Maximize the everyday with Microsoft 365
Get online protection, secure cloud storage, and innovative apps designed to fit your needs—all in one plan.
Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft, Version 1 and 2
This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and provides holistic planning strategies that, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.
Important! Selecting a language below will dynamically change the complete page content to that language.
Version:
2.0
Date Published:
7/7/2014
File Name:
Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques_English.pdf
Mitigating-Pass-the-Hash-Attacks-and-Other-Credential-Theft-Version-2.pdf
File Size:
1.2 MB
1.1 MB
This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and encourages organizations to assume that a breach has already occurred in order to highlight the need for a more mature defense. It provides holistic planning strategies that IT pros should consider implementing when architecting a credential theft defense. These strategies, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.Supported Operating Systems
Windows 2000 Server, Windows 7, Windows 8, Windows Server 2003, Windows Server 2008, Windows Server 2012, Windows Vista, Windows XP
Any supported Operating System- Download the PDF.
Follow Microsoft