Niner since 2015
Jessica is a Security Person at Microsoft.
The event log documentation I mentioned has been posted on my blog https://aka.ms/jessica.
Thanks for watching!
-Jessica Payne @jepayneMSFT
I always demo attacks you can find in a search engine to show how easy it can be for attackers if you don't plan for compromise. The things in this presentation were based on these links :
https://adsecurity.org/?p=1729 and https://adsecurity.org/?p=1929
If you're interested in learning more about the topics covered in this video I have a list of links on my blog :