Duration: 40 Minutes
Adversaries are using Active Directory as a weapon against itself. They are exploiting AD’s native capabilities to perform recon, find targets, escalate privileges, and gain persistence. Some of their malware-less persistence techniques include:
If you’re not continuously monitoring Active Directory—or setting policies to reduce your threat surface—you’re vulnerable to these attacks. The problem is, even with 24/7 event log monitoring, you may miss relevant threats because event logs are noisy and hard to understand.
In this webinar, Cybersecurity practitioner and STEALTHbits VP of Product Strategy Gabriel Gumbs will walk you through these attacks and show you how to protect your organization using real-time detection, blocking, and mitigation tools that don’t rely on native logging.