During an intrusion, adversaries will need to expand their access beyond the initial victim and control different systems within the target network to achieve their goal. This set of techniques that allow remote code execution are known as Lateral Movement.
In this tech talk, we will cover the most common Lateral Movement techniques affecting Microsoft environments and how to detect this behavior using Splunk.
Tune in to this webinar to learn about:
Principal Threat Research Engineer