Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to identify and counter Microsoft Configuration Manager attack vectors in this 38-minute conference talk that explores detection mechanisms and evasion techniques used by threat actors targeting SCCM environments. Discover how attackers exploit Configuration Manager infrastructure to move laterally through networks, escalate privileges, and maintain persistence while examining defensive strategies and monitoring approaches to protect against these sophisticated attack paths. Gain practical insights into the security implications of Configuration Manager deployments and develop skills to implement effective detection rules and security controls that can identify malicious activity within SCCM systems before attackers can achieve their objectives.
Syllabus
Detections and Evasions for Configuration Manager Attack Paths - Joshua Prager
Taught by
BSides SATX