

Active Directory Security and Configuration Best Practices with Victor King: Practical 365 Podcast S04E40
17 snips Jun 13, 2025
Victor King, the Technical Product Manager for Security Guardian at Quest, shares his expertise on Active Directory security. He emphasizes identifying misconfigurations in AD setups and the importance of effective privileged access management. King advocates for continuous environmental monitoring to maintain system integrity and prevent vulnerabilities. The conversation also touches on establishing a solid cybersecurity foundation, highlighting the need for basic monitoring tools before tackling advanced solutions. His insights aim to bolster defenses in an increasingly complex cyber landscape.
AI Snips
Chapters
Transcript
Episode notes
Complex Vendor Privilege Negotiations
- Overprivileged application accounts often spark long vendor negotiations about needed rights.
- Steve Goodman shared how these dialogues can drag due to unclear privilege requirements and vendor debate.
Inventory Privileged Access
- Start securing AD by taking a full inventory of privileged accounts and configurations.
- Use available tools to identify misconfigurations and shadow privileges needing review.
Use Behavioral Auditing
- Monitor Active Directory audit logs to detect unusual admin behaviors or overprivileged accounts.
- Apply behavioral analysis to differentiate legitimate from suspect activities in your environment.