Deploying PAWs as Part of a Strategy to Limit Credential Theft and Lateral Movement

Deploying PAWs as Part of a Strategy to Limit Credential Theft and Lateral Movement

via YouTube Direct link

PAW DEPLOYMENT PAIRS WILL WITH NETWORK SEGMENTATION

28 of 32

28 of 32

PAW DEPLOYMENT PAIRS WILL WITH NETWORK SEGMENTATION

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Deploying PAWs as Part of a Strategy to Limit Credential Theft and Lateral Movement

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 WHEN NOT COMPUTERING...
  3. 3 ATTACK SCENARIO #2
  4. 4 WINDOWS LOGON TYPES
  5. 5 LOCAL SAM DATABASE
  6. 6 ACTIVE DIRECTORY DATABASE
  7. 7 LSA SECRETS
  8. 8 CREDENTIAL MANAGER
  9. 9 WINDOWS CREDENTIAL & AUTH ISSUES
  10. 10 STEALING WINDOWS ACCESS TOKENS
  11. 11 WINDOWS CRED & AUTH ISSUES
  12. 12 INTRODUCING PAWS
  13. 13 ACTIVE DIRECTORY ADMINISTRATIVE TIER MODEL
  14. 14 LOGON RESTRICTIONS
  15. 15 TRADITIONAL SOLUTIONS - JUMP SERVERS
  16. 16 PAW PREREQUISITES
  17. 17 PHASES OF DEPLOYMENT
  18. 18 PAW DEPLOYMENT MODELS
  19. 19 DEPLOY PAW ACTIVE DIRECTORY FRAMEWORK
  20. 20 PAW COMPUTER ACCOUNT GPOs
  21. 21 PAW USER GPOS
  22. 22 PAW GPOS - DENY LOWER TIER LOGON
  23. 23 RESTRICTED ADMIN)
  24. 24 PAW SETUP - PHASE 2
  25. 25 MULTI-FACTOR)
  26. 26 PAW SETUP - PHASE 3 (PROTECTED USERS)
  27. 27 LESSONS LEARNED FROM MY DEPLOYMENT
  28. 28 PAW DEPLOYMENT PAIRS WILL WITH NETWORK SEGMENTATION
  29. 29 NETWORK SEGMENTATION (LAYER3)
  30. 30 FURTHER LIMITING EXPOSURE TO CREDENTIAL THEFT AND LATERAL MOVEMENT
  31. 31 CLOSING
  32. 32 QUESTIONS/CONTACT

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.