About this webinar

See how attackers exploit Active Directory using attacks like KerberoastingDCShadow, and Azure AD Skeleton Keys. We’ll show you how these attacks work and then give you actionable steps to find and fix dozens of AD misconfigurations that hackers love to exploit. 

What you'll learn:

  •  How attacks like Kerberoasting and DCShadow are carried out 
  •  What to monitor in your Active Directory 
  •  How to perform an AD health check using PowerShell scripts 
Antonio_Soriano
Antonio Soriano Systems Engineer, Varonis

Antonio possesses over 19 years of experience in ICT focusing on IT Security, IT Infrastructure and R&D Lab. For the past 7 years, Antonio has been focusing on helping organizations address the business issues with respect to data privacy, security, and management in APAC and South Korea region. Prior to joining Varonis, he has previously held positions in Dell/EMC (Singapore), Wincor-Nixdorf (Singapore) and Jollibee Foods Corporation (Philippines) from end-user, technical lead to infra manager.

accent
REQUEST A DEMO

Explore our blog