Understanding ProxyLogon Vulnerabilities and How to Secure Them