On-Demand Webinar

10+ Up-To-Date Ways to Harden Windows Against Modern Active Directory Attacks with Randy Franklin Smith

Duration: 80 minutes

The bad guys have dreamed up a lot of new ways to attack Active Directory and the larger Windows environment. And methods that in the past were just theoretical are now common place. Randy Franklin Smith has been talking a lot about how to detect these attacks and also how to architect your environment to prevent them – such as with the “red forest” design. In this webinar, Randy is going to show you over 12 different ways to harden Windows using Security Options in Group Policy, registry settings and more to protect against Active Directory attacks. Here is some of what will be covered:

  • LSA Protection
  • WDigest
  • Computer Password Policy Refresh Interval
  • Limit local user account logon restrictions with the S-1-5-113 (Local account) and S-1-5-114 (Local account and member of Administrators group) SIDs
  • Restrict Domain and Enterprise Admins from logging on to less privileged servers and workstations
  • Mark privileged accounts as "sensitive and cannot be delegated"
  • Restrict NTLM by putting privileged accounts in the Protected Users security group
  • Restricted Admin mode for Remote Desktop Connection
  • PowerShell Script Block Logging and ConstrainedLanguage Mode 
placeholder image

Randy Franklin Smith

Microsoft MVP
Ultimate Windows Security

Jeff Warren - GM of Products

Jeff Warren

GM of Products
Stealthbits Technologies

View The Webinar