For the best web experience, please use IE11+, Chrome, Firefox, or Safari

One Identity Resilience On Demand: Active Directory Management (ADM)

Although One Identity Resilience 2022 has come to an end, you can access any of the Active Directory Management (ADM) sessions from the conference. Just pick the sessions you’re interested in and get a refresher on the ADM topics.

Select your events


On Demand

Nov.

30

Protecting identities and accounts is obviously critical to protect the data they hold within them. Adding multi-factor authentication ensures a better security posture and reduces the likelihood of a successful account breach. If an organization has not implemented multi-factor authentication for it's user population, it's a bit like leaving your wallet or purse on a park bench and expecting it to not be stolen. 

Many organizations protect their cloud and on-premise applications using MFA today, but what about MS Windows devices? By combining Defender and OneLogin, cloud-based MFA can be used to further protect desktop devices.

In this session, we will show you how to use OneLogin within your Defender implementation to provide strong desktop authentication to AD and authentication to cloud applications, while creating a seamless user experience.

On Demand

Nov.

30

Active Directory is still a well-known attack vector for bad actors attempting to exploit large organizations. Since AD touches almost everything, and privileged accounts in AD can have a far-reaching impact, it becomes an obvious target. When an attacker compromises a user account or workstation, the next step is to elevate privileges. In this session, Dan Conrad demonstrates a Pass-the-Hash breach against a privileged account in Active Directory using common exploit methods and AJ Lindner will walk through an Active Roles implementation specifically designed to mitigate this vulnerability using just-in-time privilege elevation. This Active Roles/Safeguard integration is specifically designed to reduce the vulnerabilities related to privilege escalation attacks and adds a Zero Trust security layer to Active Directory. 

On Demand

Nov.

30

Multi-factor authentication is becoming a common security layer across all levels of access control because it works. It just makes sense to add MFA to our critical enterprise applications, like Active Roles. Removing system-provided delegation points in AD and setting up a true least-privilege delegation model is the core functionality of Active Roles, so adding MFA to the admin interfaces ensures strong authentication to the administration of the organization's most critical asset: Active Directory. In this session, AJ Lindner walks you through setting up the Active Roles web interfaces to use MFA and Rich Hosgood shows how to implement MFA to the Active Roles MMC (or any type of admin interface) using Safeguard for Privileged Sessions. 

On Demand

Nov.

30

Learn how a security officer approaches protection strategies to remain vigilant and cut off the angles of potential attacks. Strong policies must be implemented consistently and automated to mitigate risk in your Active Directory strategy.

Select one or more relevant webcast(s) you wish to attend before you register.

Please wait...

triangle-down check
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.