
…The system then creates a proxy process called LSAIso (LSA Isolated) for communication with the virtualized LSASS process.” Credential Guard prevents attackers from dumping credentials stored in LSASS by running LSASS in a virtualized container that even a user with SYSTEM privileges cannot access. A prime target is the LSASS process, which stores NTLM and Kerberos credentials. …After compromising a system, attackers often attempt to extract any stored credentials for further lateral movement through the network.

As noted: “Credential Guard is a virtualization-based isolation technology for LSASS which prevents attackers from stealing credentials that could be used for pass the hash attacks. VBS is needed for Windows Defender Credential Guard, which protects domain credentials in a network. (This is not a new technology, but the mandate is new.) While you could argue that in a standalone workstation this protection may not be needed, in the enterprise you’ll want to ensure it is enabled. Windows 11 ensures that VBS is enabled by default to support Hypervisor-Enforced Code Integrity. But it doesn’t have Virtualization Based Security (VBS) support in its processor. This laptop I use, for example, has a Trusted Platform Module that will support Windows 11.


If that’s you, and you’re interested about why you can’t run Windows 11, you can download the Bytejeans tool to find out exactly why. A lot of users actually can’t run Windows 11.
