LOGO

Local Security Authentication Server - Secure Access

July 26, 2007
Local Security Authentication Server - Secure Access

Understanding lsass.exe: Microsoft's Security Process

A recent inquiry from a reader prompted a closer look at lsass.exe. This Microsoft process is central to managing both domain access and local security policies.

In essence, lsass.exe controls user authentication when logging onto a computer or server.

Malicious software can sometimes disguise itself as this legitimate process. The Sasser virus, a notable threat from the past, serves as a prime example.

The Sasser Worm and lsass.exe

The Sasser worm exploited vulnerabilities within lsass.exe. Affected systems, particularly those running Windows XP, would display a warning initiating a 60-second countdown, urging users to save their work.

This cycle would repeat with each subsequent reboot, disrupting normal computer operation.

Locating lsass.exe and Identifying Threats

The genuine lsass.exe file is consistently found in the C:\Windows\System32 directory on both PCs and servers.

Any instance of this file located elsewhere within the system should be immediately flagged as potentially malicious.

Here's a depiction of the process as it appears on Windows Home Server:

local-security-authentication-server-1.jpg

Attempting to terminate this process through the Task Manager is typically prevented by Windows Home Server, highlighting its critical system role.

Consequences of Corruption or Deletion

If the lsass.exe file becomes corrupted or is deleted, users will likely encounter difficulties logging into their systems.

Fortunately, a resolution is often straightforward, as detailed in a previous explanation available here.

Tech Lingo: Defining "Server"

Mysicgeek's Tech Lingo: A Server is a computer specifically configured to run server applications.

  • These machines generally possess substantial processing power.
  • Multiple client computers connect to a server to access its resources and services.
#local security authentication server#LSAS#authentication#security#access control