Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1861 |
| Revision | 2 |
| Updated | Dec-23 |
| Guideline | Not provided |
| Section | Authentication hardening |
| Topic | Protecting credentials |
| Essential Eight | ML3 |
| PSPF Levels | NC, OS, P, S, TS |
Local Security Authority protection isolates credentials by running LSASS as a protected process under virtualization-based security, reducing credential theft risk1. On Windows 11 version 22H2 and later, LSA protection is enabled by default when compatibility checks pass, with an audit triggered for incompatibilities; verify enablement via Event Viewer by reviewing the LSA protection logs21.
LSASS (Local Security Authority Subsystem Service) is the most targeted process on Windows endpoints for credential theft. It stores NTLM password hashes, Kerberos tickets, and cached domain credentials in memory — all of which are extracted by tools like Mimikatz using sekurlsa::logonpasswords when an attacker gains local administrator privileges.
Running LSASS as a Protected Process Light (PPL) under Virtualization-Based Security (VBS) prevents even processes with SeDebugPrivilege (local admin) from opening a handle to LSASS with PROCESS_VM_READ access — the prerequisite for memory scraping. This directly counters the Pass-the-Hash and Pass-the-Ticket attack chains that underpin most ransomware and APT lateral movement.
Windows 11 22H2+ enables LSA protection by default on clean-installed HVCI-capable devices, but the Intune ConfigureLsaProtectedProcess policy with UEFI lock (value = 1) prevents a local administrator from disabling the protection via registry edit — a critical additional hardening step for Maturity Level 3.
| Protection mode | Registry key | Attack resistance |
|---|---|---|
| No protection (default pre-22H2) | N/A | Mimikatz, ProcDump, Task Manager memory dump |
| PPL without UEFI lock (value = 2) | Software only | Resistant to standard credential dump; can be disabled by admin |
| PPL with UEFI lock (value = 1) | UEFI variable + registry | Resistant to credential dump; cannot be disabled without physical UEFI access |
Organisations should audit Event ID 12 (LSASS started as a protected process) and Event ID 3065/3066 (code integrity check warnings for non-PPL-compatible drivers) in the Microsoft-Windows-CodeIntegrity/Operational log to confirm protection is active and identify incompatible drivers prior to broad deployment. Known application compatibility issues include MSCHAPv2 configurations and Java GSS API when Credential Guard is simultaneously enabled.3
[!NOTE] The ConfigureLsaProtectedProcess policy will be applied to Windows 11 22H2 and later clients to ensure LSA protection is enabled by default, configuring LSASS to run as a protected process according to the policy values (1 = Enabled with UEFI lock, 2 = Enabled without UEFI lock) where applicable. The criteria for this outcome include devices that are clean installed, HVCI capable, and where the policy is configured or left to default when no registry setting exists. Verification will be performed using Event Viewer to confirm LSA protection is active and to review LSA protection logs for blocked plug-ins and drivers.
Licensing:
Permissions/Roles:
Dependencies:
Ensure the device is running Windows 11 version 22H2 or later and that the upgrade has completed. An audit for incompatibilities with LSA protection runs during this upgrade; if incompatibilities are not detected, LSA protection is enabled by default.1
Verify the enablement state in the Windows Security app. Open the Windows Security app, then navigate to Device Security and Core Isolation to confirm LSA protection is enabled. If incompatibilities are detected, enablement may not occur automatically.1
Verify via Event Viewer. Open Event Viewer and review the LSA protection logs to confirm that LSA protection is active and to identify any programs blocked from loading into LSA.1
If incompatibilities are detected during the upgrade, automatic enablement may not occur until those incompatibilities are addressed.1
In the Intune admin center, go to Devices > Windows > Configuration profiles and create a profile. Choose Platform: Windows 10 and later and Profile type: Templates > Custom. Then select Create. (This uses the policy CSP path for LSA protection.)5
Save the row, then select Next. On the Assignments screen, assign the profile to the appropriate devices or user groups, configure any applicability rules, and select Next. Then select Review + create to finalize the profile. Restart the computer after deployment.5
[!NOTE] LSA protection enablement can be influenced by upgrade status and policy configuration. Confirm compatibility and restart impact in your environment.1