Privileged Access Workstations (PAWs) provide a dedicated operating system for sensitive tasks that is protected from Internet attacks and threat vectors. Separating these sensitive tasks and accounts from the daily use workstations and devices provides very strong protection from phishing attacks, application and OS vulnerabilities, various impersonation attacks, and credential theft attacks such as keystroke logging, Pass-the-Hash, and Pass-The-Ticket.
Join Lex Thomas and John Rodriguez as they provide a detailed overview as well as deployment scenario considerations you should take with PAWs.
- [1:10] What’s a Privileged Access Workstation and how can it benefit my organization?
- [17:30] How can users implement this in their org?
- [27:23] Can you describe some PAW Deployment models?
Need more info? Check out http://aka.ms/CyberPAW
Send your comments or questions to the “Taste of Premier” Podcast show!
Follow the conversation @TasteofPremier
Become a Fan @ Facebook.com/PremierSupport
Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS
Experience Microsoft’s latest products with these FREE downloads!
Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now!
Websites & Blogs:
- Digital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from Malware
- How to Mitigate Pass-the-Hash and Other Forms of Credential Theft
- Securing your Desktop: How a Threat Becomes a Security Patch
- Microsoft Security Risk Assessment – How to Optimize Your IT Security Program
- Microsoft Threat Detection Service Overview
- Cybersecurity Incident Response
- Securing Your Active Directory Environment
- Protect Your Enterprise with the Enhanced Mitigation Experience Toolkit
- Proactively Secure your IT Environment from Credential Theft with POP-SLAM
- Ransomware 101: How to Protect and Mitigate your environment from Malware