Researchers Explore Active Directory Attack Vectors![](https://eu-images.contentstack.com/v3/assets/blt07f68461ccd75245/blted5e2fb1f97b75c7/66180486472cd20bd99fdd7c/cyber_20security_20incident_20response_20plan.jpg?width=700&auto=webp&quality=80&disable=upscale)
Active Directory![](https://eu-images.contentstack.com/v3/assets/blt07f68461ccd75245/blted5e2fb1f97b75c7/66180486472cd20bd99fdd7c/cyber_20security_20incident_20response_20plan.jpg?width=700&auto=webp&quality=80&disable=upscale)
Researchers Explore Active Directory Attack VectorsResearchers Explore Active Directory Attack Vectors
Incident responders who investigate attacks targeting Active Directory discuss methods used to gain entry, elevate privileges, and control target systems.
Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.