© Vasantha Lakshmi 2019
V. LakshmiBeginning Security with Microsoft Technologieshttps://doi.org/10.1007/978-1-4842-4853-9_4

4. Identity Protection

Vasantha Lakshmi1 
(1)
Bangalore, India
 

When attackers have managed to compromise a device with a phishing email and user interaction or any other attack vector, they will then look for a privileged account. If they manage to elevate their user privileges, they will be at liberty to traverse an organization’s network and further execute remote scripts and compromise systems and servers. They will continue to laterally move until they finally reach the domain controllers and achieve domain dominance. Our goal here is to thwart these attacks by providing identity protection.

In this chapter, we will learn ...

Get Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.