L
Low RiskWindows
lsaiso.exeEXECUTABLE

lsaiso.exe - Credential Guard Isolated LSA Process [2026]

lsaiso.exe is the Credential Guard isolated LSA process that protects credentials using virtualization-based security. Indicates enhanced security posture when running.

3viewsLast verified: Jan 18, 2025

Risk Summary

## Risk Summary | Factor | Assessment | |--------|------------| | Detection Difficulty | Low | | Abuse Potential | Very Low | | Prevalence | Growing | | Risk Score | 15/100 | lsaiso.exe is a security-enhancing process that protects credentials via virtualization-based security.

Overview

What is lsaiso.exe?

lsaiso.exe (LSA Isolated) is the Credential Guard component that runs in a virtualization-based security (VBS) isolated environment to protect credential secrets.

Key Characteristics

AttributeValue
File Namelsaiso.exe
DeveloperMicrosoft Corporation
Digital SignatureMicrosoft Windows
FeatureCredential Guard
TypeIsolated Process

Technical Details

PropertyDescription
Process TypeIsolated User Mode (IUM)
VirtualizationRuns in VBS secure world
PurposeProtect credential secrets
ProtectionHardware-isolated

lsaiso.exe presence indicates Credential Guard is enabled, significantly reducing credential theft risks.

Normal Behavior

Normal Behavior

Legitimate Characteristics

Process: lsaiso.exe
Location: C:\Windows\System32\lsaiso.exe
Protection: VBS isolated
User: NT AUTHORITY\SYSTEM (virtual)

Expected Characteristics

AspectExpected Behavior
LocationC:\Windows\System32\
ProtectionVBS isolation
VisibilitySpecial isolated process
InstancesSingle when CG enabled
NetworkNone

Credential Guard Benefits

ProtectionDescription
NTLM hashProtected from extraction
Kerberos ticketsIsolated storage
Credential secretsHardware protected
Mimikatz defenseBlocks typical attacks

Common Locations

C:\Windows\System32\lsaiso.exe

Suspicious Indicators

Suspicious Indicators

Red Flags

IndicatorConcern LevelDescription
Wrong locationCriticalNot in System32
Missing VBSHighRunning without VBS
ImpersonationCriticalFake process
Multiple instancesHighShould be single

Security Positive

lsaiso.exe presence indicates:
- Credential Guard enabled
- VBS active
- Enhanced credential protection
- Reduced attack surface

If Missing When Expected

ScenarioConcern
Expected CG but no lsaisoCG misconfigured
Was running, now gonePotential tampering
Never presentCG not enabled

Abuse Techniques

Abuse Techniques

Minimal Abuse Potential

lsaiso.exe abuse is extremely limited:
- Runs in VBS isolation
- Hardware-protected
- No accessible attack surface
- Cannot be injected into
- Cannot be terminated normally

Theoretical Attacks

AttackFeasibility
ImpersonationEasy to detect
InjectionBlocked by VBS
TerminationRequires VBS bypass
VBS escapeExtremely difficult

What Attackers Try Instead

When Credential Guard is active:
- Attackers avoid credential dumping
- Focus on other attack vectors
- May try to disable CG (requires reboot)
- Look for non-protected credentials

Remediation Steps

Remediation Steps

Enable Credential Guard

# Enable via Group Policy
# Computer Configuration > Administrative Templates >
# System > Device Guard > Turn On Virtualization Based Security
# Set Credential Guard to "Enabled with UEFI lock"

# Or via registry
$regPath = "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard"
Set-ItemProperty -Path $regPath -Name EnableVirtualizationBasedSecurity -Value 1
Set-ItemProperty -Path $regPath -Name RequirePlatformSecurityFeatures -Value 3

Verify Status

# Check VBS status
Get-CimInstance -ClassName Win32_DeviceGuard -Namespace root\Microsoft\Windows\DeviceGuard

# Verify lsaiso is running
if (Get-Process lsaiso -ErrorAction SilentlyContinue) {
    Write-Host "Credential Guard is active"
} else {
    Write-Host "Credential Guard not running"
}

Prerequisites

RequirementDescription
UEFISecure Boot enabled
TPMVersion 2.0 recommended
VirtualizationCPU support required
64-bitWindows 10/11 Enterprise

Investigation Checklist

Investigation Checklist

Presence Verification

  • Is lsaiso.exe running?
  • Is it in correct location?
  • Is Credential Guard configured?
  • Is VBS active?

Security Status

  • Are credentials protected?
  • Any bypass attempts?
  • Configuration changes?

If Missing

  • Was CG previously enabled?
  • Any recent system changes?
  • Boot configuration modified?
  • VBS still active?

Positive Indicators

  • lsaiso running = CG active
  • Credential theft mitigated
  • Enhanced security posture

MITRE ATT&CK Techniques