Deep Inside Windows Security Day 2 – Part 2/2

DAY 2

Deep Inside Principle of Least Privilege

  • How to make your company understand that admin rights are no good
  • How to effectively remove admin rights easily
  • How to remove admin rights without budget
  • How this is done in real environments ranging from 10 to 350000 endpoints

Deep Inside Pass-the-Hash prevention

  • How to build a layered management system and Active Directory in real life
  • How to use PtH prevention techniques like protected LSASS, Credential Guard and Remote Credential Guard
  • How to build Privilege Access Workstations (PAW) effectively

What you don’t know about the future of Windows “10” that might change everything

  • Can’t tell you
  • Can’t tell you
  • Can’t tell you