Download pdf
This talk will focus on the pillars of Active Directory topologies, privileged accounts and endpoint hardening—to educate the audience on the practical and proven Active Directory configurations that will harden an environment, and prevent against techniques that attackers leverage to compromise enterprise environments.

Pre-Requisites: Working understanding of Active Directory, Threat actor tactics and methods, Group Policy, Authentication Silos and Identity and Authentication services.