How Attackers Move through the Network Undetected

About the Webinar

Once attackers have breached the perimeter, they often lurk in the network for months, looking for valuable data to steal. To stay hidden, they try to make their actions blend in with normal traffic.

By the end of this session, you will know:

  • What techniques attackers use to traverse the network without raising alarms
  • What native Microsoft tools can help you spot covert attacks
  • How you can identify the hiding attacks by using Netwrix Auditor functionality
Liam Cleary avatar
Liam Cleary, Microsoft MVP and MCT
Vijay Sharma avatar
Vijay Sharma, Systems Engineer