<

Watch [Webinar] Is Your Active Directory as Secure as You Think?

Posted on
3,760 Points
260 Views
5 Endorsements
Last Modified:
Experience Level: Intermediate
1:05:31
Experts Exchange
We solve the world's technology problems through collaboration and learning.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks is to conduct regular penetration tests. However, most organizations don’t have the resources for this, and simply assume their environment is secure enough.

Many experts, like Ascent Solutions and Skyport Systems, know that “secure enough” isn’t really enough and have taken strides to identify the attack vectors and establish best practice mitigation guidance.

Howard Friedman from Ascent Solutions, Russell Rice of Skyport Systems, and Gene Richardson from Experts Exchange hosted a webinar to showcase:

  • How to gain confidence that your environment will survive a penetration test and be safeguarded against an actual attack
  • The threat model for Microsoft Active Directory domain controllers and its importance
  • Common attack vectors and best practice security techniques
  • How to comply with advanced guidance and mitigate many attack vectors

You may not of been able to ask your question during the live webinar, but you can keep the conversation going! Ask your question now!
5
0 Comments
In this article, I will show you how delegation of control for Bitlocker recovery passwords in Active Directory is supposed to work using the common wizard, and why I think that you should do it differently.
Natural disasters, technical faults, human error—these are just a few factors that leave your IT systems vulnerable to failure. To ensure incidents like these don’t catch you off guard or put your team offline, emergency planning is a must.
Other videos by this author
  1. Adjusting on the Fly(1:37)
  2. Getting Organized (I)(6:40)
  3. Case Study(0:37)

Keep in touch with Experts Exchange

Tech news and trends delivered to your inbox every month