Windows stores passwords in a "hashed" format. When data is hashed, it is encrypted using a nonreversible encryption algorithm. It is not possible to return the information to a form that you can read or understand. It is possible to unhash text and compare that to the hashed text. If the newly hashed text matches the stored hashed password, then the text that bv-Control for Windows generates must match the original unhashed form of the password.
The Password Analysis Settings Wizard lets you configure how bv-Control for Windows retrieves the hashed passwords from domains and computers. The wizard also lets you configure how Password Analysis is performed.
The password data is encrypted while in transit. When the Query Engine uses the password data for analysis, the password data remains hashed. Humans cannot read the hashed information. The information is never written to a file on the disk. On completion of analysis, the Query Engine automatically writes a string of zeros (0)to the memory that stores the hashed password data.