Attacking the Windows Stack and How to Protect against These Attacks

Download

Right click “Save as…”

Slides (view online)
This session looks at some different social engineering and physical attacks on the Windows stack and also provides guidance on how to mitigate these attacks. The session covers several different social, engineering, and physical attacks and shows mitigations through configuration.

Follow the Discussion

Comments Closed

Comments have been closed since this content was published more than 30 days ago, but if you'd like to continue the conversation, please create a new thread in our Forums,
or Contact Us and let us know.