У нас вы можете посмотреть бесплатно Active Directory Security Best Practices: Stop Over-Privileged Accounts | Practical 365 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Microsoft MVP Steve Goodman and Bastiian Verdonk interview Victor King, a Technical Product Manager at Quest, about critical Active Directory security best practices. Many organizations struggle with recurring AD issues, often due to misconfigurations and over-privileged accounts. Victor shares his 30+ years of experience to help you improve your AD security posture. Key topics covered: Identifying and remediating over-privileged accounts (both human and service accounts). Understanding application workflows to determine necessary privileges. Protecting against lateral movement with techniques like tiering and just-in-time (JIT) access. Addressing the security risks of multi-cloud environments (AWS, GCP, Azure) and cross-cloud identities. Disaster recovery planning and the importance of regular testing. Continuous environmental monitoring and establishing a security baseline. The role of auditing and how AI can help with log analysis. Chapters: 00:00 - Introduction and Victor King's Background 02:18 - Troubleshooting and Active Directory 04:32 - Recurring AD Problems and Configuration Drift 06:05 - Preventing AD Redo: Inventory and Privileged Access 07:51 - Finding Misconfigurations and Behavioral Analysis 09:04 - Over-Privileged Accounts: Examples and Challenges 11:05 - Dealing with Machine IDs and Workload Identities 13:36 - Preventing Lateral Movement with Privileged Accounts 15:46 - Protecting VIP User Accounts 16:51 - Multi-Cloud Strategy and Security Risks 19:28 - Supply Chain Attacks and Trusting Vendors 20:17 - Responding to a Suspected Breach 21:36 - Disaster Recovery Planning and Testing 23:55 - Frequency of Disaster Recovery Testing 25:51 - Famous Stories of Identity Loss 26:55 - Backups as a Primary Target 28:01 - Payloads in Backups and the Timing of Compromise 30:19 - The Challenge of Audit Log Analysis 32:15 - Auditing Systems and Best Practices 33:03 - Locking Down Tier Zero Objects 35:06 - The Role of AI in Security 36:06 - Where to Start: Continuous Environmental Monitoring 38:32 - Call to Action: Start Today Visit Practical 365: https://practical365.com Subscribe to the Practical 365 YouTube Channel: / @practical365 Follow Practical 365 on Twitter: twitter.com/practical365 #ActiveDirectory #Security #Cybersecurity #PrivilegedAccessManagement #DisasterRecovery #MultiCloud #Auditing #Quest #Practical365 #Microsoft #ITSecurity #EntraID