SlideShare a Scribd company logo
1 of 2
Download to read offline
AD BRIDGE ADMINISTRATION
MAXIMIZE ROI WITH BEYONDTRUST UNIVERSITY TRAINING
BeyondTrust University training services are designed to maximize your investment in BeyondTrust technologies by educating your
users on best practices for configuring and using our products. Superior training is part of our commitment to help you obtain the
maximum benefit possible from the entire BeyondTrust solution. Our training options will give your organization the foundational
knowledge needed to administer, configure, and utilize BeyondTrust for optimum performance. You can select from a variety of
modular training courses to ensure your team receives relevant education.
BEYONDTRUST TRAINING FOR SECURITY
PROFESSIONALS
The AD Bridge Administration course is designed for the
security professional tasked with installation, administering,
monitoring and reporting on AD Bridge. Students learn how
to install the product’s components, connect a Unix host to
Active Directory, create and configure Group Policy Objects,
and configure Active Directory users for Unix/Linux logon via
console, SSH and Putty.
FLEXIBLE TRAINING OPTIONS: ON-SITE,
VIRTUAL OR ELEARNING
This course is available as a virtual instructor-led course or
on-site at your location. The course length is two days
on-site, or 12 hours over 3 days virtually. The course is led by
a BeyondTrust certified instructor. Earn up to 12 hours of
Continuing Professional Education credits (CPE).
							
KEY LEARNING OBJECTIVES
• Architecture Overview – understand the
architecture, traffic flow, and general functionality
of AD Bridge
• Initial Configuration – learn about the logging and
management tools of the AD Bridge and how to
configure them properly
• Extend Group Policy Objects (GPO) – understand
how to create GPO(s) to manage users and their
attributes automatically
• Manage Identity Agents – learn about the agent
services and how to manage them, and troubleshoot
issues using AD Bridge
Powered by PowerBroker Identity Services
Recording and material reproduction rights are not included. Train-the-Trainer courses are also available.
GET CERTIFIED BY BEYONDTRUST
Participants who successfully complete AD Bridge
Administration training are eligible to take the associated
BeyondTrust Certification exam.
ABOUT BEYONDTRUST
Bomgar is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing privilege-related
breaches. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud,
DevOps, and network device environments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve
compliance objectives, and boost operational performance. We are trusted by 20,000 customers and a global partner network. Learn more at
www.beyondtrust.com.
CONTACT I TRAINING@BEYONDTRUST.COM I BEYONDTRUST.COM
©2020 BEYONDTRUST
AD BRIDGE ADMINISTRATION
For Security Professionals
UNIT 1
Laying The
Foundation
Course Overview and objectives
LESSON 1: Technical Overview
LESSON 2: Deployment Overview
INTRODUCTION
LESSON 1: Installing Management Tools
LESSON 2: Provisioning Users
LESSON 3: Cells
LESSON 4: Agent Deployment
LESSON 1: GPO Configuration
LESSON 2 User Management
LESSON 1: Agent Architecture
LESSON 2: Troubleshooting Logins
LESSON 3: Agent Troubleshooting
LESSON 4: Troubleshooting SSO Logins
UNIT 2
Installation and
Configuration
UNIT 3
Group Policy &
Managing Users
UNIT 4
Managing
Identity Agents
CONFIGURE
POLICIES &
APPLICATIONS

More Related Content

Similar to AD-Bridge-course.pdf

Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdfSecurity, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdfssuser0a78bf
 
Cloud credential council presentation
Cloud credential council presentationCloud credential council presentation
Cloud credential council presentationshuangyinli
 
Identity Skills Offers Comprehensive CyberArk Training in Noida
Identity Skills Offers Comprehensive CyberArk Training in NoidaIdentity Skills Offers Comprehensive CyberArk Training in Noida
Identity Skills Offers Comprehensive CyberArk Training in Noidaidentityskills
 
thei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdfthei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdfIwan Setiawan
 
User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, DirectoryUbisecure
 
Flagship's Webinar for BigFix Users - Understanding the Post-Acquisition Worl...
Flagship's Webinar for BigFix Users - Understanding the Post-Acquisition Worl...Flagship's Webinar for BigFix Users - Understanding the Post-Acquisition Worl...
Flagship's Webinar for BigFix Users - Understanding the Post-Acquisition Worl...Trish E. McLoughlin
 
IGI - Solution presentation-DP
IGI - Solution presentation-DPIGI - Solution presentation-DP
IGI - Solution presentation-DPNeetu Gupta
 
Arx mindbusinessportfolio
Arx mindbusinessportfolioArx mindbusinessportfolio
Arx mindbusinessportfoliopankaj joshi
 
WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
 WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021 WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021Purdicom
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfSymptai Consulting Limited
 
1cloudstar cloud track.v1.0
1cloudstar cloud track.v1.01cloudstar cloud track.v1.0
1cloudstar cloud track.v1.01CloudStar
 
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteReduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteMicrosoft Private Cloud
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3EnterpriseGRC Solutions, Inc.
 
Camo Tech Services March09
Camo Tech Services March09Camo Tech Services March09
Camo Tech Services March09sreejithm
 
Sci capabilities fed dec 2014
Sci capabilities fed dec 2014Sci capabilities fed dec 2014
Sci capabilities fed dec 2014Iqbal Tareen
 

Similar to AD-Bridge-course.pdf (20)

Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
T/DG | Corporate Brochure
T/DG | Corporate BrochureT/DG | Corporate Brochure
T/DG | Corporate Brochure
 
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdfSecurity, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
 
Cloud credential council presentation
Cloud credential council presentationCloud credential council presentation
Cloud credential council presentation
 
Identity Skills Offers Comprehensive CyberArk Training in Noida
Identity Skills Offers Comprehensive CyberArk Training in NoidaIdentity Skills Offers Comprehensive CyberArk Training in Noida
Identity Skills Offers Comprehensive CyberArk Training in Noida
 
thei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdfthei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdf
 
User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, Directory
 
EDU Infosystem
EDU InfosystemEDU Infosystem
EDU Infosystem
 
Flagship's Webinar for BigFix Users - Understanding the Post-Acquisition Worl...
Flagship's Webinar for BigFix Users - Understanding the Post-Acquisition Worl...Flagship's Webinar for BigFix Users - Understanding the Post-Acquisition Worl...
Flagship's Webinar for BigFix Users - Understanding the Post-Acquisition Worl...
 
IGI - Solution presentation-DP
IGI - Solution presentation-DPIGI - Solution presentation-DP
IGI - Solution presentation-DP
 
Arx mindbusinessportfolio
Arx mindbusinessportfolioArx mindbusinessportfolio
Arx mindbusinessportfolio
 
briefing
briefingbriefing
briefing
 
WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
 WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021 WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdf
 
1cloudstar cloud track.v1.0
1cloudstar cloud track.v1.01cloudstar cloud track.v1.0
1cloudstar cloud track.v1.0
 
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteReduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online Suite
 
Microtek learning
Microtek learningMicrotek learning
Microtek learning
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
 
Camo Tech Services March09
Camo Tech Services March09Camo Tech Services March09
Camo Tech Services March09
 
Sci capabilities fed dec 2014
Sci capabilities fed dec 2014Sci capabilities fed dec 2014
Sci capabilities fed dec 2014
 

More from neoalt

A10_CompactTrainingv5.pdf (1).pdf
A10_CompactTrainingv5.pdf (1).pdfA10_CompactTrainingv5.pdf (1).pdf
A10_CompactTrainingv5.pdf (1).pdfneoalt
 
VMware Carbon Black EDR Administrator.pdf
 VMware Carbon Black EDR Administrator.pdf VMware Carbon Black EDR Administrator.pdf
VMware Carbon Black EDR Administrator.pdfneoalt
 
721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF
721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF
721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDFneoalt
 
Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptxneoalt
 
ArcSight Basics.ppt
ArcSight Basics.pptArcSight Basics.ppt
ArcSight Basics.pptneoalt
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdfneoalt
 

More from neoalt (6)

A10_CompactTrainingv5.pdf (1).pdf
A10_CompactTrainingv5.pdf (1).pdfA10_CompactTrainingv5.pdf (1).pdf
A10_CompactTrainingv5.pdf (1).pdf
 
VMware Carbon Black EDR Administrator.pdf
 VMware Carbon Black EDR Administrator.pdf VMware Carbon Black EDR Administrator.pdf
VMware Carbon Black EDR Administrator.pdf
 
721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF
721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF
721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF
 
Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptx
 
ArcSight Basics.ppt
ArcSight Basics.pptArcSight Basics.ppt
ArcSight Basics.ppt
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdf
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

AD-Bridge-course.pdf

  • 1. AD BRIDGE ADMINISTRATION MAXIMIZE ROI WITH BEYONDTRUST UNIVERSITY TRAINING BeyondTrust University training services are designed to maximize your investment in BeyondTrust technologies by educating your users on best practices for configuring and using our products. Superior training is part of our commitment to help you obtain the maximum benefit possible from the entire BeyondTrust solution. Our training options will give your organization the foundational knowledge needed to administer, configure, and utilize BeyondTrust for optimum performance. You can select from a variety of modular training courses to ensure your team receives relevant education. BEYONDTRUST TRAINING FOR SECURITY PROFESSIONALS The AD Bridge Administration course is designed for the security professional tasked with installation, administering, monitoring and reporting on AD Bridge. Students learn how to install the product’s components, connect a Unix host to Active Directory, create and configure Group Policy Objects, and configure Active Directory users for Unix/Linux logon via console, SSH and Putty. FLEXIBLE TRAINING OPTIONS: ON-SITE, VIRTUAL OR ELEARNING This course is available as a virtual instructor-led course or on-site at your location. The course length is two days on-site, or 12 hours over 3 days virtually. The course is led by a BeyondTrust certified instructor. Earn up to 12 hours of Continuing Professional Education credits (CPE). KEY LEARNING OBJECTIVES • Architecture Overview – understand the architecture, traffic flow, and general functionality of AD Bridge • Initial Configuration – learn about the logging and management tools of the AD Bridge and how to configure them properly • Extend Group Policy Objects (GPO) – understand how to create GPO(s) to manage users and their attributes automatically • Manage Identity Agents – learn about the agent services and how to manage them, and troubleshoot issues using AD Bridge Powered by PowerBroker Identity Services Recording and material reproduction rights are not included. Train-the-Trainer courses are also available. GET CERTIFIED BY BEYONDTRUST Participants who successfully complete AD Bridge Administration training are eligible to take the associated BeyondTrust Certification exam.
  • 2. ABOUT BEYONDTRUST Bomgar is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing privilege-related breaches. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers and a global partner network. Learn more at www.beyondtrust.com. CONTACT I TRAINING@BEYONDTRUST.COM I BEYONDTRUST.COM ©2020 BEYONDTRUST AD BRIDGE ADMINISTRATION For Security Professionals UNIT 1 Laying The Foundation Course Overview and objectives LESSON 1: Technical Overview LESSON 2: Deployment Overview INTRODUCTION LESSON 1: Installing Management Tools LESSON 2: Provisioning Users LESSON 3: Cells LESSON 4: Agent Deployment LESSON 1: GPO Configuration LESSON 2 User Management LESSON 1: Agent Architecture LESSON 2: Troubleshooting Logins LESSON 3: Agent Troubleshooting LESSON 4: Troubleshooting SSO Logins UNIT 2 Installation and Configuration UNIT 3 Group Policy & Managing Users UNIT 4 Managing Identity Agents CONFIGURE POLICIES & APPLICATIONS