Trace Id is missing

Unlock your potential with Microsoft Copilot

Get things done faster and unleash your creativity with the power of AI anywhere you go.
Microsoft Copilot app being utilized to generate pictures of a singing dog, assisting to identify a flower, and helping to generate an email to congratulate a coworker on a promotion.

Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft, Version 1 and 2

This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and provides holistic planning strategies that, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.

Important! Selecting a language below will dynamically change the complete page content to that language.

  • Version:

    2.0

    Date Published:

    7/7/2014

    File Name:

    Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques_English.pdf

    Mitigating-Pass-the-Hash-Attacks-and-Other-Credential-Theft-Version-2.pdf

    File Size:

    1.2 MB

    1.1 MB

    This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and encourages organizations to assume that a breach has already occurred in order to highlight the need for a more mature defense. It provides holistic planning strategies that IT pros should consider implementing when architecting a credential theft defense. These strategies, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.
  • Supported Operating Systems

    Windows 2000 Server, Windows 7, Windows 8, Windows Server 2003, Windows Server 2008, Windows Server 2012, Windows Vista, Windows XP

    Any supported Operating System
  • Download the PDF.
Follow Microsoft