About password analysis settings

Article:HOWTO76905  |  Created: 2012-05-07  |  Updated: 2012-05-08  |  Article URL http://www.symantec.com/docs/HOWTO76905
Article Type
How To


Subject


About password analysis settings

The bv-Control for Windows Password Analysis Settings Wizard lets you configure your bv-Control for Windows Password Analysis Settings. You click Next to begin the wizard.

Windows stores passwords in a "hashed" format. When data is hashed, it is encrypted using a nonreversible encryption algorithm. It is not possible to return the information to a form that you can read or understand. It is possible to unhash text and compare that to the hashed text. If the newly hashed text matches the stored hashed password, then the text that bv-Control for Windows generates must match the original unhashed form of the password.

The Password Analysis Settings Wizard lets you configure how bv-Control for Windows retrieves the hashed passwords from domains and computers. The wizard also lets you configure how Password Analysis is performed.

The password data is encrypted while in transit. When the Query Engine uses the password data for analysis, the password data remains hashed. Humans cannot read the hashed information. The information is never written to a file on the disk. On completion of analysis, the Query Engine automatically writes a string of zeros (0)to the memory that stores the hashed password data.

When you do Password Analysis, bv-Control for Windows connects to the target domain or computer and retrieves the hashed passwords.

For each user in the scope of a Password Analysis query, bv-Control for Windows lets you check for the following situations:

  • The password is blank.

  • The password is the user name.

  • The password is in one or more files that you specify.


Legacy ID



v72061333_v74603629


Article URL http://www.symantec.com/docs/HOWTO76905


Terms of use for this information are found in Legal Notices