Главная
Study mode:
on
1
Introduction
2
Overview
3
Current State of Security
4
Evolution of Administration
5
Admins Everywhere
6
Traditional Admin Methods
7
Secure Admin Methods
8
Smart Cards
9
Group Policies
10
Log on Locally
11
ILO Vulnerability
12
ILO Patch Summary
13
Manage Auditing Security Log
14
How to subvert MFA
15
Use MFA
16
Cyberark
17
Admin Forest
18
Cross Forest Administration
19
Separating Accounts
20
Isolate Privileged Credentials
21
Focus on Tier 0
22
Convince Admins
23
Virtual Environment
24
Common Issues
Description:
Explore the critical vulnerabilities in secure administration practices and learn effective solutions in this comprehensive conference talk. Delve into the evolution of administration, examining traditional and secure methods, including smart cards and group policies. Uncover potential weaknesses in ILO systems and multi-factor authentication. Investigate advanced concepts such as admin forests, cross-forest administration, and the importance of isolating privileged credentials. Gain insights on focusing on Tier 0 systems, convincing administrators to adopt better practices, and addressing common issues in virtual environments. Equip yourself with the knowledge to strengthen your organization's administrative security and protect against potential threats.

From Workstation to Domain Admin - Why Secure Administration Isn't Secure and How to Fix It

WEareTROOPERS
Add to list
00:00
-01:16