Submitting forms on the support site are temporary unavailable for schedule maintenance. If you need immediate assistance please contact technical support. We apologize for the inconvenience.
In this video, the presenter demonstrates how to minimize the impact of attacks based on PowerShell scripts, specifically pass the hash attacks. They set up alerts and emergency response actions for suspicious PowerShell activity, using a rule that detects potentially dangerous keywords found in modules like PowerSploit. When an attack is detected, the user account is disabled, the user is forcefully logged off, the Windows Remote Management Service is stopped, and emergency auditing is turned on. The video shows examples of successful and unsuccessful attacks, highlighting the effectiveness of the defense measures.
Sign In Required
You need to be signed in and under a current maintenance contract to view premium knowledge articles.
Your Request will be reviewed by our technical reviewer team and, if approved, will be added as a Topic in our Knowledgebase.
Welcome to Quest Support
You can find online support help for Quest *product* on an affiliate support site. Click continue to be directed to the correct support content and assistance for *product*.
The Quest Software Portal no longer supports IE8, 9, & 10 and it is recommended to upgrade your browser to the latest version of Internet Explorer or Chrome.