Securing Active Directory - Proactively Detecting Attacks and Attack Pathways

Active Directory is seasoned and well known. Unfortunately, the security set at install 15 years ago has not been checked or fixed. However, the attackers are using these attack pathways to move laterally and gain privileged access in AD.

In order to fix these misconfigurations, today and tomorrow, a different tactic is required! The fact is that misconfigurations and privileged attacks can bypass your event logs, SIEM, and AD monitoring solution.

In this webinar you will discover:

  • Why attackers want to attack Active Directory
  • Key misconfigurations that attackers leverage to gain privileged access
  • DCShadow and DCSync attacks that bypass event logs
  • How you can uncover misconfigurations that are currently in your AD

More about the speaker:

Sponsored Content

Read the Best Personal and Business Tech without Ads

Staying updated on what is happening in the technology sector is important to your career and your personal life but ads can make reading news, distracting. With Thurrott Premium, you can enjoy the best coverage in tech without the annoying ads.

Derek Melber, Technical Director, North America, Alsid
Derek is the Technical Director for North America at Alsid. Derek is also a 15 time MVP, in both Active Directory and Group Policy. As a prolific speaker and educator, Derek goes to over 20 countries every year, helping organizations and administrators better understand Active Directory, Group Policy, security, and their overall network infrastructure. Derek is able to communicate complex and detailed information in an easy to understand manner, giving guidance on how to be more efficient and improve security in every organization.

Sponsored by  {alsid}

Download this eBook!

External Sharing and Guest User Access in Microsoft 365 and Teams

his eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure. The eBook will also outline some of the major decision points across four general-purpose guest access policy scenarios for how an organization can set this up with standard licensing.

Download Now

Sponsored By