InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

5 Active Directory Security Settings Attackers Leverage

Presented by

Derek Melber, Chief Technology and Security Strategist

About this talk

Everyone knows Active Directory. Not only is it a seasoned IAM, nearly every organization in the world uses it. That said, there are many built-in configurations and processes that “just work” without the need for any manual configurations. Many administrators are not aware these exist. Surprise: the attacker does and leverages them to move laterally and gain privileges. In this webinar you will learn: • How an attacker can leverage the SDProp process • Which service account configurations attackers look for • How an old Unix attribute can cause an immediate privilege elevation • How a migration-related attribute can allow domain admin privileges • What details you need to verify for your trusts Looking for concrete actions to fortify your organization's security today? Start watching.
Tenable, Inc.

Tenable, Inc.

17751 subscribers146 talks
Industry-expert insights on overcoming critical security challenges
Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.
Related topics