This document discusses Kerberos authentication and how the Skeleton Key attack works. It explains that the attack works by patching lsass.exe memory to reroute decryption and initialization functions, allowing extraction of encryption keys. It then notes that Microsoft Advanced Threat Analytics can help detect such attacks by learning entity behaviors, profiling activities, and identifying suspicious connections in the interaction graph.