How Attackers Move through the Network Undetected

About this webinar

Recorded: June 7, 2018

Once attackers have breached the perimeter, they often lurk in the network for months, looking for valuable data to steal. To stay hidden, they try to make their actions blend in with normal traffic.

By the end of this session, you will know:

  • What techniques attackers use to traverse the network without raising alarms
  • What native Microsoft tools can help you spot covert attacks
  • How you can identify the hiding attacks by using Netwrix Auditor functionality
Hosted by
Liam Cleary,
Microsoft MVP
Kennet Johansen ,
Systems Engineer

Active Directory 101: Install and Configure AD Domain Services

This webinar covers the first section of Exam 70-742, which focuses on effective installation and administration of Active Directory. In addition to providing step-by-step training from an AD expert, the session also explores the potential pitfalls of AD configuration and ways to ensure your configuration enhances the security of your IT environment.

Register for this session to learn:

  • How to install and configure domain controllers (DCs)
  • Best practices for creating AD users and computers
  • How to effectively approach AD group and organizational unit (OU) management
  • How Netwrix Auditor’s reporting functionality can help you identify security gaps in your AD configuration and maintain good IT hygiene
23
April
1pm EDT
23 April, 1pm EDT
Register Now