Prevents the app from storing AD creds - will only be stored on the Domain Controller
To extract NTLM hashes, we can either use mimikatz to read the local SAM or extract hashes directly from LSASS memory. Pass-the-Hash Attack
Since there are always Auto locked account is configured in almost all AD setups, so BruteForce attack is useless.
Attack to consider Password Spray attack.