Is it game over when a cyberattacker breaches your IT environment? Not necessarily, if you’ve used an Active Directory (AD) tier model to create a security boundary to shield your most critical assets. See how it’s possible to do exactly that in this on-demand webcast featuring Jonas Knudsen, of SpecterOps, and Quest security expert Bryan Patton.
In this webcast, they will:
- Explore the principles of the AD tier model
- Demonstrate how BloodHound Enterprise, Change Auditor, GPOADmin & Recovery Manager can establish and maintain a security boundary