June 2017
Beginner to intermediate
742 pages
18h 29m
English
In the previous sections, you learned about new features and tools introduced by Microsoft to prevent pass-the-hash attacks. These types of attacks are still used by adversaries in identity infrastructure attacks. So, it's important to prevent these attacks whenever and wherever possible. But is this going to secure our identity infrastructures 100%? Software vendors, including Microsoft, release new products, features, security updates, and patches to protect systems, infrastructures, and workloads from various types of threats.
All these companies spend lots of money annually on R&D to protect their software, solutions, and customers from emerging threats. However, we still see ...