No matter the type of attack or the initial attack vector, eventually threat actors need access to an endpoint to establish persistence and to serve as the launch point for any privilege escalation and lateral movement. And because every attacker’s capabilities are limited by the operating system they compromise, Windows remains a favorite target, with its’ many means of running code, traversing systems, and elevating privileges. A recent report showed that as many as 1 in 8 cyberattacks make it past security solutions and reach the endpoint, placing the battle for access to your environment squarely on your Windows’ endpoints. And while organizations like yours have endpoint solutions, not every solution provides the same levels of protection, making it necessary to take advantage of every means to secure the environment – which includes any native lockdown capabilities within Windows. So, just how well can native management solutions from Microsoft secure the Windows endpoint? In this Real Training for Free session, 4-time Microsoft MVP, Nick Cavalancia takes my seat as he first discusses: The reality of attacks reaching the endpoint Just how insecure is the default Windows endpoint? What MITRE has to say about the misuse of a compromised Windows endpoint Next up, you’ll hear from 18-time Microsoft MVP, Jeremy Moskowitz, as he covers the native limitations to consider when using Windows’ built-in policy management tools to secure the endpoint. Jeremy will also share practical strategies to address them. The session will focus on the limitations of the following native Windows endpoint management tools: - Local Administrator Password Service (LAPS) - USB GPO policy - Applocker - And more Jeremy will also discuss exploring alternative approaches and third-party solutions to optimize policy deployment. This Real Training for Free session will be chock full of practical, real-world content! Register now!

Hora

17:00 - 18:00 hs GMT+1

Organizador

Netwrix
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Mayo / 2025 350 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 28 de Mayo de 2025
Mar 29 de Mayo de 2025
Mié 30 de Mayo de 2025
Jue 01 de Mayo de 2025
Vie 02 de Mayo de 2025
Sáb 03 de Mayo de 2025
Dom 04 de Mayo de 2025
Lun 05 de Mayo de 2025
Mar 06 de Mayo de 2025
Mié 07 de Mayo de 2025
Jue 08 de Mayo de 2025
Vie 09 de Mayo de 2025
Sáb 10 de Mayo de 2025
Dom 11 de Mayo de 2025
Lun 12 de Mayo de 2025
Mar 13 de Mayo de 2025
Mié 14 de Mayo de 2025
Jue 15 de Mayo de 2025
Vie 16 de Mayo de 2025
Sáb 17 de Mayo de 2025
Dom 18 de Mayo de 2025
Lun 19 de Mayo de 2025
Mar 20 de Mayo de 2025
Mié 21 de Mayo de 2025
Jue 22 de Mayo de 2025
Vie 23 de Mayo de 2025
Sáb 24 de Mayo de 2025
Dom 25 de Mayo de 2025
Lun 26 de Mayo de 2025
Mar 27 de Mayo de 2025
Mié 28 de Mayo de 2025
Jue 29 de Mayo de 2025
Vie 30 de Mayo de 2025
Sáb 31 de Mayo de 2025
Dom 01 de Mayo de 2025

Publicidad

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado