What would a real hacker do to your Active Directory

Download

Right click “Save as…”

  • MP3 (Audio only)
  • MP4 (iPhone, Android)
  • High Quality MP4 (iPad, PC, Xbox)
  • Mid Quality MP4 (Windows Phone, HTML5, iPhone)

Cloud security stays and falls with the Active Directory. The session focuses on several relatively unknown yet extremely sensitive security settings of Active Directory which, in case of misconfiguration or misunderstanding, pose a severe threat to the whole forest environment and may, if exploited, enable the real internal hacker to take control of virtually anything in your infrastructure

Tags:

Follow the Discussion

Comments Closed

Comments have been closed since this content was published more than 30 days ago, but if you'd like to continue the conversation, please create a new thread in our Forums,
or Contact Us and let us know.