Ignite 2018: How to protect and restore Active Directory from malicious or accidental destruction

In this case study session, Neil Flood, Manager of Identity and Access Management for Cargill, joins Brian Hymer from Quest to discuss best practices for Active Directory privileged account auditing and disaster recovery. Discover: - Top indicators of privileged account misuse - Symptoms of a failing (or failed) AD forest - How to determine optimal RTO and RPO - Hybrid AD and Azure AD recovery gotchas - How to justify an auditing and recovery tools purchase to your CISO See a live demo of an AD forest recovery, and get a step-by-step walk through of how to build a virtual test lab using production data.

Related videos

Ignite 2018: There are no compensating controls for an insecure Active Directory
Ignite 2018: There are no compensating controls for an insecure Active Directory

Today everything needs to be secure, but you need to start with Active Directory. Because if AD isn’t secure – nothing else in your organization is regardless of operating system, products, or procedures. That’s a strong statement, but one that Randy Franklin Smith can back up with facts. In this fast-paced session Randy spotlights the multitudinous ways that virtually any component or information on your network can be compromised if the attacker first gains unauthorized access to AD. The good news is AD was designed well and has stood the test of time. AD security is a matter of design, comprehensive management, and monitoring and is the basis for the list of fundamentals for securing AD shared in this session.

相关产品

On Demand Recovery
On Demand Recovery

SaaS 解決方案,可快速安全地備份及回復 Azure AD 和 Office 365。

Change Auditor Threat Detection
Change Auditor Threat Detection

在 Microsoft 環境中主動依據使用者行為偵測威脅

下载免费试用版

Recovery Manager for Active Directory
Recovery Manager for Active Directory

减少备份恢复时间和成本,以降低用户影响

下载免费试用版购买

Change Auditor for Active Directory
Change Auditor for Active Directory

快速跟踪和确认任何变化或日常系统修改

下载免费试用版