The wide range of AD configurations also allow IT administrators to configure a number of unsafe options, potentially opening the door for attackers to sneak through.įor Red Teamers having obtained a foothold into a customer’s network, AD can be a real treasure trove. Privilege creep, whereby a user collects more and more user rights throughout time (or as they change positions in an organization), is a dangerous issue. But ‘structured’ does not always mean ‘clear’. It allows IT departments to deploy, manage and remove their workstations, servers, users, user groups etc. Immediately apply the skills and techniques learned in SANS courses, ranges, and summitsĪctive Directory (AD) is a vital part of many IT environments out there.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |