mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
removed excerpt of credential mitigation guide due to low traffic
This commit is contained in:
parent
421de3f82b
commit
0632c6e3ca
@ -1,58 +0,0 @@
|
|||||||
---
|
|
||||||
title: Windows Credential Theft Mitigation Guide Abstract
|
|
||||||
description: Provides a summary of the Windows credential theft mitigation guide.
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.date: 03/31/2023
|
|
||||||
---
|
|
||||||
|
|
||||||
# Windows Credential Theft Mitigation Guide Abstract
|
|
||||||
|
|
||||||
This article provides a summary of the Windows credential theft mitigation guide, which can be downloaded from the [Microsoft Download Center](https://download.microsoft.com/download/C/1/4/C14579CA-E564-4743-8B51-61C0882662AC/Windows%2010%20credential%20theft%20mitigation%20guide.docx).
|
|
||||||
This guide explains how credential theft attacks occur and the strategies and countermeasures you can implement to mitigate them, following these security stages:
|
|
||||||
|
|
||||||
- Identify high-value assets
|
|
||||||
- Protect against known and unknown threats
|
|
||||||
- Detect pass-the-hash and related attacks
|
|
||||||
- Respond to suspicious activity
|
|
||||||
- Recover from a breach
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Attacks that steal credentials
|
|
||||||
|
|
||||||
Learn about the different types of attacks that are used to steal credentials, and the factors that can place your organization at risk.
|
|
||||||
The types of attacks that are covered include:
|
|
||||||
|
|
||||||
- Pass the hash
|
|
||||||
- Kerberos pass the ticket
|
|
||||||
- Kerberos golden ticket and silver ticket
|
|
||||||
- Key loggers
|
|
||||||
- Shoulder surfing
|
|
||||||
|
|
||||||
## Credential protection strategies
|
|
||||||
|
|
||||||
This part of the guide helps you consider the mindset of the attacker, with prescriptive guidance about how to prioritize high-value accounts and computers.
|
|
||||||
You'll learn how to architect a defense against credential theft:
|
|
||||||
|
|
||||||
- Establish a containment model for account privileges
|
|
||||||
- Harden and restrict administrative hosts
|
|
||||||
- Ensure that security configurations and best practices are implemented
|
|
||||||
|
|
||||||
## Technical countermeasures for credential theft
|
|
||||||
|
|
||||||
Objectives and expected outcomes are covered for each of these countermeasures:
|
|
||||||
|
|
||||||
- Use Windows 10 with Credential Guard
|
|
||||||
- Restrict and protect high-privilege domain accounts
|
|
||||||
- Restrict and protect local accounts with administrative privileges
|
|
||||||
- Restrict inbound network traffic
|
|
||||||
|
|
||||||
Many other countermeasures are also covered, such as using Microsoft Passport and Windows Hello, or multifactor authentication.
|
|
||||||
|
|
||||||
## Detecting credential attacks
|
|
||||||
|
|
||||||
This section covers how to detect the use of stolen credentials and how to collect computer events to help you detect credential theft.
|
|
||||||
|
|
||||||
## Responding to suspicious activity
|
|
||||||
|
|
||||||
Learn Microsoft's recommendations for responding to incidents, including how to recover control of compromised accounts, how to investigate attacks, and how to recover from a breach.
|
|
Loading…
x
Reference in New Issue
Block a user