Top 10 Indicators of Tampering with Privileged Accounts

Top 10 Indicators of Tampering with Privileged Accounts
On Demand
  • Recorded Date:Jun. 30, 2015
  • Event:On Demand
Top 10 Indicators of Tampering with Privileged Accounts

You have to plan for breaches and misuse as well as ways to limit the impact of external and internal threats when privileged accounts are concerned. There are many different ways privileged authority can be obtained, so it’s critical to always be vigilant.

See a list of the top indicators that someone or something is tampering with privileged accounts and how administrative authority can be obtained (or stolen) at each level.

What you will learn

In this live webcast, Randy Franklin Smith and expert Alexey Korotich will explore:

  • User rights in Windows that allow you to become an administrator
  • Obscure ways to use Group Policy to gain administrative authority on target systems
  • Common ways to elevate authority on Linux without having the root password
  • And much more

Alexey will also take the time to showcase InTrust and other governance, risk and compliance solutions to show how they can help you quickly detect and respond to changed privileged accounts.

Watch Your Free Webcast