5 Active Directory Security Settings Attackers Leverage

Logo
Presented by

Derek Melber, Chief Technology and Security Strategist

About this talk

Everyone knows Active Directory. Not only is it a seasoned IAM, nearly every organization in the world uses it. That said, there are many built-in configurations and processes that “just work” without the need for any manual configurations. Many administrators are not aware these exist. Surprise: the attacker does and leverages them to move laterally and gain privileges. In this webinar you will learn: • How an attacker can leverage the SDProp process • Which service account configurations attackers look for • How an old Unix attribute can cause an immediate privilege elevation • How a migration-related attribute can allow domain admin privileges • What details you need to verify for your trusts Looking for concrete actions to fortify your organization's security today? Start watching.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (115)
Subscribers (16485)
Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.