Abstract
When attackers have managed to compromise a device through a phishing e-mail and user interaction or any other attack vector, they will then start to look for a privileged account. If they manage to elevate their user privileges, they will be at liberty to traverse an organization’s network and further execute remote scripts and compromise systems and servers. They will continue to laterally move until they finally reach the domain controllers and achieve domain dominance. Our goal here is to thwart these attacks by providing identity protection.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Vasantha Lakshmi
About this chapter
Cite this chapter
Lakshmi, V. (2019). Identity Protection. In: Beginning Security with Microsoft Technologies. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4853-9_4
Download citation
DOI: https://doi.org/10.1007/978-1-4842-4853-9_4
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-4852-2
Online ISBN: 978-1-4842-4853-9
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)