ITDR
Viewing Password Analysis Details
The Details page provides details on password weaknesses and attributes for the privileged and non-privileged accounts in an AD domain. Make sure to enable attribute collection for ITDR to collect AD user account attributes.
To view password analysis details:
- Go to ITDR > Dashboard > Password Analysis.
- Click the Details tab.
Select an AD domain to view the following password details for that particular domain:
- Sam Account Name: The username of the AD user account.
- User Principal Name: The AD user account username and domain in an email address format.
- Password Last Set: The date and time the password was last changed.
- Is Privileged Account: Indicates if the AD user account is privileged or not. You can select Yes or No from the drop-down menu to filter the accounts. A green check mark indicates a privileged account, and a red X indicates a non-privileged account.
- Password Weakness: View passwords based on the following weaknesses:
- Crackable: Passwords that can be easily cracked.
- Leaked: Passwords found in publicly exposed databases.
- Weak Password List: Assess the exposure risks based on the following options:
- Crackable Passwords: Passwords that can be easily guessed or cracked using brute force or dictionary attacks.
- Custom Keywords Dictionary: Passwords that match a predefined list of organization-specific weak keywords.
- Have I Been Pwned: Passwords that have appeared in publicly known data breaches.
- Have I Been Pwned (Top 1 Million): Passwords that are most frequently used and exposed from breached databases.
- Keyboard Walks: Passwords created using predictable keyboard patterns (e.g., qwerty, 123456, etc.).
- Leaked Dictionaries: Passwords found in various leaked credential databases available online.
