SlideShare a Scribd company logo
1 of 2
Download to read offline
AD BRIDGE ADMINISTRATION
BEYONDTRUST TRAINING FOR SECURITY
PROFESSIONALS
The AD Bridge Administration course is designed for the
security professional tasked with installation, administration,
and monitoring with AD Bridge. Students learn how to install
the product’s components, connect a Unix host to Active
Directory, create and configure Group Policy Objects, and
configure Active Directory users for Unix/Linux logon via
console, SSH, and PuTTY.
FLEXIBLE TRAINING OPTIONS: ON-SITE or
VIRTUAL
This course is available as a virtual instructor-led course or
on-site at your location. The course length is two days
on-site, or 12 hours over 3 days virtually. The course is led by
a BeyondTrust certified instructor. Earn up to 12 hours of
Continuing Professional Education (CPE) credits.
							
KEY LEARNING OBJECTIVES
• Architecture Overview – understand the
architecture, traffic flow, and general functionality
of AD Bridge
• Initial Configuration – learn about the logging and
management tools of AD Bridge and how to
configure them properly
• Extend Group Policy Objects (GPO) – understand how
to create GPO(s) that manage users and their
attributes automatically
• Manage Identity Agents – learn about agent services
and how to manage and troubleshoot issues
MAXIMIZE ROI WITH BEYONDTRUST UNIVERSITY TRAINING
BeyondTrust University training services are designed to maximize your investment in BeyondTrust technologies by educating your
users on best practices for configuring and using our products. Superior training is part of our commitment to help you obtain the
maximum benefit possible from the entire BeyondTrust solution. Our training options will give your organization the foundational
knowledge needed to administer, configure, and utilize BeyondTrust for optimum performance. You can select from a variety of
modular training courses to ensure your team receives relevant education.
GET CERTIFIED BY BEYONDTRUST
Participants who successfully complete AD Bridge
Administration training are eligible to take the associated
BeyondTrust Certification exam.
20220923
Recording and material reproduction rights are not included. Train-the-Trainer courses are also available.
AD BRIDGE ADMINISTRATION
For Security Professionals
UNIT 1
Laying The
Foundation
Course Overview and objectives
LESSON 1: Technical Overview
LESSON 2: Deployment Overview
INTRODUCTION
LESSON 1: Management Tools
LESSON 2: Provisioning Users
LESSON 3: Cells
LESSON 4: Agent Deployment
LESSON 1: GPO Configuration
LESSON 2 User Management
LESSON 1: Agent Architecture
LESSON 2: Troubleshooting Logins
LESSON 3: Agent Troubleshooting
LESSON 4: Troubleshooting SSO Logins
UNIT 2
Installation and
Configuration
UNIT 3
Group Policy &
Managing Users
UNIT 4
Managing
Identity Agents
CONFIGURE
POLICIES &
APPLICATIONS
ABOUT BEYONDTRUST
BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organizations to protect identities, stop threats,
and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry’s
most advanced privileged access management (PAM) solution, enabling organizations to quickly shrink their attack surface across traditional,
cloud and hybrid environments.With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to
deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 75 of the Fortune 100, and a global partner
network. Learn more at www.beyondtrust.com.
CONTACT I BTU@BEYONDTRUST.COM I BEYONDTRUST.COM
©2022 BEYONDTRUST 20220923

More Related Content

Similar to AD-Bridge.pdf

PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitTakishaPeck109
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsFredBrandonAuthorMCP
 
A PROJECT REPORT ON DOCUMENT MANAGEMENT SYSTEM MASTER OF COMPUTER APPLICATION...
A PROJECT REPORT ON DOCUMENT MANAGEMENT SYSTEM MASTER OF COMPUTER APPLICATION...A PROJECT REPORT ON DOCUMENT MANAGEMENT SYSTEM MASTER OF COMPUTER APPLICATION...
A PROJECT REPORT ON DOCUMENT MANAGEMENT SYSTEM MASTER OF COMPUTER APPLICATION...Karla Long
 
Security+ Course Overview (2008)
Security+ Course Overview (2008)Security+ Course Overview (2008)
Security+ Course Overview (2008)GTS Learning, Inc.
 
I need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pI need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pdoylymaura
 
Project Access Control ProposalPurposeThis course project i
Project Access Control ProposalPurposeThis course project iProject Access Control ProposalPurposeThis course project i
Project Access Control ProposalPurposeThis course project idavieec5f
 
Career Benefits of Microsoft Security Certifications.pdf
Career Benefits of Microsoft Security Certifications.pdfCareer Benefits of Microsoft Security Certifications.pdf
Career Benefits of Microsoft Security Certifications.pdfInfosec Train
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)WinWire Technologies Inc
 
ITIL® INTERMEDIATE CAPABILITY PPO_BOOSTurSKILLS
ITIL® INTERMEDIATE CAPABILITY PPO_BOOSTurSKILLSITIL® INTERMEDIATE CAPABILITY PPO_BOOSTurSKILLS
ITIL® INTERMEDIATE CAPABILITY PPO_BOOSTurSKILLSBOOSTurSKILLS
 
AZ-104 Microsoft Azure cloud Administration
AZ-104 Microsoft Azure cloud AdministrationAZ-104 Microsoft Azure cloud Administration
AZ-104 Microsoft Azure cloud AdministrationAbdulalimBhnsawy
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management ProjectsHitachi ID Systems, Inc.
 
Solution managment and monitoring services.docx
Solution managment and monitoring services.docxSolution managment and monitoring services.docx
Solution managment and monitoring services.docxsaadatali65
 
Sec+ start guide #30001
Sec+ start guide #30001Sec+ start guide #30001
Sec+ start guide #30001kmperkins85
 
Adapting IT Operations with CompTIA Cloud+
Adapting IT Operations with CompTIA Cloud+Adapting IT Operations with CompTIA Cloud+
Adapting IT Operations with CompTIA Cloud+CompTIA
 
Certified Cloud Computing Professional (CCCP)
Certified Cloud Computing Professional (CCCP)Certified Cloud Computing Professional (CCCP)
Certified Cloud Computing Professional (CCCP)GICTTraining
 

Similar to AD-Bridge.pdf (20)

The user s identities
The user s identitiesThe user s identities
The user s identities
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilit
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
 
A PROJECT REPORT ON DOCUMENT MANAGEMENT SYSTEM MASTER OF COMPUTER APPLICATION...
A PROJECT REPORT ON DOCUMENT MANAGEMENT SYSTEM MASTER OF COMPUTER APPLICATION...A PROJECT REPORT ON DOCUMENT MANAGEMENT SYSTEM MASTER OF COMPUTER APPLICATION...
A PROJECT REPORT ON DOCUMENT MANAGEMENT SYSTEM MASTER OF COMPUTER APPLICATION...
 
Security+ Course Overview (2008)
Security+ Course Overview (2008)Security+ Course Overview (2008)
Security+ Course Overview (2008)
 
I need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pI need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course p
 
Project Access Control ProposalPurposeThis course project i
Project Access Control ProposalPurposeThis course project iProject Access Control ProposalPurposeThis course project i
Project Access Control ProposalPurposeThis course project i
 
Knowledge management12
Knowledge management12Knowledge management12
Knowledge management12
 
Career Benefits of Microsoft Security Certifications.pdf
Career Benefits of Microsoft Security Certifications.pdfCareer Benefits of Microsoft Security Certifications.pdf
Career Benefits of Microsoft Security Certifications.pdf
 
Chintakunta
ChintakuntaChintakunta
Chintakunta
 
Yogesh_Upd_Resume
Yogesh_Upd_ResumeYogesh_Upd_Resume
Yogesh_Upd_Resume
 
Ccsk course content v1
Ccsk course content v1Ccsk course content v1
Ccsk course content v1
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)
 
ITIL® INTERMEDIATE CAPABILITY PPO_BOOSTurSKILLS
ITIL® INTERMEDIATE CAPABILITY PPO_BOOSTurSKILLSITIL® INTERMEDIATE CAPABILITY PPO_BOOSTurSKILLS
ITIL® INTERMEDIATE CAPABILITY PPO_BOOSTurSKILLS
 
AZ-104 Microsoft Azure cloud Administration
AZ-104 Microsoft Azure cloud AdministrationAZ-104 Microsoft Azure cloud Administration
AZ-104 Microsoft Azure cloud Administration
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
Solution managment and monitoring services.docx
Solution managment and monitoring services.docxSolution managment and monitoring services.docx
Solution managment and monitoring services.docx
 
Sec+ start guide #30001
Sec+ start guide #30001Sec+ start guide #30001
Sec+ start guide #30001
 
Adapting IT Operations with CompTIA Cloud+
Adapting IT Operations with CompTIA Cloud+Adapting IT Operations with CompTIA Cloud+
Adapting IT Operations with CompTIA Cloud+
 
Certified Cloud Computing Professional (CCCP)
Certified Cloud Computing Professional (CCCP)Certified Cloud Computing Professional (CCCP)
Certified Cloud Computing Professional (CCCP)
 

More from neoalt

A10_CompactTrainingv5.pdf (1).pdf
A10_CompactTrainingv5.pdf (1).pdfA10_CompactTrainingv5.pdf (1).pdf
A10_CompactTrainingv5.pdf (1).pdfneoalt
 
VMware Carbon Black EDR Administrator.pdf
 VMware Carbon Black EDR Administrator.pdf VMware Carbon Black EDR Administrator.pdf
VMware Carbon Black EDR Administrator.pdfneoalt
 
721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF
721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF
721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDFneoalt
 
Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptxneoalt
 
ArcSight Basics.ppt
ArcSight Basics.pptArcSight Basics.ppt
ArcSight Basics.pptneoalt
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdfneoalt
 

More from neoalt (6)

A10_CompactTrainingv5.pdf (1).pdf
A10_CompactTrainingv5.pdf (1).pdfA10_CompactTrainingv5.pdf (1).pdf
A10_CompactTrainingv5.pdf (1).pdf
 
VMware Carbon Black EDR Administrator.pdf
 VMware Carbon Black EDR Administrator.pdf VMware Carbon Black EDR Administrator.pdf
VMware Carbon Black EDR Administrator.pdf
 
721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF
721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF
721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF
 
Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptx
 
ArcSight Basics.ppt
ArcSight Basics.pptArcSight Basics.ppt
ArcSight Basics.ppt
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdf
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

AD-Bridge.pdf

  • 1. AD BRIDGE ADMINISTRATION BEYONDTRUST TRAINING FOR SECURITY PROFESSIONALS The AD Bridge Administration course is designed for the security professional tasked with installation, administration, and monitoring with AD Bridge. Students learn how to install the product’s components, connect a Unix host to Active Directory, create and configure Group Policy Objects, and configure Active Directory users for Unix/Linux logon via console, SSH, and PuTTY. FLEXIBLE TRAINING OPTIONS: ON-SITE or VIRTUAL This course is available as a virtual instructor-led course or on-site at your location. The course length is two days on-site, or 12 hours over 3 days virtually. The course is led by a BeyondTrust certified instructor. Earn up to 12 hours of Continuing Professional Education (CPE) credits. KEY LEARNING OBJECTIVES • Architecture Overview – understand the architecture, traffic flow, and general functionality of AD Bridge • Initial Configuration – learn about the logging and management tools of AD Bridge and how to configure them properly • Extend Group Policy Objects (GPO) – understand how to create GPO(s) that manage users and their attributes automatically • Manage Identity Agents – learn about agent services and how to manage and troubleshoot issues MAXIMIZE ROI WITH BEYONDTRUST UNIVERSITY TRAINING BeyondTrust University training services are designed to maximize your investment in BeyondTrust technologies by educating your users on best practices for configuring and using our products. Superior training is part of our commitment to help you obtain the maximum benefit possible from the entire BeyondTrust solution. Our training options will give your organization the foundational knowledge needed to administer, configure, and utilize BeyondTrust for optimum performance. You can select from a variety of modular training courses to ensure your team receives relevant education. GET CERTIFIED BY BEYONDTRUST Participants who successfully complete AD Bridge Administration training are eligible to take the associated BeyondTrust Certification exam. 20220923 Recording and material reproduction rights are not included. Train-the-Trainer courses are also available.
  • 2. AD BRIDGE ADMINISTRATION For Security Professionals UNIT 1 Laying The Foundation Course Overview and objectives LESSON 1: Technical Overview LESSON 2: Deployment Overview INTRODUCTION LESSON 1: Management Tools LESSON 2: Provisioning Users LESSON 3: Cells LESSON 4: Agent Deployment LESSON 1: GPO Configuration LESSON 2 User Management LESSON 1: Agent Architecture LESSON 2: Troubleshooting Logins LESSON 3: Agent Troubleshooting LESSON 4: Troubleshooting SSO Logins UNIT 2 Installation and Configuration UNIT 3 Group Policy & Managing Users UNIT 4 Managing Identity Agents CONFIGURE POLICIES & APPLICATIONS ABOUT BEYONDTRUST BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organizations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry’s most advanced privileged access management (PAM) solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 75 of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com. CONTACT I BTU@BEYONDTRUST.COM I BEYONDTRUST.COM ©2022 BEYONDTRUST 20220923