© Mike O'Leary 2019
Mike O'LearyCyber Operationshttps://doi.org/10.1007/978-1-4842-4294-0_12

12. Defending the Windows Domain

Mike O’Leary1 
(1)
Towson, MD, USA
 

Introduction

A savvy defender understands that they may not be able to prevent a capable attacker from gaining an initial foothold on their network. On any real network, the collection of potential attack vectors is large, and the attacker only needs to be successful once to get that initial foothold. Even something as simple as a phishing attack can be used to obtain that initial shell.

On the other hand, once the attacker has established a presence in the network, the situation reverses and the defender that is actively searching for the attacker only needs to be successful once to find the ...

Get Cyber Operations: Building, Defending, and Attacking Modern Computer Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.