How do you handle authenticated scans? Domain user, local user?

I could see domain users being much easier to audit usage of, though obviously it is not impossible, or terribly hard to do so with local users as well, but obviously limiting local user accounts is desirable. On the flip side, running authenticated scans with a domain user can generate a significant amount of domain logins in rapid-fire succession, creating a large load on domain controllers. How do you attack this problem?

Touch here for the full post on Network Security Noblemen tumblr

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s