Protecting Secret Keys in PC Memory

The LineLogix system includes the Encrypted Key mechanism and the Key Check Helper, which use AES-128 encryption to safeguard customer keys. Secret keys are never stored or displayed in their unencrypted form; however, they must temporarily exist in that form in the computer's memory. A determined attacker could retrieve them, given physical or network access to the computer. Common sense measures to protect customer keys include:


Clearing the Page File at Shutdown

Windows uses the Page File (also called virtual memory) to extend physical RAM by storing data less-frequently used data on disk. Sensitive information--including secret keys temporarily loaded to RAM--can be written to the Page File without your knowledge and outside your control. Follow these steps to configure Windows to automatically clear the Page File every time the system shuts down, ensuring that no residual secrets remain on disk:

Use this method on Windows Pro, Enterprise, or Education editions. This is the preferred approach for enterprise deployments.

Windows Group Policy Editor
      screenshot with clear pagefile setting enabled
This instruction is from page https://windowsloop.com/how-to-reset-virtual-memory-in-windows-10-11/
If it does not work for you, visit that page for instructions that do not involve Windows Policies, or search the internet for an answer to "Windows clear pagefile at shutdown" that is better suited to your setup.


Copyright 2026, GlueLogix Inc. All Rights Reserved.