{"id":7265,"date":"2016-05-26T09:00:24","date_gmt":"2016-05-26T16:00:24","guid":{"rendered":"https:\/\/blogs.technet.microsoft.com\/windowsserver\/?p=7265"},"modified":"2024-03-07T17:31:25","modified_gmt":"2024-03-08T01:31:25","slug":"securing-privileged-access-preventing-and-detecting-attacks","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/","title":{"rendered":"Securing privileged access: Preventing and detecting attacks"},"content":{"rendered":"<p><em>This post was authored by Nir Ben Zvi, Principal Program Manager, Windows Server.<\/em><\/p>\n<h2>Introduction: Why is it important to secure privileged access?<\/h2>\n<p>The threat environment has continued to reinforce that identity is a primary security boundary. When examining major cyber-attacks that occurred over the last several years, one can notice a recurring common inflection point: Attackers focus on taking control over the identity systems. No matter what environment or operating systems you are using, your success in protecting and detecting attacks depends on how well you secure and monitor your privileged identities.<\/p>\n<p>In this blog we will cover an actionable recommendation on how to better protect privileged identities. It follows our <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/mt631194.aspx\">published plan<\/a> for securing privileged access that covers heterogeneous environments and operating systems and helps you secure your current environment. We will also highlight a few technologies and solutions from Microsoft that help change the game when it comes to protecting privileged identities.<\/p>\n<p>A common attack timeline includes three main phases:<\/p>\n<p>1.\u00a0\u00a0\u00a0 <strong><strong>Initiate<\/strong><\/strong>: Research and preparation, resulting in the attacker getting an initial foothold through spear-phishing or unpatched edge devices. The attacker will use commonly available information from Google, Facebook, LinkedIn and the like to create an attack that provides an initial foothold into your organization (typically a compromised workstation).<br \/>\n2.\u00a0\u00a0\u00a0 <strong>Escalate<\/strong>: The attacker is inside your environment and increasing their access using credential theft tools and techniques. A demonstration of the most common insider credential theft attacks are shown in <a href=\"https:\/\/www.youtube.com\/watch?v=dq1FfSTrqwo&amp;index=6&amp;list=PL8nfc9haGeb5IZGM8HvmRozetHRpBDKSw\">this video<\/a> and additional details can be found at <a href=\"https:\/\/www.microsoft.com\/pth\">Pass-the-Hash and Pass-the-Ticket<\/a>.<br \/>\n3.\u00a0\u00a0\u00a0 <strong>Execute Mission<\/strong>: The attacker\u2019s mission varies from silent undetected data exfiltration over many months to Ransomware that shows itself boldly by compromising critical resources and business operations.<\/p>\n<p><a href=\"https:\/\/cloudblogs.microsoft.com\/wp-content\/uploads\/2016\/05\/Common-Attack-Timeline2_thumb.png\"><img loading=\"lazy\" decoding=\"async\" style=\"border: 0px currentcolor\" title=\"Common Attack Timeline\" src=\"https:\/\/cloudblogs.microsoft.com\/wp-content\/uploads\/2016\/05\/Common-Attack-Timeline2_thumb.png\" alt=\"Common Attack Timeline\" width=\"640\" height=\"189\" border=\"0\"><\/a><\/p>\n<h2>So, what can you do to better protect your organization?<\/h2>\n<p>Focus on Phase #2 where the attacker has an initial foothold in your environment. This is when you are in the best position to detect and respond to the attack. By better protecting your privileged identities, you can force the attacker to take steps that will be easier to detect and most importantly, you will shift the attack timeline from 24-48 hours to weeks or longer time periods, thereby making it achievable for you to detect, isolate and respond to the attack and potentially avoid Phase #3 altogether.<\/p>\n<p>Blocking Phase #1 (research and preparation) is extremely difficult and requires an inordinate amount of procedures, discipline and training that is likely only practical for government agencies with an organizational culture of secrecy.<\/p>\n<p>Phase #3 (attack ongoing with attacker in control of the keys to the kingdom) is where you would need to work with specialized incident response teams to root the attackers out your environment. This is very costly and usually interrupts your ongoing business.<\/p>\n<h2>A few spotlight technologies and solutions for securing privileged access<\/h2>\n<p>Before we get into the plan on how to secure your privileged access, I\u2019d like to call out a few solutions and technologies that we believe are game changers in helping protect against and detect attacks on your identity systems.<\/p>\n<h4>Protecting privileged identities<\/h4>\n<p><a href=\"https:\/\/technet.microsoft.com\/itpro\/windows\/keep-secure\/credential-guard\">Credential Guard<\/a> in Windows 10 and Windows Server 2016 prevents the attacker from stealing a copy of credentials that can be used to attack other systems.<\/p>\n<p><a href=\"http:\/\/aka.ms\/pam\">Just In Time Administration<\/a> enables you to reduce the risk of attacks targeting users with perpetual administration rights, with monitoring of privileged groups and limiting the time that people have administrator privileges.<\/p>\n<p><a href=\"http:\/\/aka.ms\/jea\">Just Enough Administration<\/a> allows you to remove admin privileges from individuals by allowing them to do a defined set of tasks &#8220;as-Admin.&#8221;<\/p>\n<p><a href=\"http:\/\/aka.ms\/LAPS\">Local Administrator Password Solution<\/a> prevents lateral movement among workstations and servers using the local Admin account by creating a unique random password on each workstation and server in your Active Directory environment.<\/p>\n<h4>Detecting ongoing attacks<\/h4>\n<p><a href=\"https:\/\/www.microsoft.com\/ata\">Microsoft Advanced Threat Analytics (ATA)<\/a> provides visibility into active credential theft and identity attacks so that you can respond quickly.<\/p>\n<p><a href=\"https:\/\/technet.microsoft.com\/itpro\/windows\/whats-new\/security-auditing\">Enhanced security auditing<\/a> in Windows 10 and Windows Server 2016 helps your security experts detect and investigate threats in your environment<\/p>\n<h2>Help me get started: Secure privileged access in three phases<\/h2>\n<p>With all the different technologies and options, it is sometimes hard to determine what to do first and what would give you the base return on investments for your efforts.<\/p>\n<p>To help, we have worked with internal Microsoft teams and the Microsoft Cybersecurity consulting services to recommend a three stage deployment that will help considerably to improve your stance in securing your privileged identities.<\/p>\n<p>The goal of this roadmap is to help you rapidly secure your heterogeneous environment with various operating systems and identity repositories.<\/p>\n<p>We highlight available solutions from Microsoft in several cases, but you can also use capabilities from other vendors to help you achieve the overall goal. Regardless of which products are chosen, you should follow the complete guidance as your identity systems are prized by attackers and many groups will be able work around any one defense, such as detection or privileged access management.<\/p>\n<p>You can find the full plan and relevant links <a href=\"https:\/\/aka.ms\/SPAroadmap\">here<\/a>.<\/p>\n<h4>Phase I: First 2-4 weeks<\/h4>\n<p>This phase focuses on immediate actions you can take to block theft of privileged credentials. It includes basic actions that you can take to protect your domain administrators (which are the most critical identity) and also helps you create a unique local administrator for each workstation and server in your domain, so that if one is compromised it does not lead to the immediate compromise of all others.<\/p>\n<p><a href=\"https:\/\/cloudblogs.microsoft.com\/wp-content\/uploads\/2016\/05\/Phase-I_thumb.jpg\"><img loading=\"lazy\" decoding=\"async\" style=\"border: 0px currentcolor\" title=\"Phase I\" src=\"https:\/\/cloudblogs.microsoft.com\/wp-content\/uploads\/2016\/05\/Phase-I_thumb.jpg\" alt=\"Phase I\" width=\"640\" height=\"275\" border=\"0\"><\/a><\/p>\n<h4>Phase II: 1-3 months<\/h4>\n<p>In this phase, you are adding the major protections to slow down an attacker and adding detection capabilities that will help detect and respond to an ongoing attack. This phase also encourages you to look more closely at the attack surface of your identity system, exploring and verifying every component that has the capability to take over your identity. Bringing in systems like Just In Time Administration helps you to automatically add two factor authentication for your administrators without needing to revamp your entire environment.<\/p>\n<p><a href=\"https:\/\/cloudblogs.microsoft.com\/wp-content\/uploads\/2016\/05\/Phase-II_thumb.jpg\"><img loading=\"lazy\" decoding=\"async\" style=\"border: 0px currentcolor\" title=\"Phase II\" src=\"https:\/\/cloudblogs.microsoft.com\/wp-content\/uploads\/2016\/05\/Phase-II_thumb.jpg\" alt=\"Phase II\" width=\"640\" height=\"291\" border=\"0\"><\/a><\/p>\n<h4>Phase III: 6+ months<\/h4>\n<p>The last phase introduces secure procedures and brings the latest technologies to help you maintain a healthy and secure state for your privilege identity.<\/p>\n<p><a href=\"https:\/\/cloudblogs.microsoft.com\/wp-content\/uploads\/2016\/05\/Phase-III_thumb.jpg\"><img loading=\"lazy\" decoding=\"async\" style=\"border: 0px currentcolor\" title=\"Phase III\" src=\"https:\/\/cloudblogs.microsoft.com\/wp-content\/uploads\/2016\/05\/Phase-III_thumb.jpg\" alt=\"Phase III\" width=\"640\" height=\"298\" border=\"0\"><\/a><\/p>\n<h4>Attack vectors and mitigations<\/h4>\n<p>Finally, to be able to measure your progress, the image below shows the various attack vectors and mitigations. This is by no means an accurate and measurable representation, but merely a way to visualize where the different phases help your security stance for privileged identities.<\/p>\n<p><a href=\"https:\/\/cloudblogs.microsoft.com\/wp-content\/uploads\/2016\/05\/Attack-Vendors-and-Mitigations_thumb.png\"><img loading=\"lazy\" decoding=\"async\" style=\"border: 0px currentcolor\" title=\"Attack Vendors and Mitigations\" src=\"https:\/\/cloudblogs.microsoft.com\/wp-content\/uploads\/2016\/05\/Attack-Vendors-and-Mitigations_thumb.png\" alt=\"Attack Vendors and Mitigations\" width=\"640\" height=\"301\" border=\"0\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This post was authored by Nir Ben Zvi, Principal Program Manager, Windows Server. Introduction: Why is it important to secure privileged access? The threat environment has continued to reinforce that identity is a primary security boundary.<\/p>\n","protected":false},"author":685,"featured_media":20684,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msxcm_post_with_no_image":false,"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"post_tag":[],"product":[],"content-type":[964],"solution":[967],"coauthors":[926],"class_list":["post-7265","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-updates","solution-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing privileged access: Preventing and detecting attacks | Microsoft Windows Server Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing privileged access: Preventing and detecting attacks | Microsoft Windows Server Blog\" \/>\n<meta property=\"og:description\" content=\"This post was authored by Nir Ben Zvi, Principal Program Manager, Windows Server. Introduction: Why is it important to secure privileged access? The threat environment has continued to reinforce that identity is a primary security boundary.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Windows Server Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WindowsServer\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-26T16:00:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-08T01:31:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Developers-working-at-desk_Julian_04.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Microsoft Windows Server Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@WindowsServer\" \/>\n<meta name=\"twitter:site\" content=\"@WindowsServer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Windows Server Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/author\/microsoft-windows-server-team\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Windows Server Team\"}],\"headline\":\"Securing privileged access: Preventing and detecting attacks\",\"datePublished\":\"2016-05-26T16:00:24+00:00\",\"dateModified\":\"2024-03-08T01:31:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/\"},\"wordCount\":1069,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Developers-working-at-desk_Julian_04.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/\",\"name\":\"Securing privileged access: Preventing and detecting attacks | Microsoft Windows Server Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Developers-working-at-desk_Julian_04.jpg\",\"datePublished\":\"2016-05-26T16:00:24+00:00\",\"dateModified\":\"2024-03-08T01:31:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Developers-working-at-desk_Julian_04.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Developers-working-at-desk_Julian_04.jpg\",\"width\":1170,\"height\":640,\"caption\":\"a man and a woman standing in front of a building\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing privileged access: Preventing and detecting attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/\",\"name\":\"Microsoft Windows Server Blog\",\"description\":\"Your Guide to the Latest Windows Server Product Information\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#organization\",\"name\":\"Microsoft Windows Server Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":1,\"height\":1,\"caption\":\"Microsoft Windows Server Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WindowsServer\",\"https:\/\/x.com\/WindowsServer\",\"https:\/\/www.linkedin.com\/showcase\/microsoft-cloud-platform\/\",\"https:\/\/www.youtube.com\/user\/MSCloudOS\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing privileged access: Preventing and detecting attacks | Microsoft Windows Server Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Securing privileged access: Preventing and detecting attacks | Microsoft Windows Server Blog","og_description":"This post was authored by Nir Ben Zvi, Principal Program Manager, Windows Server. Introduction: Why is it important to secure privileged access? The threat environment has continued to reinforce that identity is a primary security boundary.","og_url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/","og_site_name":"Microsoft Windows Server Blog","article_publisher":"https:\/\/www.facebook.com\/WindowsServer","article_published_time":"2016-05-26T16:00:24+00:00","article_modified_time":"2024-03-08T01:31:25+00:00","og_image":[{"width":1170,"height":640,"url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Developers-working-at-desk_Julian_04.jpg","type":"image\/jpeg"}],"author":"Microsoft Windows Server Team","twitter_card":"summary_large_image","twitter_creator":"@WindowsServer","twitter_site":"@WindowsServer","twitter_misc":{"Written by":"Microsoft Windows Server Team","Est. reading time":"4 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/author\/microsoft-windows-server-team\/","@type":"Person","@name":"Microsoft Windows Server Team"}],"headline":"Securing privileged access: Preventing and detecting attacks","datePublished":"2016-05-26T16:00:24+00:00","dateModified":"2024-03-08T01:31:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/"},"wordCount":1069,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Developers-working-at-desk_Julian_04.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/","url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/","name":"Securing privileged access: Preventing and detecting attacks | Microsoft Windows Server Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Developers-working-at-desk_Julian_04.jpg","datePublished":"2016-05-26T16:00:24+00:00","dateModified":"2024-03-08T01:31:25+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Developers-working-at-desk_Julian_04.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Developers-working-at-desk_Julian_04.jpg","width":1170,"height":640,"caption":"a man and a woman standing in front of a building"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2016\/05\/26\/securing-privileged-access-preventing-and-detecting-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing privileged access: Preventing and detecting attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/","name":"Microsoft Windows Server Blog","description":"Your Guide to the Latest Windows Server Product Information","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#organization","name":"Microsoft Windows Server Blog","url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":1,"height":1,"caption":"Microsoft Windows Server Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WindowsServer","https:\/\/x.com\/WindowsServer","https:\/\/www.linkedin.com\/showcase\/microsoft-cloud-platform\/","https:\/\/www.youtube.com\/user\/MSCloudOS"]}]}},"word_count":1062,"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Windows Server Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/posts\/7265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/users\/685"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/comments?post=7265"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/posts\/7265\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/media\/20684"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/media?parent=7265"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/post_tag?post=7265"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/product?post=7265"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/content-type?post=7265"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/solution?post=7265"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/coauthors?post=7265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}