© Vasantha Lakshmi 2019
Vasantha LakshmiBeginning Security with Microsoft Technologieshttps://doi.org/10.1007/978-1-4842-4853-9_4

4. Identity Protection

Vasantha Lakshmi
Bangalore, India
When attackers have managed to compromise a device with a phishing email and user interaction or any other attack vector, they will then look for a privileged account. If they manage to elevate their user privileges, they will be at liberty to traverse an organization’s network and further execute remote scripts and compromise systems and servers. They will continue to laterally move until they finally reach the domain controllers and achieve domain dominance. Our goal here is to thwart these attacks by providing identity protection.
In this chapter, we will ...

Get Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.