The bv-Control for Windows Password Analysis Settings Wizard lets you configure your bv-Control for Windows Password Analysis Settings. You click Next to begin the wizard.
Windows stores passwords in a "hashed" format. When data is hashed, it is encrypted using a nonreversible encryption algorithm. It is not possible to return the information to a form that you can read or understand. It is possible to unhash text and compare that to the hashed text. If the newly hashed text matches the stored hashed password, then the text that bv-Control for Windows generates must match the original unhashed form of the password.
The Password Analysis Settings Wizard lets you configure how bv-Control for Windows retrieves the hashed passwords from domains and computers. The wizard also lets you configure how Password Analysis is performed.
The password data is encrypted while in transit. When the Query Engine uses the password data for analysis, the password data remains hashed. Humans cannot read the hashed information. The information is never written to a file on the disk. On completion of analysis, the Query Engine automatically writes a string of zeros (0)to the memory that stores the hashed password data.
When you do Password Analysis, bv-Control for Windows connects to the target domain or computer and retrieves the hashed passwords.
For each user in the scope of a Password Analysis query, bv-Control for Windows lets you check for the following situations:
The password is blank.
The password is the user name.
The password is in one or more files that you specify.
Imported Document ID: HOWTO76905
Subscribing will provide email updates when this Article is updated. Login is required to Subscribe