Quick fix: LSA (Local Security Authority) Protection: prevents code injection into LSA process (defends against credential theft). Enable via Windows Security → Device security → Core isolation → Local Security Authority protection → toggle on. Reboot. Test for app / plugin compatibility. If issues: same place, toggle off.
LSA Protection (RunAsPPL) hardens the credential storage process. Modern Windows 11 enables by default for new installs. For upgraded installs: may be off. Recommended for security but check app compatibility first.
Affects: Windows 11.
Fix time: ~15 minutes.
What causes this need
LSA (lsass.exe) stores: cached credentials, Kerberos tickets, NTLM hashes. Attackers target it. LSA Protection runs lsass.exe as Protected Process Light (PPL): only Microsoft-signed code can interact. Mitigates: Mimikatz, credential dumping malware.
Method 1: Enable via Windows Security
The standard route.
- Open Windows Security.
- Pick Device security.
- Click Core isolation details.
- Find Local Security Authority protection.
- Toggle On. UAC prompt.
- Reboot.
- After reboot: verify Windows Security shows LSA Protection: On.
- For new Win11 installs: usually on by default.
- For upgraded from Win10: may need manual toggle.
This is the standard setup.
Method 2: Enable via registry (if Security UI hidden)
For policy-managed PCs.
- Open Registry Editor as Admin.
- Navigate to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa. - Find or create DWORD: RunAsPPL. Value 1 (enabled with UEFI Lock) or 2 (enabled, no lock).
- Apply.
- Reboot.
- For Group Policy alternative: Computer Configuration → Administrative Templates → System → Local Security Authority → Configure LSASS to run as a protected process → Enabled.
- For checking:
Get-WmiObject -Class Win32_Service -Filter "Name='LsaSvc'"shows service running. - For per-process check: Process Explorer (Sysinternals) shows lsass.exe with PPL icon.
This is the registry route.
Method 3: Check compatibility before enabling
For avoiding breakage.
- Apps that hook into LSA may break:
- Some third-party AV (older versions).
- Some VPN clients.
- Some single sign-on tools.
- Some authentication add-ons.
- For testing: enable temporarily (UEFI Lock = no for easy revert).
- Reboot. Test critical apps and workflows.
- Check Event Viewer → Windows Logs → System → Lsa source. Event 3033 = denied; 3065 = code integrity violation.
- If issues: temporarily disable (toggle off in Windows Security), update problematic app, re-enable.
- For chronic compatibility issues: file with app vendor. They need to sign with proper EKU.
- For corporate-managed: test in staging environment first.
- For verifying LSA Protection:
Get-MpComputerStatus | Select-Object IsTamperProtectedrelated.
This is the compatibility check.
How to verify the fix worked
- Windows Security → Device security → Core isolation: LSA Protection On.
- Event Viewer: LSA events show protected mode start.
- Process Explorer: lsass.exe shows Protected Process.
- System boots normally without errors.
If none of these work
If LSA Protection won’t enable: Hardware requirement: requires Secure Boot. Verify: msinfo32 → Secure Boot State: On. For Hyper-V conflicts: rare. Hyper-V uses VBS / Memory Integrity. LSA Protection complements. For chronic app breakage: vendor needs to update for PPL compatibility. For Windows 11 Education / Home: feature available on all editions. For corporate: Group Policy enforcement. For Insider builds: feature may shift; check current docs. For verifying via PowerShell: $lsa = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name RunAsPPL -ErrorAction SilentlyContinue; if ($lsa) { Write-Host "Value: $($lsa.RunAsPPL)" }.
Bottom line: Windows Security → Device security → Core isolation → Local Security Authority protection → On. Reboot. Test apps for compatibility. Disable temporarily if specific app breaks.