SlideShare a Scribd company logo
AD BRIDGE ADMINISTRATION
MAXIMIZE ROI WITH BEYONDTRUST UNIVERSITY TRAINING
BeyondTrust University training services are designed to maximize your investment in BeyondTrust technologies by educating your
users on best practices for configuring and using our products. Superior training is part of our commitment to help you obtain the
maximum benefit possible from the entire BeyondTrust solution. Our training options will give your organization the foundational
knowledge needed to administer, configure, and utilize BeyondTrust for optimum performance. You can select from a variety of
modular training courses to ensure your team receives relevant education.
BEYONDTRUST TRAINING FOR SECURITY
PROFESSIONALS
The AD Bridge Administration course is designed for the
security professional tasked with installation, administering,
monitoring and reporting on AD Bridge. Students learn how
to install the product’s components, connect a Unix host to
Active Directory, create and configure Group Policy Objects,
and configure Active Directory users for Unix/Linux logon via
console, SSH and Putty.
FLEXIBLE TRAINING OPTIONS: ON-SITE,
VIRTUAL OR ELEARNING
This course is available as a virtual instructor-led course or
on-site at your location. The course length is two days
on-site, or 12 hours over 3 days virtually. The course is led by
a BeyondTrust certified instructor. Earn up to 12 hours of
Continuing Professional Education credits (CPE).
							
KEY LEARNING OBJECTIVES
• Architecture Overview – understand the
architecture, traffic flow, and general functionality
of AD Bridge
• Initial Configuration – learn about the logging and
management tools of the AD Bridge and how to
configure them properly
• Extend Group Policy Objects (GPO) – understand
how to create GPO(s) to manage users and their
attributes automatically
• Manage Identity Agents – learn about the agent
services and how to manage them, and troubleshoot
issues using AD Bridge
Powered by PowerBroker Identity Services
Recording and material reproduction rights are not included. Train-the-Trainer courses are also available.
GET CERTIFIED BY BEYONDTRUST
Participants who successfully complete AD Bridge
Administration training are eligible to take the associated
BeyondTrust Certification exam.
ABOUT BEYONDTRUST
Bomgar is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing privilege-related
breaches. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud,
DevOps, and network device environments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve
compliance objectives, and boost operational performance. We are trusted by 20,000 customers and a global partner network. Learn more at
www.beyondtrust.com.
CONTACT I TRAINING@BEYONDTRUST.COM I BEYONDTRUST.COM
©2020 BEYONDTRUST
AD BRIDGE ADMINISTRATION
For Security Professionals
UNIT 1
Laying The
Foundation
Course Overview and objectives
LESSON 1: Technical Overview
LESSON 2: Deployment Overview
INTRODUCTION
LESSON 1: Installing Management Tools
LESSON 2: Provisioning Users
LESSON 3: Cells
LESSON 4: Agent Deployment
LESSON 1: GPO Configuration
LESSON 2 User Management
LESSON 1: Agent Architecture
LESSON 2: Troubleshooting Logins
LESSON 3: Agent Troubleshooting
LESSON 4: Troubleshooting SSO Logins
UNIT 2
Installation and
Configuration
UNIT 3
Group Policy &
Managing Users
UNIT 4
Managing
Identity Agents
CONFIGURE
POLICIES &
APPLICATIONS

More Related Content

PDF
F5 - Configuring BIG-IP LTM v11 - Instructor PPT.pdf
PDF
FortiWeb_Administrator sdhcbjsdhjcbsjcsc.pdf
PDF
A10_CompactTrainingv5.pdf (1).pdf
PDF
VMware Carbon Black EDR Administrator.pdf
PDF
AD-Bridge.pdf
PDF
721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF
PPTX
Introduction to SIEM.pptx
PPT
ArcSight Basics.ppt
F5 - Configuring BIG-IP LTM v11 - Instructor PPT.pdf
FortiWeb_Administrator sdhcbjsdhjcbsjcsc.pdf
A10_CompactTrainingv5.pdf (1).pdf
VMware Carbon Black EDR Administrator.pdf
AD-Bridge.pdf
721-00233-123 BlackBerry UEM version 12.9 Advanced_SYL.PDF
Introduction to SIEM.pptx
ArcSight Basics.ppt

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
A Presentation on Artificial Intelligence
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
sap open course for s4hana steps from ECC to s4
Dropbox Q2 2025 Financial Results & Investor Presentation
Chapter 3 Spatial Domain Image Processing.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Empathic Computing: Creating Shared Understanding
Unlocking AI with Model Context Protocol (MCP)
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
A Presentation on Artificial Intelligence
Mobile App Security Testing_ A Comprehensive Guide.pdf
20250228 LYD VKU AI Blended-Learning.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Ad
Ad

AD-Bridge-course.pdf

  • 1. AD BRIDGE ADMINISTRATION MAXIMIZE ROI WITH BEYONDTRUST UNIVERSITY TRAINING BeyondTrust University training services are designed to maximize your investment in BeyondTrust technologies by educating your users on best practices for configuring and using our products. Superior training is part of our commitment to help you obtain the maximum benefit possible from the entire BeyondTrust solution. Our training options will give your organization the foundational knowledge needed to administer, configure, and utilize BeyondTrust for optimum performance. You can select from a variety of modular training courses to ensure your team receives relevant education. BEYONDTRUST TRAINING FOR SECURITY PROFESSIONALS The AD Bridge Administration course is designed for the security professional tasked with installation, administering, monitoring and reporting on AD Bridge. Students learn how to install the product’s components, connect a Unix host to Active Directory, create and configure Group Policy Objects, and configure Active Directory users for Unix/Linux logon via console, SSH and Putty. FLEXIBLE TRAINING OPTIONS: ON-SITE, VIRTUAL OR ELEARNING This course is available as a virtual instructor-led course or on-site at your location. The course length is two days on-site, or 12 hours over 3 days virtually. The course is led by a BeyondTrust certified instructor. Earn up to 12 hours of Continuing Professional Education credits (CPE). KEY LEARNING OBJECTIVES • Architecture Overview – understand the architecture, traffic flow, and general functionality of AD Bridge • Initial Configuration – learn about the logging and management tools of the AD Bridge and how to configure them properly • Extend Group Policy Objects (GPO) – understand how to create GPO(s) to manage users and their attributes automatically • Manage Identity Agents – learn about the agent services and how to manage them, and troubleshoot issues using AD Bridge Powered by PowerBroker Identity Services Recording and material reproduction rights are not included. Train-the-Trainer courses are also available. GET CERTIFIED BY BEYONDTRUST Participants who successfully complete AD Bridge Administration training are eligible to take the associated BeyondTrust Certification exam.
  • 2. ABOUT BEYONDTRUST Bomgar is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing privilege-related breaches. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers and a global partner network. Learn more at www.beyondtrust.com. CONTACT I TRAINING@BEYONDTRUST.COM I BEYONDTRUST.COM ©2020 BEYONDTRUST AD BRIDGE ADMINISTRATION For Security Professionals UNIT 1 Laying The Foundation Course Overview and objectives LESSON 1: Technical Overview LESSON 2: Deployment Overview INTRODUCTION LESSON 1: Installing Management Tools LESSON 2: Provisioning Users LESSON 3: Cells LESSON 4: Agent Deployment LESSON 1: GPO Configuration LESSON 2 User Management LESSON 1: Agent Architecture LESSON 2: Troubleshooting Logins LESSON 3: Agent Troubleshooting LESSON 4: Troubleshooting SSO Logins UNIT 2 Installation and Configuration UNIT 3 Group Policy & Managing Users UNIT 4 Managing Identity Agents CONFIGURE POLICIES & APPLICATIONS