In the Default Policy page, activate the default Protect against credentials theft and lateral movement policy. Protect the KeePass configuration file from modification by applications defined in the predefined Allow policy.Ĭreate an advanced application policy to protect your environment from a potential KeePass threat.įor details, see Create a KeePass protection policy. ![]() Protect the KeePass password database stored locally on the endpoint computer.Īctivate the default privilege threat protection policy and set the built-in KeePass rule.įor details, see Activate the KeePass protection rule. It comprises the following two major tasks: This topic describes how to configure your EPM deployment to protect your environment from this potential threat. For details about this rule, see KeePass - Password Manager. This potential threat is effective on KeePass 2.53.ĮPM uses a built-in credential protection rule to detect and block attacks against KeePass and mitigate potentially suspicious activities. ![]() OverviewĪ potential KeePass Password Manager threat enables attackers to leak usernames and passwords from the KeePass Password Manager, without administrative rights or the KeePass master password. This topic describes how EPM addresses exploitation of a potential KeePass threat by attackers. Potential KeePass Password Manager threat
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |