Research Library

The top resource for free research, white papers, reports, case studies, magazines, and eBooks.

Share Your Content with Us
on TradePub.com for readers like you. LEARN MORE
Securing Active Directory - Proactively Detecting Attacks and Attack Pathways
Request Your Free On-Demand Webinar Now:

"Securing Active Directory - Proactively Detecting Attacks and Attack Pathways"
Request

Access the on-demand webinar!

Active Directory is seasoned and well known. Unfortunately, the security set at install 15 years ago has not been checked or fixed. However, the attackers are using these attack pathways to move laterally and gain privileged access in AD.

In order to fix these misconfigurations, today and tomorrow, a different tactic is required! The fact is that misconfigurations and privileged attacks can bypass your event logs, SIEM, and AD monitoring solution.

In this webinar you will discover:

  • Why attackers want to attack Active Directory
  • Key misconfigurations that attackers leverage to gain privileged access
  • DCShadow and DCSync attacks that bypass event logs
  • How you can uncover misconfigurations that are currently in your AD

More about the speaker:

Derek Melber, Technical Director, North America, Alsid
Derek is the Technical Director for North America at Alsid. Derek is also a 15 time MVP, in both Active Directory and Group Policy. As a prolific speaker and educator, Derek goes to over 20 countries every year, helping organizations and administrators better understand Active Directory, Group Policy, security, and their overall network infrastructure. Derek is able to communicate complex and detailed information in an easy to understand manner, giving guidance on how to be more efficient and improve security in every organization.


Offered Free by: Alsid
See All Resources from: Alsid

Request

Recommended for Professionals Like You:

Thank you

This download should complete shortly. If the resource doesn't automatically download, please, click here.

Thank you

This download should complete shortly. If the resource doesn't automatically download, please, click here.