In every organization there exists a somewhat
buried but very dangerous keyhole, that is the presence of administrative
accounts which are not part of the Domain Users. Those accounts are actually
hidden from the IT manager’s standard tracked list of domain administrative
accounts and can be used by malware to install malicious software on local
computers through the “local” administrator account. Further penetration
into the IT environment is then accessible by capturing passwords, including
passwords for access to critical data. It is essential that IT
security and operations managers have a method for mitigating this risk.
Sign-up today for our 35 minute live demo session
featuring our free tool Local Admin Discovery that allows you to discover user
accounts and groups that are members of the local “Administrators” built-in
user group on computers in your Windows domain.
Reserve your seat today by signing up here.
Wednesday January 4th, 2012