accent 1 accent 2
Icon-Check@3x
+1 CPE Virtual Connect! Replay

Say Goodbye to
(h)Active Directory

On-Demand

Active Directory is hard for administrators to protect and easy for attackers to exploit. AD also holds the keys to your IT kingdom. 

 

Join us as we demonstrate three common Active Directory & Azure AD attacks and show you how you can effectively spot misconfigurations and other vulnerabilities. 

 

 

Replay

Watch Now

About this webinar...

See how attackers exploit Active Directory using attacks like KerberoastingDCShadow, and Azure AD Skeleton Keys. We’ll show you how these attacks work and then give you actionable steps to find and fix dozens of AD misconfigurations that hackers love to exploit. 

What you'll learn:

  •  How attacks like Kerberoasting and DCShadow are carried out 
  •  What to monitor in your Active Directory 
  •  How to perform an AD health check using PowerShell scripts 

kilianenglertcircle
Kilian Englert Technical Marketing Manager, Varonis
Brian Vecci_circle
Brian Vecci Field CTO, Varonis
Headshot_DavidGibson_SQ-1
David Gibson Chief Marketing Officer, Varonis

Compete against your peers in a game of Varonis AD Trivia! 10 of our highest scoring attendees will win a $250 Amazon Gift Card

Amazon250
$250 USD Amazon Gift Card

“We found a legacy security group that was probably created years ago that provided our desktop users with excessive permissions on accounts in Active Directory. If DatAlert hadn’t told us about it, I’m not sure we would have ever found it.” 

- Ruben Justiniano, Virginia Credit Union

Want to see Varonis in action?

Request a demo