Active Directory provides security and control over critical information and systems. The ability to manage Active Directory is controlled through a series of permissions that are applied to different objects and containers. These permissions control critical capabilities, but are rarely well-maintained. They are complicated and difficult to manage centrally, especially in environments with multiple domains and forests.
In this white paper, you will learn what attacks against Active Directory permissions you need to know about, how they work, the techniques and tools real attackers use to perpetrate these attacks, and what you can do about them.
Get the White Paper!
Four Active Directory Permissions Attacks and How to Protect Against Them