Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1002

SeDebugPrivilege

What is SeDebugPrivilege?

SeDebugPrivilegeA powerful Windows user-right that lets a holder open, read, and modify the memory of any process — including LSASS — making it a prime target for attackers seeking credential theft.


SeDebugPrivilege is a Windows privilege defined in Local Security Authority that, when held by a process token, allows opening any process or thread (including those owned by SYSTEM) with PROCESS_ALL_ACCESS. By default it is granted only to the local Administrators group and to processes running as SYSTEM, and Microsoft documents it as effectively equivalent to administrator on the host. Tools such as Mimikatz, ProcDump (for LSASS dumping), and EDR products require this privilege to perform memory introspection. Attackers love it: with SeDebugPrivilege they can dump LSASS, hijack tokens, inject into protected processes, and disable security tooling. Defenders monitor token-adjustment events 4673/4703 in the Windows Security log, use Credential Guard, and remove the right via Group Policy.

Examples

  1. 01

    An adversary enabling SeDebugPrivilege on a Mimikatz process and running sekurlsa::logonpasswords to dump LSASS.

  2. 02

    ProcDump used with -ma to capture an LSASS memory dump for offline credential extraction.

Frequently asked questions

What is SeDebugPrivilege?

A powerful Windows user-right that lets a holder open, read, and modify the memory of any process — including LSASS — making it a prime target for attackers seeking credential theft. It belongs to the Identity & Access category of cybersecurity.

What does SeDebugPrivilege mean?

A powerful Windows user-right that lets a holder open, read, and modify the memory of any process — including LSASS — making it a prime target for attackers seeking credential theft.

How does SeDebugPrivilege work?

SeDebugPrivilege is a Windows privilege defined in Local Security Authority that, when held by a process token, allows opening any process or thread (including those owned by SYSTEM) with PROCESS_ALL_ACCESS. By default it is granted only to the local Administrators group and to processes running as SYSTEM, and Microsoft documents it as effectively equivalent to administrator on the host. Tools such as Mimikatz, ProcDump (for LSASS dumping), and EDR products require this privilege to perform memory introspection. Attackers love it: with SeDebugPrivilege they can dump LSASS, hijack tokens, inject into protected processes, and disable security tooling. Defenders monitor token-adjustment events 4673/4703 in the Windows Security log, use Credential Guard, and remove the right via Group Policy.

How do you defend against SeDebugPrivilege?

Defences for SeDebugPrivilege typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for SeDebugPrivilege?

Common alternative names include: SeDebug, Debug programs right.

Related terms