TWC: Pass-the-Hash and Credential Theft Mitigation Architectures
Play TWC: Pass-the-Hash and Credential Theft Mitigation Architectures
Trying to defend against pass the hash (PtH) attacks on your Active Directory? Worried it’s hard to implement or may make AD Admin work difficult? Come learn about the architectural approaches used by Microsoft Cybersecurity Services team to help our customers defend against credential theft attacks like pass the hash. We share how we use a tiered trust model, how we establish known-good administrative hosts, leverage an administrative forest for additional assurance, integrate the new Windows credential theft mitigation features, and how we focus on administrator usability to enhance security.