Submitting forms on the support site are temporary unavailable for schedule maintenance. If you need immediate assistance please contact technical support. We apologize for the inconvenience.
In this video, the presenter demonstrates how to minimize the impact of attacks based on PowerShell scripts, specifically pass the hash attacks. They set up alerts and emergency response actions for suspicious PowerShell activity, using a rule that detects potentially dangerous keywords found in modules like PowerSploit. When an attack is detected, the user account is disabled, the user is forcefully logged off, the Windows Remote Management Service is stopped, and emergency auditing is turned on. The video shows examples of successful and unsuccessful attacks, highlighting the effectiveness of the defense measures.
로그인 필요
프리미엄 기술 문서를 보려면 로그인해야 하며 최신 유지 관리 계약이 있어야 합니다.