Whether credentials are exposed to potential theft on the target (remote) computer depends primarily on the windows logon type used by the connection method. In a remote administration scenario, credentials are always exposed on the source computer so a trustworthy privileged access workstation (PAW) is always recommended for sensitive or high impact accounts. This reference information is provided to help identify the risk of credential exposure associated with different administrative tools for remote administration.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |