An 8-Step Guide to Administering Windows without Domain Admin Privileges

Russell Smith, Security Expert, IT consultant

About this White Paper

Cut Off Attackers’ Privileged Access to Windows Systems

Hackers crave access to Active Directory (AD) because it provides a gateway to access the entire Windows IT infrastructure. With privileged access to domain controllers (DCs), malicious actors can hide their tracks, while covertly infiltrating the deepest levels of a compromised IT infrastructure. In this how-to guide, Windows security expert and book author, Russell Smith, examines how to efficiently administer Windows systems without using privileged domain accounts, enabling you to drastically reduce your organization’s threat surface.

In this how-to guide, you’ll learn:

      • New mitigation features in Microsoft Windows version 10 that can help you protect domain accounts
      • 8 techniques you can apply to your Windows systems to improve your privileged access security
      • How BeyondTrust solutions can help you address your Windows privilege management use cases, and more

Need to improve security on your Windows endpoints? Download this guide today.

document

Russell Smith, Security Expert, IT consultant

Windows & IT Security Expert
Russell Smith specializes in the management and security of Microsoft-based IT systems. In addition to being a Contributing Editor at the Petri IT Knowledgebase and is an instructor at Pluralsight. Russell has more than 13 years of experience in IT, and has written a book on Windows security, co-authored one for Microsoft?s Official Academic Course (MOAC) series, and was a regular contributor at Windows IT Professional magazine.