Note: This is a replay of the webinar with Randy Franklin Smith.
If privileged accounts are the most protected, why do they keep appearing in exploits, like the recent Snowflake/Ticketmaster incident?
The reasons are two-fold:
- Privileged accounts are prime targets.
- Many organizations don’t follow best practices.
In this session on “Assessing the Security of Your Active Directory,” цу]we’ll focus on privileged accounts to help you improve controls and reduce risks. We’ll cover:
Identifying privileged accounts beyond just the Administrators group, including indirect vectors like AD object permissions and Windows system rights.
Using Windows Security Logs to track privileged account logons. Limiting privileged account use to same-security-tier endpoints is crucial, as an admin account is only as safe as the endpoint it’s used on. For instance, some Snowflake contractors reportedly used personal computers with infostealer malware.
Implementing security tiers for accounts, servers, and endpoints to prevent privileged accounts from being exposed to less secure tiers.
Addressing specific risks and controls for privileged accounts in Active Directory.
Our sponsor, Netwrix, offers tools perfect for this topic. Netwrix Auditor can:
- Report on privileged accounts in Active Directory.
- Monitor logons and alert to suspicious activity.
- Generate audit trails and reports for privileged activities.
- Help prepare for audits and ensure compliance.
Jennifer Taufan, Solutions Engineer at Netwrix, will demonstrate these capabilities.