Preview TEC session with Mark Rackley in which he will show you how to use Power Virtual Agents in Microsoft Teams without additional licensing costs to you.
Duration: 00:42
How will identity risk in Active Directory & Azure AD affect you? Justin Kohler & Robby Winchester of SpecterOps share their vision at TEC, Sept 19-20, 2023.
Duration: 01:12
Join Sean Metcalf, Microsoft Certified Master, as he shares tips to bolster AD security.
Duration: 56:06
Join Randy Franklin Smith, Microsoft MVP, as he explains the one command that can shut down attacks on your AD.
Duration: 40:00
TEC is back in action, ready to connect IT professionals with pure subject matter experts! Register today:
Duration: 01:12
Preview TEC session with Paula Januszkiewicz in which she will discuss the most common threats in remote work environments and solutions to avoid being a part of hacker’s paradise.
Duration: 00:54
Today everything needs to be secure, but you need to start with Active Directory. Because if AD isn’t secure – nothing else in your organization is regardless of operating system, products, or procedures. That’s a strong statement, but one that Randy Franklin Smith can back up with facts. In this fast-paced session Randy spotlights the multitudinous ways that virtually any component or information on your network can be compromised if the attacker first gains unauthorized access to AD. The good news is AD was designed well and has stood the test of time. AD security is a matter of design, comprehensive management, and monitoring and is the basis for the list of fundamentals for securing AD shared in this session.
Duration: 22:12
In this case study session, Neil Flood, Manager of Identity and Access Management for Cargill, joins Brian Hymer from Quest to discuss best practices for Active Directory privileged account auditing and disaster recovery. Discover: - Top indicators of privileged account misuse - Symptoms of a failing (or failed) AD forest - How to determine optimal RTO and RPO - Hybrid AD and Azure AD recovery gotchas - How to justify an auditing and recovery tools purchase to your CISO See a live demo of an AD forest recovery, and get a step-by-step walk through of how to build a virtual test lab using production data.
Duration: 01:12:28