Active Directory Kerberoasting Attack: Monitoring and Detection Techniques

Active Directory Kerberoasting Attack Detection.

Key Takeaways.

  1. Windows Authentication Overview
  2. Monitoring Approach
  3. Event ID’s to Correlate with SIEM
  4. Detection Scenarios

Download the PDF here!