Forum Discussion

Tali Ash's avatar
Tali Ash
Icon for Microsoft rankMicrosoft
Jan 22, 2020

Successfully investigate brute force and account enumeration attacks made over NTLM protocol

Security research shows most successful enumeration and brute force attacks use either NTLM or Kerberos authentication protocols for entry. In fact, they’re the most popular discovery-phase attacks Azure ATP observed in the past 12 months.

 

To understand Why does account enumeration matter?, What is NTLM and how does it work? and How does Azure ATP provide visibility into NTLM authentications? read our new blog.

 

 

No RepliesBe the first to reply

Resources