How to Detect Anomalous User Behavior before a Breach Occurs

About this webinar

Recorded: April 25, 2017

Did you know that three-quarters of 2016’s breaches were caused by insiders? An insider threat isn’t just a marketing bogeyman: organizations suffer from both malicious insiders’ activity and negligent users’ errors.

Watch a recorded webinar and learn more about how you can safeguard your IT environment by tracking down aberrant user behavior!

Hosted by
Brian Kittle,
Systems Engineer

Active Directory 101: Install and Configure AD Domain Services

This webinar covers the first section of Exam 70-742, which focuses on effective installation and administration of Active Directory. In addition to providing step-by-step training from an AD expert, the session also explores the potential pitfalls of AD configuration and ways to ensure your configuration enhances the security of your IT environment.

Register for this session to learn:

  • How to install and configure domain controllers (DCs)
  • Best practices for creating AD users and computers
  • How to effectively approach AD group and organizational unit (OU) management
  • How Netwrix Auditor’s reporting functionality can help you identify security gaps in your AD configuration and maintain good IT hygiene
23
April
10am PDT
23 April, 10am PDT
Register Now