18.9.26.2 (NG) Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'

Information

This policy setting controls whether the Local Security Authority Subservice Service (LSASS) runs in protected mode and also has the option to lock in protected mode with Unified Extensible Firmware Interface (UEFI). The Local Security Authority (LSA), which includes the LSASS process, validates users for local and remote sign-ins and enforces local security policies.

The recommended state for this setting is: Enabled: Enabled with UEFI Lock

Note: This additional protection to prevent reading memory and code injection by non-protected processes is supported by Windows 8.1 (or newer).

Provides added security for the credentials that LSA stores and manages. Enabling this setting with UEFI Lock prevents the setting from being changed remotely.

Solution

To establish the recommended configuration via GP, set the following UI path to Enabled: Enabled with UEFI Lock :

Computer Configuration\Policies\Administrative Templates\System\Local Security Authority\Configures LSASS to run as a protected process

Note: This Group Policy path may not exist by default. It is provided by the Group Policy template LocalSecurityAuthority.admx/adml that is included with the Microsoft Windows 11 Release 22H2 Administrative Templates v1.0 (or newer).

Note #2: In the Microsoft Windows 11 Release 23H2 Administrative Templates, the registry location of

HKLM\SYSTEM\CurrentControlSet\Control\Lsa:RunAsPPL

was set for

Configures LSASS to run as a protected process

. This same registry location and value was also created if the setting

Ensure 'LSA Protection' is set to 'Enabled'

was also applied. This appears to have been a mistake in the ADMX/ADML Templates for that release.

Starting with the Microsoft Windows 11 Release 24H2 Administrative Templates, the setting

Configures LSASS to run as a protected process

has a new registry location of

HKLM\Software\Policies\Microsoft\Windows\System

. In addition, the setting

LSA Protection

will be displayed by GPME when this setting (

Configures LSASS to run as a protected process

) is configured.

If

Configures LSASS to run as a protected process

was configured using an older version of the ADML/ADML templates, the new registry location will not auto-apply to the system, and assessment scans using the latest benchmark might fail. To fix this issue, the ADMX/ADML templates must be updated to the latest version, the setting removed from the GPO, and then added back in.

If the Microsoft Windows 10 Benchmark is applied,

LSA Protection

is configured via a separate recommendation for older versions of the Windows 10 Operating System using the SecGuide.admx/adml templates. That configuration is checked for separately from this recommendation.

Impact:

Once this setting has been applied (Enabled), removing the group policy setting (set to Not Configured) will not reverse the impact. In order to reverse the impact, you must explicitly configure this setting to Disabled and follow

Microsoft's documentation on disabling the UEFI Lock

.

See Also

https://workbench.cisecurity.org/benchmarks/21344

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-16

Plugin: Windows

Control ID: ebe60cbcc2391fff34108201514a2a4bf53e2111037725e39b81ae157a2cbd29