- Home
- /
- Mitigations
Account Use Policies
Account Use Policies help mitigate unauthorized access by configuring and enforcing rules that govern how and when accounts can be used. These policies include enforcing account lockout mechanisms, restricting login times, and setting inactivity timeouts.
Active Directory Configuration
Implement robust Active Directory (AD) configurations using group policies to secure user accounts, control access, and minimize the attack surface.
Antivirus/Antimalware
Antivirus/Antimalware solutions utilize signatures, heuristics, and behavioral analysis to detect, block, and remediate malicious software, including viruses, trojans, ransomware, and spyware.
Application Developer Guidance
Application Developer Guidance focuses on providing developers with the knowledge, tools, and best practices needed to write secure code, reduce vulnerabilities, and implement secure design principles.
Application Isolation and Sandboxing
Application Isolation and Sandboxing refers to the technique of restricting the execution of code to a controlled and isolated environment to prevent potentially malicious code from affecting the rest of the system or network.
Audit
Auditing is the process of recording activity and systematically reviewing and analyzing the activity and system configurations to detect anomalies and identify potential threats or weaknesses.
Behavior Prevention on Endpoint
Behavior Prevention on Endpoint refers to the use of technologies and strategies to detect and block potentially malicious activities by analyzing the behavior of processes, files, API calls, and other endpoint events.
Boot Integrity
Boot Integrity ensures that a system starts securely by verifying the integrity of its boot process, operating system, and associated components to prevent tampering.
Code Signing
Code Signing is a security process that ensures the authenticity and integrity of software by digitally signing executables, scripts, and other code artifacts to prevent untrusted or malicious code from executing.
Credential Access Protection
Credential Access Protection focuses on implementing measures to prevent adversaries from obtaining credentials, such as passwords, hashes, tokens, or keys, that could be used for unauthorized access.

















































