Protecting Active Directory from management plane attacks

Поділитися
Вставка
  • Опубліковано 28 чер 2024
  • Mind the management plane! Whether your organization is running Active Directory on-premises, hybrid, or fully in the cloud, virtualized domain controllers are almost always present. But when is the last time you checked to ensure your privileged access model, aka Tier 0, extended to encompass the management plane?
    Explore the common modern deployment scenarios for virtualized domain controllers and examine the relationship with the management plane. Why? Because attackers can exploit a weakly implemented privileged model and use the management plane as an easy back door into Active Directory.
    In this session, we explore scenarios where organizations can unknowingly leave the door open to these attacks, diving deep into commonly observed gaps, and walking through a demonstration of using the management plane as a means of pivoting into Active Directory. Learn how to defend yourself and get actionable recommendations your organization can take today to ensure that the management plane does not become an attacker’s new friend.
    View the Q&A on the Microsoft Tech Community: aka.ms/WSS2024/ProtectAD
    This session is part of Windows Server Summit 2024! Join us for demos and deep dives on the latest updates, insights, and innovations in the world of Windows Server. You won't want to miss this opportunity to learn from the experts, connect with your peers, and have some fun along the way. See the full schedule here: aka.ms/WindowsServerSummit2024
    Windows Server Summit 2024 | March 26-28 2024 | In partnership with Intel®️
    #WindowsServerSummit #TechSkills #Innovation #WSS2024 #Itpro #winser #WindowsServerInsider #Winserv #Hyperv #WindowsServer
  • Наука та технологія

КОМЕНТАРІ •