Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and Tasks




Taste of Premier   (MP4) - Channel 9 show

Summary: Privileged Access Workstations (PAWs) provide a dedicated operating system for sensitive tasks that is protected from Internet attacks and threat vectors. Separating these sensitive tasks and accounts from the daily use workstations and devices provides very strong protection from phishing attacks, application and OS vulnerabilities, various impersonation attacks, and credential theft attacks such as keystroke logging, Pass-the-Hash, and Pass-The-Ticket. Join Lex Thomas and John Rodriguez as they provide a detailed overview as well as deployment scenario considerations you should take with PAWs. [1:10] What’s a Privileged Access Workstation and how can it benefit my organization?[17:30] How can users implement this in their org?[27:23] Can you describe some PAW Deployment models?Need more info? Check out http://aka.ms/CyberPAW Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Digital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security Progr