Active Directory is seasoned and well known. Unfortunately, the security set at install 15 years ago has not been checked or fixed. However, the attackers are using these attack pathways to move laterally and gain privileged access in AD.
In order to fix these misconfigurations, today and tomorrow, a different tactic is required! The fact is that misconfigurations and privileged attacks can bypass your event logs, SIEM, and AD monitoring solution.
In this webinar you will discover:
- Why attackers want to attack Active Directory
- Key misconfigurations that attackers leverage to gain privileged access
- DCShadow and DCSync attacks that bypass event logs
- How you can uncover misconfigurations that are currently in your AD
Read the Best Personal and Business Tech without Ads
Staying updated on what is happening in the technology sector is important to your career and your personal life but ads can make reading news, distracting. With Thurrott Premium, you can enjoy the best coverage in tech without the annoying ads.
Technical Director for North America, Alsid and 15 time MVP, in both Active Directory and Group Policy.
Executive Editor of Petri.com and Thurrott.com