DAY 2
Deep Inside Principle of Least Privilege
- How to make your company understand that admin rights are no good
- How to effectively remove admin rights easily
- How to remove admin rights without budget
- How this is done in real environments ranging from 10 to 350000 endpoints
Deep Inside Pass-the-Hash prevention
- How to build a layered management system and Active Directory in real life
- How to use PtH prevention techniques like protected LSASS, Credential Guard and Remote Credential Guard
- How to build Privilege Access Workstations (PAW) effectively
What you don’t know about the future of Windows “10” that might change everything
- Can’t tell you
- Can’t tell you
- Can’t tell you