Affected versions: Windows Server 2012 R2

📖 ~1 min read

Table of contents
  1. Symptom & Impact
  2. Environment & Reproduction
  3. Root Cause Analysis
  4. Quick Triage
  5. Step-by-Step Diagnosis
  6. Solution – Primary Fix
  7. Solution – Alternative Approaches
  8. Verification & Acceptance Criteria
  9. Rollback Plan
  10. Prevention & Hardening
  11. Related Errors & Cross-Refs
  12. References & Further Reading

Symptom & Impact

LSASS pegs CPU on a Windows Server 2012 R2 domain controller or member server, causing interactive logons, RDP, and Kerberos ticket issuance to stall for users and applications.

Environment & Reproduction

Observed during heavy authentication storms, NTLM bursts from legacy apps, or after enabling new auditing settings.

Get-Process lsass | Select Id,CPU,Threads
Get-Counter 'Process(lsass)% Processor Time' -SampleInterval 2 -MaxSamples 5

Root Cause Analysis

Causes include malformed clients, NTLM hammering, audit log overflow, expensive LDAP queries, or third-party security agents hooking LSASS.

Quick Triage

Capture LSASS counters and authentication events quickly.

Get-WinEvent -LogName Security -FilterXPath "*[System[(EventID=4625 or EventID=4776)]]" -MaxEvents 30
Get-Counter 'NTDSLDAP Searches/sec','Security System-Wide StatisticsNTLM Authentications' -SampleInterval 2 -MaxSamples 5

Step-by-Step Diagnosis

Use NTLM auditing and LDAP diagnostics to find the offending source.

auditpol /get /subcategory:'Credential Validation'
Get-WinEvent -LogName 'Microsoft-Windows-NTLM/Operational' -MaxEvents 50
Get-ItemProperty 'HKLM:SYSTEMCurrentControlSetServicesNTDSDiagnostics'
Illustrative mockup for windows-server-2012-r2 — terminal_or_powershell
LSASS process and thread counts — Illustrative mockup — Progressive Robot

Solution – Primary Fix

Block runaway sources, throttle NTLM, and stabilise LSASS via targeted KBs and configuration fixes.

Still having issues? Our IT Consulting team can diagnose and resolve this for you. Get in touch for a free consultation.

Set-ItemProperty 'HKLM:SYSTEMCurrentControlSetControlLsa' -Name LmCompatibilityLevel -Value 5
New-NetFirewallRule -DisplayName 'Block legacy NTLM client' -Direction Inbound -RemoteAddress 10.0.20.55 -Action Block
Restart-Service Netlogon
Illustrative mockup for windows-server-2012-r2 — event_or_log_viewer
Security log auth failures — Illustrative mockup — Progressive Robot

Solution – Alternative Approaches

Offload heavy LDAP clients to RODCs or dedicated DCs, and tune LSASS with hotfixes for known leaks.

Get-ADDomainController -Filter * | Select Name,IsReadOnly
Get-HotFix | Where-Object {$_.HotFixID -match 'KB'} | Select HotFixID,InstalledOn

Verification & Acceptance Criteria

LSASS CPU returns below 30 percent and 4768/4624 events flow without queueing.

Get-Process lsass | Select CPU,Handles,Threads
Get-WinEvent -LogName Security -MaxEvents 20 | Select TimeCreated,Id

Rollback Plan

Disable temporary NTLM block rules and revert audit overrides if helpdesk reports legacy app breakage.

Disable-NetFirewallRule -DisplayName 'Block legacy NTLM client'
Set-ItemProperty 'HKLM:SYSTEMCurrentControlSetControlLsa' -Name LmCompatibilityLevel -Value 3

Prevention & Hardening

Patch LSASS with current cumulative updates, enable LSA protection, and monitor NTLM/LDAP counters.

Set-ItemProperty 'HKLM:SYSTEMCurrentControlSetControlLsa' -Name RunAsPPL -Value 1
Get-Counter 'Process(lsass)% Processor Time'

Often linked to Kerberos ticket pressure, audit log overflow, and Credential Guard interactions.

Related tutorial: View the step-by-step tutorial for Windows Server 2012 R2.

View all Windows Server 2012 R2 tutorials on the Tutorials Hub →

Browse all common problems & solutions on the Tutorials Hub.

References & Further Reading

Microsoft Learn: LSA protection, NTLM auditing, and LDAP performance counters reference.

Need Expert Help?

If you cannot resolve this yourself, our team offers hands-on Server Management, Managed IT Services, and flexible Support Plans. Contact us today — we respond within one business day.