In the previous section, we learned about how AD authentication works. As we saw, the Kerberos protocol itself was built to prevent identity compromise. This is all good on paper, but in reality, attackers use many methods and tools to attack AD environments. Therefore, it is important to know the features, techniques, and tools that we can use to protect AD environments further.
In an AD environment, there are different types of management tasks. Managing domain controllers, adding/managing/removing users, adding/managing/removing groups, resetting passwords, and adding devices to computers are just some examples. In a structured IT department, these management tasks can be bound to different job roles.
As an example, let's assume that Rebeladmin Corp.'s IT department has first-line (first support contact), second-line (intermediate), and third...