Hacker Explains: Gaining Unauthorized Access to Your Windows IT Environment

About this webinar

Recorded: December 5, 2017

Join our new webinar with IT experts Liam Cleary and Russell McDermott as they explain the top methods that attackers use to gain unauthorized access to your environment, using:

  • Exploitation
  • Pivoting
  • Privilege escalation

In this Expert Webinar you will get practical information about how to defend against the most common attacks using native Microsoft Windows tools and Netwrix Auditor.

Hosted by
Bob Cordisco,
Systems Engineer

Active Directory 101: Manage and Maintain AD Domain Services

Once you have your DCs and AD groups set up, it’s time to learn how to configure security policies, maintain AD, and spot changes that could jeopardize security or availability. Watch this webinar to prepare for the second section of Exam 70-742, which is dedicated to continuous management of Active Directory.

During this session, you will learn:

  • Techniques for configuring service authentication and account policies
  • Methods for maintaining Active Directory
  • How to configure Active Directory in a complex enterprise environment
  • How to detect and investigate improper changes to your Active Directory with Netwrix Auditor
1pm EDT
25 April, 1pm EDT
Register Now