Episode
Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and Tasks
Privileged Access Workstations (PAWs) provide a dedicated operating system for sensitive tasks that is protected from Internet attacks and threat vectors. Separating these sensitive tasks and accounts from the daily use workstations and devices provides very strong protection from phishing attacks, application and OS vulnerabilities, various impersonation attacks, and credential theft attacks such as keystroke logging, Pass-the-Hash, and Pass-The-Ticket.
Join Lex Thomas and John Rodriguez as they provide a detailed overview as well as deployment scenario considerations you should take with PAWs.
- [1:10] What’s a Privileged Access Workstation and how can it benefit my organization?
- [17:30] How can users implement this in their org?
- [27:23] Can you describe some PAW Deployment models?
Need more info? Check out here
Send your comments or questions to the "Taste of Premier" Podcast show!
Follow the conversation @TasteofPremier
Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS
__________________________
Build Your Lab!
Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now!
Don't Have a Lab?
Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download
__________________________
Websites & Blogs:
Videos:
- Digital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from Malware
- How to Mitigate Pass-the-Hash and Other Forms of Credential Theft
- Securing your Desktop: How a Threat Becomes a Security Patch
- Microsoft Security Risk Assessment - How to Optimize Your IT Security Program
- Microsoft Threat Detection Service Overview
- Cybersecurity Incident Response
- Securing Your Active Directory Environment
- Protect Your Enterprise with the Enhanced Mitigation Experience Toolkit
- Proactively Secure your IT Environment from Credential Theft with POP-SLAM
- Ransomware 101: How to Protect and Mitigate your environment from Malware
Privileged Access Workstations (PAWs) provide a dedicated operating system for sensitive tasks that is protected from Internet attacks and threat vectors. Separating these sensitive tasks and accounts from the daily use workstations and devices provides very strong protection from phishing attacks, application and OS vulnerabilities, various impersonation attacks, and credential theft attacks such as keystroke logging, Pass-the-Hash, and Pass-The-Ticket.
Join Lex Thomas and John Rodriguez as they provide a detailed overview as well as deployment scenario considerations you should take with PAWs.
- [1:10] What’s a Privileged Access Workstation and how can it benefit my organization?
- [17:30] How can users implement this in their org?
- [27:23] Can you describe some PAW Deployment models?
Need more info? Check out here
Send your comments or questions to the "Taste of Premier" Podcast show!
Follow the conversation @TasteofPremier
Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS
__________________________
Build Your Lab!
Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now!
Don't Have a Lab?
Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download
__________________________
Websites & Blogs:
Videos:
- Digital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from Malware
- How to Mitigate Pass-the-Hash and Other Forms of Credential Theft
- Securing your Desktop: How a Threat Becomes a Security Patch
- Microsoft Security Risk Assessment - How to Optimize Your IT Security Program
- Microsoft Threat Detection Service Overview
- Cybersecurity Incident Response
- Securing Your Active Directory Environment
- Protect Your Enterprise with the Enhanced Mitigation Experience Toolkit
- Proactively Secure your IT Environment from Credential Theft with POP-SLAM
- Ransomware 101: How to Protect and Mitigate your environment from Malware
Have feedback? Submit an issue here.