Thanks for the insights! Three questions regarding ADSecure (around 38:26 mm:ss in the video): how do you differenciate between a legitimate AD query and an adversary's one? And what component (on the endpoint?) replaces the real data (e.g. domain admins) with faked data?
Hi, thanks for the question. We’d be more than happy to arrange a call with one of our engineers to discuss this with you. If you would like to share your details with us to arrange this please email sales@switchshop.co.uk and quote this video. Thank you!