Is Your Core Identity System Ready for Today’s Threats?

Active Directory is used for identity management by 90% of businesses. But this 20-year-old technology is increasingly under attack by cyber-criminals who use AD to gain access to your network — and your data. Recent incidents like the Hafnium attack on Microsoft Exchange have highlighted the urgent need for the ability to properly restore an Active Directory forest (without re-introducing malware) and to constantly monitor for well-known vulnerabilities.

What you’ll learn:

  • Essentials of restoring an AD forest after a cyber-attack
  • How cybercriminals can compromise your environment with well-known vulnerabilities such as zerologon and weak service account passwords (used for kerberoasting)
  • How to scan your AD environment for indicators of exposure (IOEs) and indicators of compromise (IOCs)