Motomo

  • All
  • Cloud
    • Solutions
    • Virtualization
  • Data
    • Analytics
    • Big Data
    • Customer Data Platform
  • Digital
    • Digital Marketing
    • Social Media Marketing
  • Finance
    • Cost Management
    • Risk & Compliance
  • Human Resources
    • HR Solutions
    • Talent Management
  • IT Infra
    • App Management Solutions
    • Best Practices
    • Datacenter Solutions
    • Infra Solutions
    • Networking
    • Storage
    • Unified Communication
  • Mobility
  • Sales & Marketing
    • Customer Relationship Management
    • Sales Enablement
  • Security
  • Tech
    • Artificial Intelligence
    • Augmented Reality
    • Blockchain
    • Chatbots
    • Internet of Things
    • Machine Learning
    • Virtual Reality
Designing Privileged Access Workstations (PAWs) in an Active Directory Tier-0 Environment

Designing Privileged Access Workstations (PAWs) in an Active Directory Tier-0 Environment

Tenable
Published by: Research Desk Released: Jun 14, 2022

Agenda:

Privileged Access Workstations (PAWs) are an essential part of the process of securing an Active Directory infrastructure. The purpose of this webinar is to provide a guide to the IT community on how to design, deploy and maintain PAWs at the Tier-0 level. Indeed, the PAW concept is applicable to all Tiers of an Active Directory environment, but if we can consider that it is possible to do without dedicated administration stations on Tier-1 and Tier-2 it is absolutely necessary to devote time to a PAWs deployment project for Tier-0.
First, we will provide an explanation of the prerequisites for the Active Directory design, followed by the configurations to be carried out concerning users and groups (access restrictions, administration groups, etc.).
Following this part, the physical security will be covered with, among others, the configuration for System Guard and BitLocker.
Then we will cover the network security, mainly focused on the configuration of the Firewall and the different authorized flows.
Finally, we will focus on system security (based on the CIS standards) and on the monitoring part.

Speaker:
Sylvain Cortes

Title: Security Strategist @ Tenable, 16 times Microsoft MVP

Bio: Sylvain Cortes is an Identity & Access Management (IAM) and cybersecurity expert. He works mainly with large organizations to execute identity and directories governance projects, including authentication processes, cross-OS privileges management, cloud identity management, and Active Directory cybersecurity. He has developed a deep expertise in AD bridge projects integrating Active Directory with various operating systems like Unix, Linux, and MacOS. Sylvain has been a Microsoft MVP in Active Directory, MIM, and Identity & Access for 16 years.

Welcome Dear

Thank you for your interest and your registration with Teradata. Please confirm your e-mail address to complete your registration by clicking here

Yes, confirm my

By confirming this, you give Teradata your consent to send you information on our data analytics products and services or invitations to events and webinars by e-mail from time to time. You can revoke this consent at any time by clicking on the unsubscribe link at the bottom of each of our e-mails. We assure you that we treat your contact details with the utmost care. Detailed information on how we store and use your personal data or how you can exercise your rights regarding your personal data can be found in the global Teradata Privacy Policy.