© Vasantha Lakshmi 2019Vasantha LakshmiBeginning Security with Microsoft Technologieshttps://doi.org/10.1007/978-1-4842-4853-9_4
4. Identity Protection
When attackers have managed to compromise a device with a phishing email and user interaction or any other attack vector, they will then look for a privileged account. If they manage to elevate their user privileges, they will be at liberty to traverse an organization’s network and further execute remote scripts and compromise systems and servers. They will continue to laterally move until they finally reach the domain controllers and achieve domain dominance. Our goal here is to thwart these attacks by providing identity protection.
In this chapter, we will ...