icon-itdr.svg
ITDR

Viewing Password Analysis Details

The Details page provides details on password weaknesses and attributes for the privileged and non-privileged accounts in an AD domain. Make sure to enable attribute collection for ITDR to collect AD user account attributes.

To view password analysis details:

  1. Go to ITDR > Dashboard > Password Analysis.
  2. Click the Details tab.
  3. Select an AD domain to view the following password details for that particular domain:

    • Sam Account Name: The username of the AD user account.
    • User Principal Name: The AD user account username and domain in an email address format.
    • Password Last Set: The date and time the password was last changed.
    • Is Privileged Account: Indicates if the AD user account is privileged or not. You can select Yes or No from the drop-down menu to filter the accounts. A green check mark indicates a privileged account, and a red X indicates a non-privileged account.
    • Password Weakness: View passwords based on the following weaknesses:
      • Crackable: Passwords that can be easily cracked.
      • Leaked: Passwords found in publicly exposed databases.
    • Weak Password List: Assess the exposure risks based on the following options:
      • Crackable Passwords: Passwords that can be easily guessed or cracked using brute force or dictionary attacks.
      • Custom Keywords Dictionary: Passwords that match a predefined list of organization-specific weak keywords.
      • Have I Been Pwned: Passwords that have appeared in publicly known data breaches.
      • Have I Been Pwned (Top 1 Million): Passwords that are most frequently used and exposed from breached databases.
      • Keyboard Walks: Passwords created using predictable keyboard patterns (e.g., qwerty, 123456, etc.).
      • Leaked Dictionaries: Passwords found in various leaked credential databases available online.

View Password Analysis Details
Related Articles
About Password AnalysisViewing Password Analysis Details