{"id":3118,"date":"2024-09-11T12:02:53","date_gmt":"2024-09-11T10:02:53","guid":{"rendered":"https:\/\/www.solutions-exchange.fr\/?p=3118"},"modified":"2024-09-11T12:05:30","modified_gmt":"2024-09-11T10:05:30","slug":"les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter","status":"publish","type":"post","link":"https:\/\/www.solutions-exchange.fr\/index.php\/2024\/09\/11\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\/","title":{"rendered":"Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter"},"content":{"rendered":"<h5 class=\"eut-title eut-heading-color eut-h5\">Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter<\/h5>\n<div class=\"eut-element eut-text\">\n<div class=\"eut-element eut-text\">\n<p class=\"eut-description\">C\u2019est la rentr\u00e9e, toute l\u2019\u00e9quipe Solutions Exchange a le plaisir de vous retrouver en vous proposant de nouveaux webinaires dont les sujets ont \u00e9t\u00e9 choisis \u00e0 l\u2019\u00e9coute de vos besoins.<br \/>\nPourquoi participer \u00e0 ce webinaire ?<br \/>\nL\u2019Active Directory est le c\u0153ur de votre organisation et constitue toujours la cible principale.<br \/>\nNe laissons aucune faille que les attaquants pourraient exploiter pour s\u2019introduire dans vos infrastructures.<br \/>\nDans ce webinaire, nous allons examiner 3 vuln\u00e9rabilit\u00e9s de l\u2019Active Directory souvent n\u00e9glig\u00e9es et fr\u00e9quemment exploit\u00e9es par des actions malveillantes.<br \/>\nNous discuterons de la mani\u00e8re dont ces vuln\u00e9rabilit\u00e9s peuvent \u00eatre d\u00e9tect\u00e9es \u00e0 l\u2019aide d\u2019outils natifs et nous verrons comment ces menaces peuvent \u00eatre \u00e9vit\u00e9es gr\u00e2ce \u00e0 une solution SIEM et les avantages de ce choix.<\/p>\n<p>Agenda :<br \/>\nVuln\u00e9rabilit\u00e9s de l\u2019Active Directory \u00e0 surveiller :<\/p>\n<p>Comptes d\u2019utilisateurs non privil\u00e9gi\u00e9s avec des permissions \u00e9lev\u00e9es.<br \/>\nMots de passe faibles, mots de passe non expirants, et comptes utilisateurs sans mot de passe requis.<br \/>\nIdentifiants stock\u00e9s dans SYSVOL et les pr\u00e9f\u00e9rences de strat\u00e9gie de groupe (GPP).<\/p>\n<p>D\u00e9tection de ces vuln\u00e9rabilit\u00e9s AD :<\/p>\n<p>Comment chacune de ces vuln\u00e9rabilit\u00e9s peut-elle \u00eatre d\u00e9tect\u00e9e \u00e0 l\u2019aide de PowerShell ?<br \/>\n\u00c0 quel point serait-t-il plus simple et plus facile de d\u00e9tecter ces \u00e9v\u00e9nements \u00e0 l\u2019aide d\u2019un outil SIEM ?<\/p>\n<\/div>\n<p>Retrouvez ce webinar en <a href=\"https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-acces-video-3-vulnerabilites\/\" target=\"_blank\" rel=\"noopener\">cliquant ici<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter C\u2019est la rentr\u00e9e, toute l\u2019\u00e9quipe Solutions Exchange a le plaisir de vous retrouver en vous proposant de nouveaux webinaires dont les sujets ont \u00e9t\u00e9 choisis \u00e0 l\u2019\u00e9coute de vos besoins. Pourquoi participer \u00e0 ce webinaire ? L\u2019Active Directory est le c\u0153ur [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-3118","post","type-post","status-publish","format-standard","hentry","category-non-classe"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter - Solutions Exchange<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.solutions-exchange.fr\/index.php\/2024\/09\/11\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter - Solutions Exchange\" \/>\n<meta property=\"og:description\" content=\"Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter C\u2019est la rentr\u00e9e, toute l\u2019\u00e9quipe Solutions Exchange a le plaisir de vous retrouver en vous proposant de nouveaux webinaires dont les sujets ont \u00e9t\u00e9 choisis \u00e0 l\u2019\u00e9coute de vos besoins. Pourquoi participer \u00e0 ce webinaire ? L\u2019Active Directory est le c\u0153ur [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.solutions-exchange.fr\/index.php\/2024\/09\/11\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\/\" \/>\n<meta property=\"og:site_name\" content=\"Solutions Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-11T10:02:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-11T10:05:30+00:00\" \/>\n<meta name=\"author\" content=\"admin6583\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin6583\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/2024\\\/09\\\/11\\\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/2024\\\/09\\\/11\\\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\\\/\"},\"author\":{\"name\":\"admin6583\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/#\\\/schema\\\/person\\\/6e8ef64a940bffa278eab98677a094bc\"},\"headline\":\"Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter\",\"datePublished\":\"2024-09-11T10:02:53+00:00\",\"dateModified\":\"2024-09-11T10:05:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/2024\\\/09\\\/11\\\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\\\/\"},\"wordCount\":276,\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/2024\\\/09\\\/11\\\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\\\/\",\"url\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/2024\\\/09\\\/11\\\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\\\/\",\"name\":\"Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter - Solutions Exchange\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/#website\"},\"datePublished\":\"2024-09-11T10:02:53+00:00\",\"dateModified\":\"2024-09-11T10:05:30+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/#\\\/schema\\\/person\\\/6e8ef64a940bffa278eab98677a094bc\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/2024\\\/09\\\/11\\\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/2024\\\/09\\\/11\\\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/2024\\\/09\\\/11\\\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/#website\",\"url\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/\",\"name\":\"Solutions Exchange\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/#\\\/schema\\\/person\\\/6e8ef64a940bffa278eab98677a094bc\",\"name\":\"admin6583\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f96ab369c1e97c5b395d2ae955910140e6277802efa77e11f5def2c18da60909?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f96ab369c1e97c5b395d2ae955910140e6277802efa77e11f5def2c18da60909?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f96ab369c1e97c5b395d2ae955910140e6277802efa77e11f5def2c18da60909?s=96&d=mm&r=g\",\"caption\":\"admin6583\"},\"sameAs\":[\"http:\\\/\\\/dxsjkub.cluster028.hosting.ovh.net\"],\"url\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/author\\\/admin6583\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter - Solutions Exchange","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.solutions-exchange.fr\/index.php\/2024\/09\/11\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\/","og_locale":"fr_FR","og_type":"article","og_title":"Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter - Solutions Exchange","og_description":"Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter C\u2019est la rentr\u00e9e, toute l\u2019\u00e9quipe Solutions Exchange a le plaisir de vous retrouver en vous proposant de nouveaux webinaires dont les sujets ont \u00e9t\u00e9 choisis \u00e0 l\u2019\u00e9coute de vos besoins. Pourquoi participer \u00e0 ce webinaire ? L\u2019Active Directory est le c\u0153ur [&hellip;]","og_url":"https:\/\/www.solutions-exchange.fr\/index.php\/2024\/09\/11\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\/","og_site_name":"Solutions Exchange","article_published_time":"2024-09-11T10:02:53+00:00","article_modified_time":"2024-09-11T10:05:30+00:00","author":"admin6583","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin6583","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.solutions-exchange.fr\/index.php\/2024\/09\/11\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\/#article","isPartOf":{"@id":"https:\/\/www.solutions-exchange.fr\/index.php\/2024\/09\/11\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\/"},"author":{"name":"admin6583","@id":"https:\/\/www.solutions-exchange.fr\/#\/schema\/person\/6e8ef64a940bffa278eab98677a094bc"},"headline":"Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter","datePublished":"2024-09-11T10:02:53+00:00","dateModified":"2024-09-11T10:05:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.solutions-exchange.fr\/index.php\/2024\/09\/11\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\/"},"wordCount":276,"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.solutions-exchange.fr\/index.php\/2024\/09\/11\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\/","url":"https:\/\/www.solutions-exchange.fr\/index.php\/2024\/09\/11\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\/","name":"Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter - Solutions Exchange","isPartOf":{"@id":"https:\/\/www.solutions-exchange.fr\/#website"},"datePublished":"2024-09-11T10:02:53+00:00","dateModified":"2024-09-11T10:05:30+00:00","author":{"@id":"https:\/\/www.solutions-exchange.fr\/#\/schema\/person\/6e8ef64a940bffa278eab98677a094bc"},"breadcrumb":{"@id":"https:\/\/www.solutions-exchange.fr\/index.php\/2024\/09\/11\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.solutions-exchange.fr\/index.php\/2024\/09\/11\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.solutions-exchange.fr\/index.php\/2024\/09\/11\/les-3-vulnerabilites-les-plus-souvent-negligees-dans-active-directory-et-comment-les-detecter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.solutions-exchange.fr\/"},{"@type":"ListItem","position":2,"name":"Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter"}]},{"@type":"WebSite","@id":"https:\/\/www.solutions-exchange.fr\/#website","url":"https:\/\/www.solutions-exchange.fr\/","name":"Solutions Exchange","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.solutions-exchange.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.solutions-exchange.fr\/#\/schema\/person\/6e8ef64a940bffa278eab98677a094bc","name":"admin6583","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/f96ab369c1e97c5b395d2ae955910140e6277802efa77e11f5def2c18da60909?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f96ab369c1e97c5b395d2ae955910140e6277802efa77e11f5def2c18da60909?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f96ab369c1e97c5b395d2ae955910140e6277802efa77e11f5def2c18da60909?s=96&d=mm&r=g","caption":"admin6583"},"sameAs":["http:\/\/dxsjkub.cluster028.hosting.ovh.net"],"url":"https:\/\/www.solutions-exchange.fr\/index.php\/author\/admin6583\/"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"zuperla-eutf-large-rect-horizontal":false,"zuperla-eutf-small-square":false,"zuperla-eutf-small-rect-horizontal":false,"zuperla-eutf-small-rect-vertical":false,"zuperla-eutf-medium-square":false,"zuperla-eutf-medium-rect-horizontal":false,"zuperla-eutf-medium-rect-vertical":false,"zuperla-eutf-fullscreen":false},"uagb_author_info":{"display_name":"admin6583","author_link":"https:\/\/www.solutions-exchange.fr\/index.php\/author\/admin6583\/"},"uagb_comment_info":0,"uagb_excerpt":"Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter C\u2019est la rentr\u00e9e, toute l\u2019\u00e9quipe Solutions Exchange a le plaisir de vous retrouver en vous proposant de nouveaux webinaires dont les sujets ont \u00e9t\u00e9 choisis \u00e0 l\u2019\u00e9coute de vos besoins. Pourquoi participer \u00e0 ce webinaire ? L\u2019Active Directory est le c\u0153ur\u2026","_links":{"self":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/posts\/3118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/comments?post=3118"}],"version-history":[{"count":3,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/posts\/3118\/revisions"}],"predecessor-version":[{"id":3121,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/posts\/3118\/revisions\/3121"}],"wp:attachment":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/media?parent=3118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/categories?post=3118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/tags?post=3118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}