Beyond Perimeter: Detecting Ransomware and Aberrant User Behavior

About this webinar

Recorded: June 22, 2017

The avalanche of recent WannaCry Ransomware attacks proves that cybercriminals have been successful in creating new techniques and deceptive tactics that easily outpace traditional perimeter security. Under these conditions, what is your security plan to detect the threats that are already inside? 

Watch the recorded webinar and learn how to:

  • Detect ransomware attacks like WannaCry once they are inside
  • Bring context to the data your SIEMs and other tools are already collecting
  • Gain true visibility into what’s really happening in your IT infrastructure
Hosted by
Jeff Melnick,
Solutions engineer
Jim Smith,
Vice President, Sales, North America

Active Directory 101: Install and Configure AD Domain Services

This webinar covers the first section of Exam 70-742, which focuses on effective installation and administration of Active Directory. In addition to providing step-by-step training from an AD expert, the session also explores the potential pitfalls of AD configuration and ways to ensure your configuration enhances the security of your IT environment.

Register for this session to learn:

  • How to install and configure domain controllers (DCs)
  • Best practices for creating AD users and computers
  • How to effectively approach AD group and organizational unit (OU) management
  • How Netwrix Auditor’s reporting functionality can help you identify security gaps in your AD configuration and maintain good IT hygiene
23
April
10am PDT
23 April, 10am PDT
Register Now