Directory and Resource Administrator 7.5 Trial
By: SUSE View more from SUSE >>
Download this next:
How Venafi, a CyberArk company Zero Touch PKI Frees Healthcare Company from Mounting Costs & Risk
By: CyberArk
Type: Case Study
A healthcare company found themselves without a PKI lead administrator to manage their increasingly rickety collection of Windows Active Directory Certificate Services.
The previous PKI lead had warned that properly patching and updating the Windows PKIs was too much work for him to manage. These internal CAs proved to be a constant drain on the IT team’s resources because no one had any clue how they were originally set up years earlier. In addition, everyone who needed machine identities from these CAs faced expensive delays.
See how they found a solution with zero touch PKI - allowing instant scalability, lightning-fast deployment, better security and efficiency with lower costs.
These are also closely related to: "Directory and Resource Administrator 7.5 Trial"
-
Zarządzanie politykami konfiguracji w środowiskach Linux, Windows i Mac
By:
Type: Talk
Zapraszamy na webinar w jęz. polskim na temat centralnego, zunifikowanego zarządzania politykami konfiguracji w środowiskach Linux, Windows, Mac zarówno on-premise jak i w chmurze. Orkiestracja polityk, ich konsolidacja i normalizacja to wymóg bezpieczeństwa w przypadku środowisk heterogenicznych obsługiwanych lokalnie oraz w chmurze. Na spotkaniu powiemy, jak zapewnić zautomatyzowane, scentralizowane i spójne zarządzanie i egzekwowanie polityk dla szerokiej gamy komputerów z systemami Linux, Windows i Mac. Na naszym webinarze zobaczysz, jak za pomocą Micro Focus Universal Policy Administrator wykorzystać posiadaną już infrastrukturę z Microsoft Active Directory oraz Group Policy dla Windows i rozszerzyć ją na systemy Linux do uwierzytelniania użytkowników w Microsoft Active Directory, a także jak zabezpieczać konfigurację serwerów Linux poprzez łatwe zdefiniowane zasad za pomocą graficznych narzędzi. Micro Focus Universal Policy Administrator służy do tworzenia i kontrolowania z jednej konsoli polityk (Group Policy) w przypadku korzystania z wielu środowisk jak Active Directory, Azure, Linux czy Mac. Umożliwia wersjonowanie, śledzenie zmian i wprowadzeniu procesów akceptacji. W pokazach na żywo będą wykorzystywane systemy Linux firmy SUSE, która jest partnerem wydarzenia.
-
Assessing the Security of Your Active Directory: Privileged Account Risks and Controls
By:
Type: Replay
Note: This is a replay of the webinar with Randy Franklin Smith. If privileged accounts are the most protected, why do they keep appearing in exploits, like the recent Snowflake/Ticketmaster incident? The reasons are two-fold: - Privileged accounts are prime targets. - Many organizations don’t follow best practices. In this session on “Assessing the Security of Your Active Directory,” цу]we’ll focus on privileged accounts to help you improve controls and reduce risks. We’ll cover: Identifying privileged accounts beyond just the Administrators group, including indirect vectors like AD object permissions and Windows system rights. Using Windows Security Logs to track privileged account logons. Limiting privileged account use to same-security-tier endpoints is crucial, as an admin account is only as safe as the endpoint it’s used on. For instance, some Snowflake contractors reportedly used personal computers with infostealer malware. Implementing security tiers for accounts, servers, and endpoints to prevent privileged accounts from being exposed to less secure tiers. Addressing specific risks and controls for privileged accounts in Active Directory. Our sponsor, Netwrix, offers tools perfect for this topic. Netwrix Auditor can: - Report on privileged accounts in Active Directory. - Monitor logons and alert to suspicious activity. - Generate audit trails and reports for privileged activities. - Help prepare for audits and ensure compliance. Jennifer Taufan, Solutions Engineer at Netwrix, will demonstrate these capabilities.
Find more content like what you just read:
-
Why IGA Alone May Not Be Enough
By:
Type: Video
The webinar delved into the multifaceted domain of Identity Security and Management, particularly emphasizing the limitations of Identity Governance and Administration (IGA) when acting in isolation. A core subject was the intricacy of managing identity access across disparate systems and the need for integrated solutions that consider operational realities, such as Active Directory and SAP environments, which possess intricate entitlement models that IGA cannot cover completely. Organizations are confronted with unprecedented challenges in managing and securing identities across hybrid environments due to the growing complexity of the digital landscape. While Identity Governance and Administration (IGA) solutions provide a foundation, the increasing complexity of identity ecosystems demands a more comprehensive approach to maintain visibility, security and control. Modern identity management requires solutions that can bridge the gap between IGA and directory management. Advanced tools can consolidate visibility across hybrid environments, provide fine-grained control, and enhance delegation capabilities. These solutions complement IGA by addressing the limitations of native directory management and improving overall security posture.
-
Why IGA Alone May Not Be Enough
By:
Type: Replay
The webinar delved into the multifaceted domain of Identity Security and Management, particularly emphasizing the limitations of Identity Governance and Administration (IGA) when acting in isolation. A core subject was the intricacy of managing identity access across disparate systems and the need for integrated solutions that consider operational realities, such as Active Directory and SAP environments, which possess intricate entitlement models that IGA cannot cover completely. Organizations are confronted with unprecedented challenges in managing and securing identities across hybrid environments due to the growing complexity of the digital landscape. While Identity Governance and Administration (IGA) solutions provide a foundation, the increasing complexity of identity ecosystems demands a more comprehensive approach to maintain visibility, security and control. Modern identity management requires solutions that can bridge the gap between IGA and directory management. Advanced tools can consolidate visibility across hybrid environments, provide fine-grained control, and enhance delegation capabilities. These solutions complement IGA by addressing the limitations of native directory management and improving overall security posture.
-
Securing Your Active Directory: How to Find and Block Weak Passwords
By:
Type: Talk
Securing Your Active Directory: How to Find and Block Weak Passwords Active Directory is the backbone of most enterprise networks and securing it is critical to protecting sensitive information. One of the weakest links in Active Directory security is weak passwords. In this webinar, we will explore how to find and block weak passwords in Active Directory to enhance your organization's security posture. During this webinar, we will cover: • An overview of Active Directory and why securing it is crucial. • The dangers of weak passwords and the risks they pose to your organization's security. • How to identify weak passwords in Active Directory • Best practices for blocking weak passwords in Active Directory By the end of this webinar, attendees will have a solid understanding of how to identify and block weak passwords in Active Directory, reducing the risk of security breaches and protecting sensitive information. Join us and learn how to secure your Active Directory!
-
[On-Demand] Komprise Customer Success Webinar: Dig Deeper with Directory Explorer
By:
Type: Talk
In this customer success webinar, Komprise product manager Jeremy Estey reviews the Directory Explorer functionality that is now available to browse both directories and files within a single navigation pane. With the Directory Explorer you can easily analyze size, content, and coldness of directories and their subtrees. Watch this webinar and learn more about what's new in Komprise Intelligent Data Management and Elastic Data Migration.
-
Introducing Tenable.ad – Secure Active Directory and Disrupt Attack Paths
By:
Type: Video
Active Directory (AD) is a favored target for attackers to elevate privileges and facilitate lateral movement by leveraging known flaws and misconfigurations. It doesn’t have to be this way. With Tenable.ad, you can continuously detect and prevent Active Directory attacks without agents, privileges or delays. Learn how. Join Microsoft MVP Active Directory security experts for a webinar introducing Tenable.ad. Topics covered include: * Discovering and prioritizing weaknesses in Active Directory * Detecting Active Directory attacks like DCShadow, brute force, password spraying, DCSync and more * Improving and accelerating incident response by integrating Active Directory security data from Tenable.ad with your SIEM, SOAR and/or SOC platforms
-
Securing your Active Directory against Ransomware attacks
By:
Type: Video
Find and fix Active Directory weaknesses before attacks happen. They start by leveraging vulnerabilities, social engineering, misconfigurations and other flaws. Once ransomware actors gain access to your network, they will almost always systematically exploit Active Directory to achieve mass deployment. Led by Tenable Active Directory security experts, this session shares insights and proven solutions for strengthening Active Directory to prevent ransomware exploitation.
-
Securing Your Active Directory: The Power of a Resilient Password Policy
By:
Type: Replay
Join the BrightTALK Summits webinar addressing Data Security Risks and Challenges! Say farewell to the era of weak passwords vulnerable to modern threats. Safeguarding your Active Directory necessitates a robust password policy. Native Windows tools often fall short in tackling today's security challenges and complex compliance requirements. The struggle is real, isn't it? Introducing the game-changers: Netwrix Password Policy Enforcer and Netwrix Password Secure. Brace yourself for password enforcement that's not only powerful but also incredibly user-friendly. Bid farewell to the headaches and embrace rock-solid security. Your Active Directory will thank you! Watch this session to discover how to: - Set up a robust and user-friendly password policy for your Active Directory. - Prevent the use of weak passwords by customizing dictionaries and cross-referencing against the HIBP database of compromised passwords. - Simplify password compliance with pre-defined policy templates. - Enforce the generation of passwords that meet policy requirements. - Ensure secure password sharing among your employees.
-
Secure Active Directory by Thinking Like an Attacker
By:
Type: Talk
Attackers don’t think in lists and spreadsheets; they look at attack paths. They want to find the easiest route to your critical assets. Active Directory is often one of the quickest paths to your crown jewels. How can you secure it against attack? This webinar explores how attackers enumerate your infrastructure and compromise Active Directory to move laterally and elevate privileges. You'll walk away with actionable techniques to secure Active Directory by looking at attack paths and blast radiuses. By the end of this session you will see how you can beat the attackers at their own game. Key takeaway: • Tools used by attackers to see attack paths and compromise Active Directory • How to negate attackers from exploiting Active Directory • How organizations can use attack path concepts
-
Updating Your Active Directory Security to the Modern Threat Environment
By:
Type: Talk
Active Directory (AD) is at the heart of the IT infrastructure for over 90% of organisations and consequently is a primary target for attackers seeking to gain access to sensitive company data. The security of Active Directory is a moving target and although periodic audits are essential, daily monitoring is just as important. Join us in this webinar where we’ll investigate the best practices for Active Directory security to prevent it from keeping you up at night. This session will be covering: • Types of Active Directory attacks • Adopting an assume breach / zero trust position around AD • The principle of least privilege • Insider Threats • Monitoring passwords for compromise
-
Protect Against Modern Active Directory Attacks [EMEA]
By:
Type: Replay
The adversary has evolved. 80% of modern attacks are identity-driven and Active Directory (AD) is often considered the weakest link in an organization's cyber defenses. Unsurprisingly, over 50% of organizations experienced an AD attack in the last 2 years—and 40% of those attacks were successful. These breaches are incredibly hard to detect and adversaries can often lurk in your environment undetected for days, moving laterally across systems, escalating privileges in AD and eventually launching catastrophic attacks. Join this webinar to: • Learn about these modern attacks that target Active Directory and how Falcon Identity Protection can provide comprehensive, frictionless protection against Active Directory attacks in real-time • Walk through a real attack scenario targeting Active Directory and see how Identity Protection can protect you against a modern Active Directory attack.
-
Protect Against Modern Active Directory Attacks
By:
Type: Replay
The adversary has evolved. 80% of modern attacks are identity-driven and Active Directory (AD) is often considered the weakest link in an organization's cyber defenses. Unsurprisingly, over 50% of organizations experienced an AD attack in the last 2 years—and 40% of those attacks were successful. These breaches are incredibly hard to detect and adversaries can often lurk in your environment undetected for days, moving laterally across systems, escalating privileges in AD and eventually launching catastrophic attacks. Join this webinar to: • Learn about these modern attacks that target Active Directory and how Falcon Identity Protection can provide comprehensive, frictionless protection against Active Directory attacks in real-time • Walk through a real attack scenario targeting Active Directory and see how Identity Protection can protect you against a modern Active Directory attack.
-
Five Ways to Strengthen Active Directory Security and Prevent Ransomware Attacks
By:
Type: Video
Led by Tenable Active Directory security experts, this on-demand webinar shares insights and proven solutions for strengthening Active Directory to prevent ransomware exploitation. Key takeaways: * Five issues plaguing every Active Directory environment and five corresponding actions to dramatically improve your AD security * Preventing privilege escalation by avoiding AD and group policy misconfigurations * Proven actions you can take to close backdoors
-
Hidden Active Directory Misconfigurations: Red Team Style
By:
Type: Talk
Active Directory is the most common on-premises identity provider solution for organizations around the globe. With the rise of cloud adoption, it is now frequently used in a cloud/on-premises hybrid model to manage and sync user identities between the environments. Over the last year, Mandiant has observed a higher volume of misconfigurations with Active Directory and hybrid identity models which resulted in successful vertical privilege escalation and stealthy persistence. These configuration missteps put organizations at a higher risk for harmful compromise, which calls for increased focus on hardening Active Directory setup and processes. Join Andrew, one of Mandiant’s frontline consultants, as he walks us through an Active Directory attack lifecycle—Red Team style. Topics of discussion will include: • Modern attacker TTPs for Active Directory • Hidden misconfigurations that can lead to domain compromise • Dangers associated from this type of compromise • Proven mitigation strategies and recommendations
-
Mitigating Active Directory Threats Before, During and After Disaster
By:
Type: Video
Identity, and Active Directory in particular, is a cyber attacker’s prime target, with 80% of breaches today involving compromised identities. From an attackers’ point of view, it makes sense – control Active Directory, and you control the entire organization. Modern threats are evolving and are only getting more challenging to overcome. In order to truly be secure, organizations need to establish true cyber resilience – before, during and after an attack – and incorporate identity threat detection and response (ITDR) disciplines within their Active Directory. Join Quest security experts, Matthew Vinton and Bryan Patton, for an invaluable session where we will discuss the top modern Active Directory threats, such as: A constantly growing attack surface AD misconfigurations Alert fatigue Neglect of on-premises Then, learn how you can easily mitigate Active Directory threats while establishing a lifecycle of cyber resilience and ITDR, with Quest.
-
Step-by-Step: Configuring Amazon EC2 for Business-Critical Applications
By: SIOS Technology Corp
Type: eBook
Discover how to configure Amazon EC2 to support business-critical applications with high availability. Learn to set up a Windows Server Failover Cluster spanning multiple Availability Zones and Regions. Download this e-book to get step-by-step guidance.
-
Active Directory Security Risk: How High is the Risk?
By:
Type: Video
Risk is calculated as the intersection between threat, vulnerability, and asset value. When it comes to Active Directory risk is extremely high, based on the three components that risk is based on being so high. As Active Directory is responsible for controlling access to most of the corporate assets, it is usually the target for most attacks, making the threat extremely high. Due to the age, lack of knowledge, lack of attention, and many other factors, Active Directory is riddled with vulnerabilities. In this webinar 17X Microsoft MVP will give you clear and direct actions that you can take to reduce your Active Directory security risk. In this webinar you will learn: - Where the threat against AD come from - Why there are so many vulnerabilities in AD - How AD controls access to corporate assets - What steps to take to reduce AD security risk
-
How To Overcome Active Directory Exploits And Prevent Attacks
By:
Type: Replay
According to Gartner, “It is critical to make concentrated efforts to comprehensively secure and monitor Active Directory, proactively look for threats and misconfigurations, and remediate to prevent dangerous actions from taking place.” XM Cyber is the first in the industry to show how Active Directory abuse comes into play in the entire attack path, bringing multiple attack techniques together to pinpoint the highest risks and offer step-by-step remediation guidance. Join the webinar to learn: ● How Active Directory (AD) exposures combined with other attack techniques form attack paths ● What kind of actions the attacker can perform once they compromise an AD user ● What to do for better Active Directory Security
-
How To Overcome Active Directory Exploits And Prevent Attacks
By:
Type: Replay
According to Gartner, “It is critical to make concentrated efforts to comprehensively secure and monitor Active Directory, proactively look for threats and misconfigurations, and remediate to prevent dangerous actions from taking place.” XM Cyber is the first in the industry to show how Active Directory abuse comes into play in the entire attack path, bringing multiple attack techniques together to pinpoint the highest risks and offer step-by-step remediation guidance. Join the webinar to learn: ● How Active Directory (AD) exposures combined with other attack techniques form attack paths ● What kind of actions the attacker can perform once they compromise an AD user ● What to do for better Active Directory Security
-
Panel: Future Proofing Identity Security
By:
Type: Talk
Sean Deuby, host of HIP podcast, sits down with industry experts and a special guest, Julie Smith. Julie Smith is the Executive Director of the IDSA, responsible for executing the mission on behalf of the membership and the identity and security community. Throughout her career she has held various leadership roles in technology and solutions companies, including product management, product and solutions marketing and business development. Prior to joining the IDSA, Julie spent 12 years in the identity and security industry with leading vendors and solution providers. Siddharth Bhai is a Product Management Lead at Google Cloud. His current focus is to provide product leadership for managed security services, which streamline customer deployments and enable enterprises to focus on the best public clouds have to offer. He has been active in the Identity & Access Management space for over a decade and enjoys working with many Fortune 1000 & emerging companies. He has spoken about Identity & Access Management at major industry conferences, including Directory Experts Conference, Microsoft TechEd, and Google Cloud Next. Gil Kirkpatrick is the Chief Architect at Semperis. Gil has been building commercial products for enterprise IT for a very long time, focusing primarily on identity management and security-related products. He has been named a Microsoft MVP for Active Directory and Enterprise Mobility for each of the last 15 years, and is the author of Active Directory Programming, as well as the founder of the Directory Experts Conference. Host: Sean Deuby, 15-time Microsoft MVP and HIP Podcast Host. Sean brings 30 years’ experience in Enterprise IT and Hybrid Identity to his role as Director of Services at Semperis. An original architect and technical leader of Intel's Active Directory, Texas Instrument’s Windows NT network, and 15-time MVP alumnus, Sean has been involved with Microsoft identity technology since its inception.
-
Just-In-Time Privilege: Secure your Active Directory access
By: One Identity
Type: White Paper
As the de facto authentication method for many enterprises, Active Directory (AD) is a consistent target for cybercriminals. Just-In-Time Privilege from One Identity is designed to protect within AD by removing access to those not currently using the privilege. Download this white paper to learn more about Just-In-Time Privilege.
-
India Regulatory and compliance - Golden Ticket and rolling KRBTGT accounts
By:
Type: Video
Full Active Directory compromise, once an attacker gains access to your network and has control of AD domain, is a nightmare situation for any CISO or CIO. In this scenario the only way to be sure that you have completely removed the attacker is to complete a full reset and rebuild of the AD which can have significant business impact. To gain insight into proven solutions for strengthening Active Directory security, join us for an Active Directory Masterclass.Highlights * What does ‘full AD compromise’ mean? * How can I avoid it happening? * How can a prepare to respond most effectively if it happens?
-
The Network Edge: Windows Devices & Their Data
By:
Type: Video
This module dives into the complexities associated with monitoring Windows systems. The landscape of Windows observability presents intricate challenges due to the diverse array of services, applications, and workloads operating on individual hosts. Spanning from web servers to databases, Active Directory to DNS, messaging systems to custom applications, the Windows environment comprises an intricate network of interconnected components, each producing logs, metrics, and events crucial for performance analysis and issue diagnosis. Our aim is to provide guidance in deciphering the wealth of data generated and understanding its inherent value. Interested in learning about the real-time collection and processing of observability data, including metrics and logs, from various endpoints such as Windows machines, applications, and microservices? Be sure to explore our blog for more information. https://cribl.io/blog/cribl-edge-and-windows-a-perfect-pair-for-observability/
-
Security leader’s guide to Active Directory best practices
By: One Identity
Type: White Paper
Microsoft Active Directory (AD) and Azure AD (AAD) bring organization and standards to how identity and account data is managed and stored. One Identity Active Roles unifies your AD and AAD environments and enables identity and account data to be managed with agility, security and speed. Read on to learn more.
-
Active Directory integration features in Ubuntu 22.04
By:
Type: Talk
Active Directory (AD) is the most popular user and endpoint identity management system in medium and large enterprises. Ubuntu supported AD integration for a very long time, however this was limited to user authentication and did not allow to take advantage of the more advanced features like Groups Policy Objects and scripts. With Ubuntu Desktop 22.04 we have listened to the sysadmin feedback and introduced ADsys, a new, groundbreaking client which enables the following functionalities: Full Group Policy Object (GPO) support, natively baked into the OS Privilege management, giving you the possibility to execute tasks as a privileged account Custom shell scripts execution for logon, logoff, startup and shutdown. Join us for a demo and live Q&A to learn more about the new AD integration features and discuss how we can help you manage your Ubuntu estate with the same tools you currently use to manage your Windows clients. If you want to learn more about Ubuntu Desktop, Ubuntu Advantage or our advanced Active Directory integration features please do not hesitate to contact us to discuss your needs with one of our advisors.
-
New Active Directory integration features in Ubuntu 22.04
By:
Type: Talk
Active Directory (AD) is the most popular user and endpoint identity management system in medium and large enterprises. Ubuntu supported AD integration for a very long time, however this was limited to user authentication and did not allow to take advantage of the more advanced features like Groups Policy Objects and scripts. With Ubuntu Desktop 22.04 we have listened to the sysadmin feedback and introduced ADsys, a new, groundbreaking client which enables the following functionalities: Full Group Policy Object (GPO) support, natively baked into the OS Privilege management, giving you the possibility to execute tasks as a privileged account Custom shell scripts execution for logon, logoff, startup and shutdown. Join us on this webinar to learn more about the new AD integration features and discuss how we can help you manage your Ubuntu estate with the same tools you currently use to manage your Windows clients. If you want to learn more about Ubuntu Desktop, Ubuntu Advantage or our advanced Active Directory integration features please do not hesitate to contact us to discuss your needs with one of our advisors.
-
How to manage unwanted guests in Azure Active Directory
By: One Identity
Type: White Paper
Guests in Azure Active Directory-controlled infrastructure need to be treated like the security threats they are. One Identity delivers unified identity security solutions that help customers strengthen their overall cybersecurity posture and protect the people, applications and data essential to business. Read on to learn more.
-
Active Directory Security: Why Do We Fail and What Do Admins and Auditors Miss?
By:
Type: Video
Everyone knows Active Directory (AD). It is a seasoned IAM, not to mention one that nearly every organization in the world uses. As AD is responsible for controlling access to most corporate assets, it is the target of most attacks. After 20 years of being overlooked, Active Directory is riddled with vulnerabilities. In this security workshop, a 16x Microsoft MVP will give you direct actions that you can take to reduce your AD security risk. Five takeaways: -Learn where threats against AD originate -Understand why there are so many vulnerabilities in AD -Master the rules of Active Directory security -Discover how to detect specific AD attacks used by ransomware -Define what steps to take to reduce AD security risk
-
AD Masterclass: Konfigurationsstrategien für mehr Sicherheit Ihres AD [German]
By:
Type: Video
Über 90 % der Unternehmen weltweit nutzen Active Directory (AD) als Authentifizierungs- und Autorisierungsplattform für ihre IT-Infrastruktur. Aufgrund seiner Komplexität wird Active Directory jedoch häufig falsch konfiguriert, sodass Angreifer leichtes Spiel haben und große Schäden in Ihrem Netzwerk anrichten können. Um dieses Risiko zu verringern, müssen Sie dafür sorgen, dass Ihr Active Directory ordnungsgemäß konfiguriert ist sowie engmaschig überwacht und streng kontrolliert wird. Netwrix unterstützt Sie bei diesen Aufgaben.
-
5 Active Directory Security Settings Attackers Leverage
By:
Type: Video
Everyone knows Active Directory. Not only is it a seasoned IAM, nearly every organization in the world uses it. That said, there are many built-in configurations and processes that “just work” without the need for any manual configurations. Many administrators are not aware these exist. Surprise: the attacker does and leverages them to move laterally and gain privileges. In this webinar you will learn: • How an attacker can leverage the SDProp process • Which service account configurations attackers look for • How an old Unix attribute can cause an immediate privilege elevation • How a migration-related attribute can allow domain admin privileges • What details you need to verify for your trusts Looking for concrete actions to fortify your organization's security today? Start watching.
-
5 Active Directory Security Settings Attackers Leverage
By:
Type: Video
Everyone knows Active Directory. Not only is it a seasoned IAM, nearly every organization in the world uses it. That said, there are many built-in configurations and processes that “just work” without the need for any manual configurations. Many administrators are not aware these exist. Surprise: the attacker does and leverages them to move laterally and gain privileges. In this webinar you will learn: • How an attacker can leverage the SDProp process • Which service account configurations attackers look for • How an old Unix attribute can cause an immediate privilege elevation • How a migration-related attribute can allow domain admin privileges • What details you need to verify for your trusts Looking for concrete actions to fortify your organization's security today? Start watching.
-
How to Hack Any Active Directory in One Hour!
By:
Type: Talk
If you want to kill someone, the easiest way is to attack the heart. When cyber-criminals want to unleash a fatal attack on your organisation, they go for the Active Directory! During the webinar, we will demonstrate how attackers are using Active Directory misconfigurations to spread ransomware inside the organisation, and ultimately take control of your data. We will expose the most common techniques attackers use to infect the first PC, catch credentials, move laterally to other machines, and take control of Active Directory. The session will focus on actual demonstration, not just a boring slide deck – you will learn first hand about primo-infection, lateral movement, and privilege escalation. We will reveal the main counter strikes and what accurate defence mechanisms are efficient to deploy inside your organisation.
-
Operationalizing Your Active Directory Security
By:
Type: Video
What are the requirements and best practices for implementing a strong multi-domain Active Directory security program? Now’s your chance to find out. Join Tenable Senior Security Engineer, Tim Oroszi, Sales Specialist, Megan Otto, and Professional Services Engagement Manager, Rocky Arocho, for this on-demand webinar to better understand how you can effectively secure Directory Services at your enterprise with Tenable Identity Exposure. Topics covered include: * Leveraging indicators of exposure to jumpstart your efforts *Creating custom dashboards and remediating findings to reduce your Directory Services attack surface * Integrating Tenable Identity Exposure with your SecOps systems and processes to enhance program efficiency and security posture
-
Comparing Azure Active Directory options
By: TechTarget ComputerWeekly.com
Type: Infographic
Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
-
[Attack]tive Directory: How To Overcome Exploits and Prevent Attacks
By:
Type: Talk
Active Directory controls access to critical systems and data for organizations around the world — but it is not always managed securely. That makes it a top target of attackers. How can you best protect your organizations from these attacks? And when they happen, how can you detect them promptly and respond effectively? Learn from the experts how you can secure your Active Directory from end to end and gain peace of mind. Jeff Forsyth (PreSales Engineer at STEALTHbits Technologies) and Sander Berkouwer (CTO at DirTeam and 14-time Microsoft MVP) will explain how you can: · Identify and mitigate AD security risks before attackers can exploit them. · Promptly detect and contain active threats. · Quickly recover from incidents to ensure business continuity. Join us to become the Active Directory security hero your organization needs!
-
What Most Orgs Get Wrong About "Never Expire"
By:
Type: Talk
After attending this webinar, you’ll know: - The numbers behind why organizations of all sizes consider removing expiry - The things you need in place before even considering removing expiry - Whether or not removing expiry is right for your AD environment Is this talk right for you? - This discussion will focus on whether or not to remove expiry for Active Directory passwords. This discussion will be the best fit you are using Active Directory in an on-prem or hybrid environment. If you are only using Azure Active Directory (or a non-Microsoft environment), this discussion will be less applicable for you. - Whether you’ve already rolled out a “never expire” project in your organization, are considering one, or want to validate it’s not the right fit for you – this webinar will help you consider how best to implement (or not) and help you consider what you may have overlooked. Can't make it live? Register anyway to get the recording.
-
Why You Should Care About FlashArray-Backed NFS Datastores
By:
Type: Replay
Join us to learn why Pure is so excited about NFS datastores on FlashArray. We’ll cover considerations of deploying it in your environment, limitations as well as some cool functionality that exists today! Some of that functionality covered will be snapshots, automatic directory management and VM granularity. Join us for this webinar to learn: - What FA File-backed NFS datastores are - How these datastores can simplify your environment - File snapshots, directory management, VM granularity and the value they bring
-
Microsoft & Yubico: Enterprise Strong Authentication with YubiKey
By:
Type: Video
During this 2-hour briefing, we will take you through Microsoft’s passwordless journey and discuss methods of enabling strong authentication with Microsoft Azure Active Directory and YubiKeys for organizations. We will share scenarios (on-premise, hybrid and cloud) that may be relevant to what you will encounter as you plan, implement, and maintain strong authentication. At the end of the presentation, you will learn: - How YubiKeys can be used with Microsoft AD, ADFS and Azure AD - A deeper understanding of FIDO2/WebAuthn protocol - Why you should turn on MFA - How to enable your organization to go passwordless - How to enroll YubiKeys with Azure AD The workshop is geared towards Solution Architects, Security Architects, Cloud Administrators, and Technical Decision Makers with a strong technical background and an understanding of authentication and access principles.
-
Think Like An Attacker to Take Control of Your Active Directory Defenses
By:
Type: Video
Attackers are really good at identifying and leveraging Active Directory attack paths to comprise your networks. In this on-demand webinar, we’ll flip the script and give you the insights needed to understand how attackers operate, so you can more effectively secure Active Directory and protect your business. What you'll learn: * How attackers identify attack paths * Effective measures for assessing attack path “blast radius” and negating exploitation * Ways you can leverage attack path concepts
-
Using Behavior to Detect Intrusions Involving Edge Devices
By:
Type: Video
Any Internet-facing device, appliance, server, or VM is fair game as an initial attack vector to a cyber attacker. They are readily accessible remotely and offer security teams little visibility into whether they are secure, under attack, or compromised. Additionally, those devices running on a Linux kernel can prove to be valuable assets to an attacker: A Linux device can be made a stealthy persistent foothold from which to pivot and begin attacks on your Windows infrastructure, it can be used to assist in exfiltration, and just because it’s been patched doesn’t mean it hasn’t already been exploited and continues to provide access via web shell. All this while your security team may be unaware these devices are still compromised. Attackers choosing to pivot and focus on gaining access to your Windows environment, historically expose themselves to detection through indicators of compromise (IoC) on the network, as well as within the Windows OS, applications, and Active Directory. But with many attackers working to hide their tracks, how can organizations detect attacks and trace them back to edge devices?
-
Using Behavior to Detect Intrusions Involving Edge Devices
By:
Type: Replay
Any Internet-facing device, appliance, server, or VM is fair game as an initial attack vector to a cyber attacker. They are readily accessible remotely and offer security teams little visibility into whether they are secure, under attack, or compromised. Additionally, those devices running on a Linux kernel can prove to be valuable assets to an attacker: A Linux device can be made a stealthy persistent foothold from which to pivot and begin attacks on your Windows infrastructure, it can be used to assist in exfiltration, and just because it’s been patched doesn’t mean it hasn’t already been exploited and continues to provide access via web shell. All this while your security team may be unaware these devices are still compromised. Attackers choosing to pivot and focus on gaining access to your Windows environment, historically expose themselves to detection through indicators of compromise (IoC) on the network, as well as within the Windows OS, applications, and Active Directory. But with many attackers working to hide their tracks, how can organizations detect attacks and trace them back to edge devices?
-
Winter Warmer | Heat Up Your CyberSecurity [APAC]
By:
Type: Video
Temperatures are dropping, but cybersecurity threats are rising. Join us for an exclusive webinar where we'll explore how to keep your organisation's digital assets safe, warm, and protectively wrapped up during the cooler months. Dive deep into the critical topic of Active Directory (AD) recovery, the backbone of your network security. Learn essential strategies to mitigate risks, ensure business continuity, and protect your crown jewels from cyber-attacks. Key Highlights: • Better understand the criticality of Active Directory to your organisation • Real-life case studies: lessons learned from cybersecurity heatwaves • Increase your security posture and aid security teams by providing forensic analysis into changes in your AD environment • Live demo: best practices for Active Directory recovery (compare changes domain wide and mass recover down to the attribute level)
-
Fortifying On-Premises Identity Systems: Active Directory Threat Prevention, Detection & Response
By:
Type: Talk
**Notice for on-demand viewers** CPE credit is now available on the self-study program for this webinar at: https://www.itcpeacademy.org/course/real-time-detection-response-to-active-directory-threats Join us as we delve into the critical challenges of protecting Active Directory (AD) environments from identity-based threats. As cybercriminals increasingly target identities and systems, it's essential for organizations to adapt by enhancing their detection, response, and mitigation strategies in real time. Protecting your key on-premises identity infrastructure — Active Directory — is crucial because it remains the backbone of many organizations' access control and authentication processes. When Active Directory is not secure, nothing is. This session will provide you with the knowledge and tools needed to strengthen your AD security posture, ensuring your organization is prepared to combat the ever-evolving identity threat landscape. Learning Objectives: - Understand the key risks and vulnerabilities specific to AD attacks. - Discover best practices for reducing your identity attack surface and remediating misconfigurations. - Learn how to implement real-time detection and response strategies to safeguard your on-premises identity infrastructure. - Explore the latest technologies and techniques to prevent credential theft and privilege abuse within your AD environment.
-
Identity authentication's role in Active Directory and Entra ID
By: One Identity
Type: White Paper
Effective identity authentication and privilege management are essential for securing corporate resources in Active Directory and Entra ID environments. Learn how to unify AD and Entra ID, automate identity processes, and implement best practices like least-privilege access and zero trust. Read the full white paper to enhance your IAM strategy.
-
#VideoInterview: Live from Infosec22 - Guido Grillenmeier, Semperis
By:
Type: Video
Semperis chief technologist, Guido Grillenmeier, highlights approaches to defend active directory systems from surging cyber-attacks
-
Continuously Detect and Prevent Critical Attack Paths in Active Directory
By:
Type: Video
Check out this on-demand webinar to find out how you can proactively secure and continuously monitor your Active Directory environment to protect your business from cyber attacks.
-
Managing the Invisible risk of non-human Identities
By: One Identity
Type: White Paper
As non-human identities (NHIs) proliferate, securing them is critical to avoid breaches and compliance issues. This white paper outlines the risks of unsecured NHIs and best practices for managing them, including identity discovery, risk assessment, and privileged access controls. Learn how to gain visibility and control over your NHIs.
-
Solving 3 Key AD and Entra ID Group Management Challenges
By: One Identity
Type: White Paper
This white paper explores the top 3 challenges of managing Active Directory and Entra ID groups. Learn how to implement a group management lifecycle to improve security and mitigate these risks. Read the full white paper to learn more.