About this webinar

See how attackers exploit Active Directory using attacks like Kerberoasting, DCShadow, and Azure AD Skeleton Keys. We’ll show you how these attacks work and then give you actionable steps to find and fix dozens of AD misconfigurations that hackers love to exploit. 

What you'll learn:

  •  How attacks like Kerberoasting and DCShadow are carried out 
  •  What to monitor in your Active Directory 
  •  How to perform an AD health check using PowerShell scripts 
Bradley_Bosher_circlePNG
Bradley Bosher Senior Systems Engineer, Varonis

Brad is Senior Systems Engineer working with enterprise customers in the UK. His previous experience includes working on Big Data analytics across unstructured data sets.

accent
REQUEST A DEMO

Explore our blog