Limit Workstation-to-Workstation Communication

Abstract: Compromise of just one user workstation can lead to the loss of an entire network. All it takes is an unsuspecting user to click on a malicious email attachment or visit an infected website for an adversary to obtain access to a single workstation.

Date Published:

Last Reviewed: 26 May 2016

Identifier: MIT-013FS-2013

Creator: Vulnerability Solutions

Dissemination Control: N/A

Length: 2 page(s)

Format: pdf

Type: Reference/Overview; Factsheet

Tags: Communication; Pass-the-Hash - PtH; Mitigations; Top Mitigation Strategies