Keyboard Windows
Capture 2 MDT Invalid credentials: The network was not found Windows
Remove Frequently Used Folders from Quick Access in Windows 11 How to Remove Frequently Used Folders from Quick Access in Windows 11 Windows
showdefenderupdate View Microsoft Defender Antivirus Update Details on Windows Image Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Open Outlook links from your default browser
    How to stop Outlook from opening links in Edge Browser Network | Monitoring
  • Remote Desktop Connection
    Connect to the Remote Desktop Console from Command Prompt Windows
  • Featured Image 1
    System Drive Conversion: MBR to GPT on Windows 10 Storage
  • Snapshot
    Create or delete snapshots on VMware Workstation Backup
  • FIX RDP Authentication Error
    Fix Remote Connection Issue: An Authentication Error Has Occurred with Code 0x80004005 Windows
  • Windows 11 Taskmanager 1
    How to end a program via the Task Manager in Windows 11 Windows
  • Database Collation
    Change SQL Database Collation: ePO events DB and SQL server should match with ePO core collation Oracle/MSSQL/MySQL
  • showdefenderupdate
    View Microsoft Defender Antivirus Update Details on Windows Image Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.