A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies and corporations that rely heavily on it for housing proprietary information as well as internal connections—but that’s not all.
When you take a system such as AD that’s already a focus of cyber terrorist attention and you add a large number of privileged credentials into the system, the risk only grows. Suddenly, the directory becomes porous with innumerable opportunities for invasion.
In a 2016 Cyberthreat Defense Report, it was discovered that only three out of 10 respondents felt confident in their company’s ability to monitor privileged users. This response raises awareness to the needs for secured and limited privileged credentials.
Companies like ManageEngine have seen the damage a high number of credentials can cause within a company, and they’ve set out to teach IT teams and AD technicians how to reduce privileged accounts while protecting the ones that remain.
On April 11th, Derek Melber, technical evangelist for ManageEngine’s ADSolutions team, will be presenting on the topic of tracking and securing credentials in Active Directory.
Join us to learn how to:
- Create a honeypot Administrator account to track attacks
- Ensure the built-in Administrator account is secured
- Monitor activities performed by users that have privileges in Active Directory
- Reduce membership in privileged groups
- Be informed when any privileged group changes membership
- Track changes to service accounts and ensure the highest level of security