Use these techniques to see if attackers have harvested authentication credentials from your Windows network. Read more