Every Wednesday in May, we’ve hosted a live webcast as part of a month-long series, How to Overcome Common Hybrid AD and Cloud Security Challenges. In case you’re new to the series, the webcasts all share a common theme centered on a fictional character, Hank the Hacker.
During the first three webcasts, we’ve showed how to:
There are many changes within your hybrid Active Directory environment that can be indicative of a security breach, making the current state of AD no longer trustworthy. In these instances, you’d need to investigate security events and the most likely path to the potential breach. Proper investigation requires 360-degree forensics and full-text search to correlate events, access activities and security configurations across multiple indexed repositories. This includes:
After investigation, you need to be able to recover AD in the same way you think about recovering from any other disaster to ensure business continuity. Your contingency plan should automate as much as possible:
Join us for a live, 60-minute webcast, where Quest AD security experts will show you (with some live demo) how to reduce incident response time investigations across your Hybrid AD environment. Discover how to automate your AD business continuity plan (BCP) to minimize your recovery time objective (RTO) in the event of a security incident that causes partial or total damage across your Hybrid AD environment.
By following these investigation and recovery strategies—along with assessment, detection/reporting and remediation/mitigation best practices—you’ll be in position to overcome any common Hybrid AD and cloud security challenges.