Do common centralized IT access policies create any security risks, and are there alternatives?

Many large companies have IT policies where even low-level IT employees have privileges such as remote access to any company computer (often automatic, able to override user denial, or even silent), or administrative access to any company … Continue reading Do common centralized IT access policies create any security risks, and are there alternatives?

Administrator escalating to SYSTEM in the normal course of things

I am learning about interacting with Kerberos from a programming standpoint and have been recreating some of Rubeus’s functions as a way of learning (because what better open source program is there that deals with Kerberos and tickets). O… Continue reading Administrator escalating to SYSTEM in the normal course of things