Главная
Study mode:
on
1
Intro
2
WHEN NOT COMPUTERING...
3
ATTACK SCENARIO #2
4
WINDOWS LOGON TYPES
5
LOCAL SAM DATABASE
6
ACTIVE DIRECTORY DATABASE
7
LSA SECRETS
8
CREDENTIAL MANAGER
9
WINDOWS CREDENTIAL & AUTH ISSUES
10
STEALING WINDOWS ACCESS TOKENS
11
WINDOWS CRED & AUTH ISSUES
12
INTRODUCING PAWS
13
ACTIVE DIRECTORY ADMINISTRATIVE TIER MODEL
14
LOGON RESTRICTIONS
15
TRADITIONAL SOLUTIONS - JUMP SERVERS
16
PAW PREREQUISITES
17
PHASES OF DEPLOYMENT
18
PAW DEPLOYMENT MODELS
19
DEPLOY PAW ACTIVE DIRECTORY FRAMEWORK
20
PAW COMPUTER ACCOUNT GPOs
21
PAW USER GPOS
22
PAW GPOS - DENY LOWER TIER LOGON
23
RESTRICTED ADMIN)
24
PAW SETUP - PHASE 2
25
MULTI-FACTOR)
26
PAW SETUP - PHASE 3 (PROTECTED USERS)
27
LESSONS LEARNED FROM MY DEPLOYMENT
28
PAW DEPLOYMENT PAIRS WILL WITH NETWORK SEGMENTATION
29
NETWORK SEGMENTATION (LAYER3)
30
FURTHER LIMITING EXPOSURE TO CREDENTIAL THEFT AND LATERAL MOVEMENT
31
CLOSING
32
QUESTIONS/CONTACT
Description:
Explore a comprehensive conference talk on deploying Privileged Access Workstations (PAWs) as a strategy to mitigate credential theft and lateral movement in network security. Delve into various Windows authentication mechanisms, credential storage methods, and common attack scenarios. Learn about the Active Directory Administrative Tier Model, logon restrictions, and traditional jump server solutions. Discover the prerequisites, deployment phases, and models for implementing PAWs, including detailed guidance on setting up Active Directory frameworks, GPOs, and user policies. Gain insights into multi-factor authentication, Protected Users group, and lessons learned from real-world deployments. Understand how PAW implementation complements network segmentation strategies and further limits exposure to security threats. Conclude with practical tips and a Q&A session to enhance your organization's security posture against credential-based attacks.

Deploying PAWs as Part of a Strategy to Limit Credential Theft and Lateral Movement

Add to list
0:00 / 0:00