Download Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft, Version 1 and 2 from Official Microsoft Download Center

Surface Book 3 with screen detached from keyboard

Surface Book 3

Powerhouse performance

Person using Power BI Desktop

Power BI

Transform data into actionable insights with dashboards and reports

Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft, Version 1 and 2

Important! Selecting a language below will dynamically change the complete page content to that language.

Language:
English
This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and provides holistic planning strategies that, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.