Back to Blog

Hardening Windows Credential Guard against Pass-the-Hash Techniques

Hardening Windows Credential Guard against Pass-the-Hash Techniques

In the modern threat landscape, lateral movement is the lifeblood of an Advanced Persistent Threat (APT). Once an adversary gains an initial foothold within a network, their primary objective is to escalate privileges and move across the environment to locate high-value assets. One of the most effective and devastating methods for achieving this is the Pass-the-Hash (PtH) attack.

By exploiting the way Windows handles authentication, attackers can bypass the need for plaintext passwords, instead using intercepted NTLM hashes to impersonate legitimate users. While traditional endpoint security focuses on detecting the use of these hashes, a more robust architectural approach involves making the hashes themselves inaccessible. This is where Windows Defender Credential Guard becomes a critical component of a defense-in-depth strategy.

The Anatomy of the Attack: Why LSASS is a Target

To understand the defense, we must first understand the vulnerability. In a standard Windows configuration, the Local Security Authority Subsystem Service (LSASS) is responsible for managing user authentication, enforcing security policies, and handling various authentication protocols (NTLM, Kerberos, etc.).

When a user authenticates, LSASS stores sensitive material in its memory space to facilitate Single Sign-On (SSO) and subsequent authentication requests. This includes:

  • NTLM hashes.
  • Kerberos Ticket Granting Tickets (TGTs).
  • Kerberos Ticket Granting Service (TGS) tickets.

Tools like Mimikatz or specialized memory dump utilities can target the `lsass.exe` process. If an attacker gains `SYSTEM` level privileges, they can read the memory of LSASS, extract these secrets, and immediately use them to authenticate to other machines on the network. This is the essence of Pass-the-Hash: the attacker does not need to crack the hash; they simply present the stolen hash as a valid credential.

The Defense: Virtualization-Based Security (VBS)

Windows Credential Guard shifts the paradigm from "detecting the theft" to "preventing the access." It achieves this through Virtualization-based Security (VBS).

Instead of relying on the standard Windows kernel-which is vulnerable if an attacker achieves Ring 0 (kernel-mode) execution-Credential Guard utilizes the Hyper-V hypervisor to create an isolated, hardware-protected environment.

The LSAIso Process

When Credential Guard is enabled, the architecture changes fundamentally. The sensitive parts of the LSA are moved out of the standard `lsass.exe` process and into a new, isolated process called LSAIso (Isolated LSA).

LSAIso runs within a "Secure World" (a protected virtual machine managed by the hypervisor) that is separate from the "Normal World" (the standard Windows OS). Even if an attacker achieves full kernel-level compromise in the Normal World, they cannot directly access the memory space of the Secure World. The hypervisor uses Second Level Address Translation (SLAT) and hardware-enforced memory protections to ensure that the standard kernel cannot read the memory of the LSAIso process.

When an application or the OS needs to perform an authentication task, it communicates with the standard `lsASS.exe`, which acts as a proxy, sending requests to the isolated `LSAIso.exe`. The secrets never leave the protected container.

Implementing a Hardened Configuration

Simply toggling "Credential Guard" in a Group Policy Object (GPO) is insufficient for a high-assurance environment. A truly hardened posture requires a multi-layered approach involving hardware, firmware, and protocol-level restrictions.

1. Hardware and Firmware Prerequisites

Credential Guard relies on the integrity of the underlying hardware. A hardened implementation must ensure:

  • UEFI with Secure Boot: Prevents the loading of unsigned, malicious bootloaders that could compromise the hypervisor before the OS even starts.
  • TPM 2.0 (Trusted Platform Module): Used to protect the keys used by VBS and to ensure the boot process hasn't been tampered with (Measured Boot).
  • Hardware-enforced Virtualization: Enabling Intel VT-x or AMD-V in the BIOS/UEFI is non-negotiable.

2. Strengthening with Windows Defender Application Control (WDAC)

Credential Guard protects the secrets, but it does not prevent an attacker from running malicious code that might attempt to use existing sessions. Implementing

Conclusion

As shown across "The Anatomy of the Attack: Why LSASS is a Target", "The Defense: Virtualization-Based Security (VBS)", "Implementing a Hardened Configuration", a secure implementation for hardening windows credential guard against pass-the-hash techniques depends on execution discipline as much as design.

The practical hardening path is to enforce strict token/claim validation and replay resistance, deterministic identity policy evaluation with deny-by-default semantics, and host hardening baselines with tamper-resistant telemetry. This combination reduces both exploitability and attacker dwell time by forcing failures across multiple independent control layers.

Operational confidence should be measured, not assumed: track false-allow rate and time-to-revoke privileged access and time from suspicious execution chain to host containment, then use those results to tune preventive policy, detection fidelity, and response runbooks on a fixed review cadence.

Related Articles

Explore related cybersecurity topics:

Recommended Next Steps

If this topic is relevant to your organisation, use one of these paths: