Restricted admin mode for RDP

In a typical identity infrastructure attack, the first target is usually a regular user account or an endpoint. This is because highly privileged accounts and critical systems have advanced protection compared to end user devices. In most environments, these systems and accounts are constantly monitored and there is a high possibility that engineers recognize unauthorized login attempts or unusual behavior quickly. A typical end user account does not have the privileges or capabilities to do much damage, but a privileged account does. Once an attacker completes a successful initial breach, the next thing they are looking to do is to get their hands on the privileged account.

If they start to mess around in an ...

Get Mastering Active Directory - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.