STEALTHbits Technologies, Inc © 2016
Identify Threats. Secure Data. Reduce Risk.

Best Practices for Privileged Local Account Auditing

Local systems and devices present problems for Privileged Account Auditing. Technologies like Active Directory (AD) and Privileged Identity Management (PIM) were introduced to help centralize account administration, but they don’t address local systems that aren’t connected to AD or managed by PIM.  

With privileged accounts allowed to runs services, scheduled tasks and web services, how do you effectively monitor and manage them? Come to this webcast to learn about the best practices available to you in StealthAUDIT. You’ll see reports for monitoring and remediating potential vulnerabilities like:
  • Passwords due to duplicate local admin passwords, or passwords stored in clear text
  • Credentials being used for scheduled tasks and services on local systems
  • Accounts such as local accounts being allowed access across the network
  • ​Attacks that use admin accounts hashed on local systems, or offensive PowerShell commands
STEALTHbits Technologies

Register Now

Date: Thursday, Nov. 10th
Time: 1:00 PM ET
Duration: 30 minutes plus live Q&A


Brad Bussie
Director of Product Management
STEALTHbits Technologies, Inc.

STEALTHbits Technologies

Live Webinar

Mark Wilson

Earn CPE credit for attending this live webinar.