Training Icon 0

Data Remediation Workflows

Watch these short training videos to learn how you can reduce the exposure of critical and regulated data by building a strong data remediation process.
Training Icon 1

User Activity Video Recording

Watch these videos to learn how you can improve your security posture by recording the activity of vendors, contractors, privileged users and ordinary users in any application, even if it doesn’t produce any logs.
Training Icon 2

Configuration Best Practices

Watch these short videos to walk through the most important moments of installing and configuring Netwrix Auditor, including how to start collecting data, granularly grant access and monitor Netwrix Auditor’s health.
Training Icon 3

IT Risk Assessment Reports

Watch these short videos to learn how to start identifying, assessing and mitigating security weak spots using IT Risk Assessment reports.
Training Icon 4

Using State-in-Time Reports

Watch these short videos to see examples of how state-in-time reports in Active Directory, Windows Server and file systems enable you to effectively review and compare the current and the past configuration states of your business-critical IT systems.
Training Icon 5

Proving Compliance with Netwrix Auditor

Watch these short training videos to find out how to get your compliance program started, simplify preparation for audits, satisfy auditors during compliance checks, and respond to suspicious user activity to avoid security incidents and penalties for non-compliance.
Training Icon 6

Data Discovery and Classification Reports

Watch these short videos to see how our Data Discovery and Classification reports can help you determine where your sensitive data is located, understand whether any of this data is exposed to unauthorized use, and monitor who is actually reading, modifying or deleting these sensitive files.
Training Icon 7

User Behavior and Blind Spot Analysis Reports

Watch these short videos to see how our security analytics reports can help you spot anomalous activity across multiple systems in your IT environment so you can block attackers and hold insiders accountable.
Training Icon 8

Behavior Anomaly Discovery

Watch these videos to learn how you can better detect malicious insiders and intruders hiding behind compromised accounts in your environment.
Training Icon 9

Facilitating Data Governance with File Analysis Reports

Watch these videos to learn how you can use predefined file analysis reports to optimize storage use, improve security decision-making, and avoid user downtime.
Training Icon 10

Change Auditing Using Predefined Reports

Watch these videos to learn how you can use predefined reports to keep tabs on what’s changing in your IT environment and set up report subscriptions to automate routine monitoring and compliance preparation.
Training Icon 11

Access Auditing with Predefined Reports

Watch these videos to learn how you can simplify routine monitoring of logons and data reads to more easily detect suspicious access attempts in your environment.
Training Icon 12

Alerts on Threat Patterns

Watch these short videos to walk through examples of how standard and threshold-based alerts enable you to effectively mitigate information security risks. You will also learn how to get the most value from the alerting feature.
Training Icon 13

Interactive Search

Learn about practical applications for Netwrix Auditor’s Interactive Search. Just step through these real-life scenarios to quickly get acquainted with the feature’s capabilities and interface.