
One of the things you can do in your organization is you can create a share in your organization. And let me explain why. It's really incredibly important for you to understand what are the top techniques an attacker is going to go through post exploitation. If you understand the pathways that an attacker is going to take, there's really only about five post exploitation techniques an attacker is going to go through to try to elevate their privileges inside of Active Directory. They're going to do these five things.