LSASS.EXE utilization

Posted on 2005-03-17
Medium Priority
Last Modified: 2013-12-23
Hi guys,

I have a server that seems to be dedicating somewhere between 30% and 60% of its processor time to LSASS.EXE

I've found out a little but not enough about LSASS by googling it and now I'm stuck with a busy processor and no idea where to go next.

Can someone please give me a brief overview of what LSASS actually does, and what sort of things might place demands on it that could use up 30% processor time?

Or, of course, you can suggest a solution if its a common problem? ;-)

Question by:joesinc
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
LVL 57

Expert Comment

by:Pete Long
ID: 13564613
its a pretty crucual file stands for local authority security sub system or something like that

Taskmanager is all well and good (start > Run > Taskmgr.exe) but to see what programs have what processes open use....

Process Explorer

Author Comment

ID: 13565206
Well, I had a looksee at Process Explorer and its got lots of nice extra statistics and information about things, but to be honest, it doesn't get the information I'm after, which is "What does LSASS.EXE actually do? And how does it do it?"

I can see from other servers that I can monitor that it is a fairly busy app with hours of CPU time under it's belt, but this one server (Windows 2000 SP4) is suffering from constant high usage of LSASS.

Anyone who knows will be gratefully thanked ;-)


LVL 57

Accepted Solution

Pete Long earned 375 total points
ID: 13566449
it handles authentication and ACL access for users and files - it carries all the information from a systems SAM (in standalone mode) or from and SMB interface (in domain mode)
Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.


Assisted Solution

ugnius2 earned 375 total points
ID: 13663325
detailed lsass.exe description: http://www.2-spyware.com/file-lsass-exe.html

Author Comment

ID: 13943454
Simplest solution is to split points, both of you guys tried to help and gave me a bit of info. :-)
LVL 57

Expert Comment

by:Pete Long
ID: 13946214

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question