The reality is that your network is under attack. The bad guys are using advanced machine learning techniques to exploit sometimes subtle vulnerabilities in your network implementation and design to gain a foothold inside your network. These footholds then use map the network, determine who the domain admin IDs are, who the local admins are, and what machines have local admins. In some cases they are exploiting your actual techs, their rights and and the tools we know and love network to deliver their deadly payload. Then those targeted users get phishing emails to try and gain access to their IDs, their workstations and their rights to the network.
You have to assume the bad guys are sitting next to you and your techs as you do your work. We have to design and in this case re-design the network to keep the bad guys as blind as possible to what the network looks like and contain any infection before it can do us serious harm.
In this session Scott Quimby will take you through some basic Active Directory hardening to make it harder to expose sensitive information. He will also go through some Group Policy changes to minimize the ability of the bad guys to use your own tools against you.
Click here to watch the recording of Hardening Active Directory and Group Policy