For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Threat Mitigation: 5 Keys to Successful Use of Active Directory

We are sorry, the event "Threat Mitigation: 5 Keys to Successful Use of Active Directory" has already expired.

You may also be interested in.

Online Event

Tenant to Tenant M&A Migrations – Go Native or Not?
Tenant to Tenant M&A Migrations – Go Native or Not?

When migrating Microsoft 365 tenants during mergers, acquisitions, and divestitures, it’s essential to keep your users communicating and collaborating during and after the migration ― without even the slightest interruption. This is especially important since so many employees are working remotely. And, you want to maintain coexistence between the tenants for as long as necessary.Sounds easy enough, right? Maybe not so much.How smoothly this

On Demand Webcast

Understanding the Enterprise Attack Surface
Understanding the Enterprise Attack Surface

Learn the techniques attackers use in order to compromise an organization and how to best effectively prioritize and combat threats.

On Demand Webcast

Under the Covers of Office 365 with Microsoft Product Managers
Under the Covers of Office 365 with Microsoft Product Managers

Learn how Microsoft delivers knowledge and insights built on the Microsoft Graph, utilizing Project Cortex, Workplace Analytics, SharePoint, and Search.

Online Event

Demo: Enhancing Compliance & Security Best Practices with Enterprise Reporter Suite
Demo: Enhancing Compliance & Security Best Practices with Enterprise Reporter Suite

Cybersecurity threats are always evolving. And with more people working from home than ever before, the chances that your IT environment can be infected has drastically increased. But it doesn’t have to be that way. With efficient permissions reporting and effective permissions management, you can stay on top of access in your IT environment to keep your users and data safe.In this 30-minute demo, we’ll explore how t

On Demand Webcast

FIDO2 in Hybrid Environments
FIDO2 in Hybrid Environments

Learn everything an architect needs to know about WebAuthn, CTAP2 and the internal workings of Microsoft's hybrid FIDO2 implementation.

On Demand Webcast

Aligning AD Security Best Practices to the MITRE ATT&CK Framework – Identifying and Protecting Where You’re Most Vulnerable
Aligning AD Security Best Practices to the MITRE ATT&CK Framework – Identifying and Protecting Where You’re Most Vulnerable

Discover the recent state of cyberattacks and how using the MITRE ATT&CK Framework as a guide can help to identify where you are most vulnerable.

On Demand Webcast

AD in the Cloud: Untangling the Security Implications of the Many Variations of Hybrid AD
AD in the Cloud: Untangling the Security Implications of the Many Variations of Hybrid AD

Randy Franklin Smith explores security dependencies between DCs, domains, forests, synchronization, and other potential issues in a global AD environment.

On Demand Webcast

Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to find it
Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to find it

Learn how applications can be abused for sustained persistence, how these permissions work, and what overprivileged looks like in your environment.