Data Remediation Workflows
Watch these short training videos to learn how you can reduce the exposure of critical and regulated data by building a strong data remediation process.
User Activity Video Recording
Watch these videos to learn how you can improve your security posture by recording the activity of vendors, contractors, privileged users and ordinary users in any application, even if it doesn’t produce any logs.
Configuration Best Practices
Watch these short videos to walk through the most important moments of installing and configuring Netwrix Auditor, including how to start collecting data, granularly grant access and monitor Netwrix Auditor’s health.
IT Risk Assessment Reports
Watch these short videos to learn how to start identifying, assessing and mitigating security weak spots using IT Risk Assessment reports.
Using State-in-Time Reports
Watch these short videos to see examples of how state-in-time reports in Active Directory, Windows Server and file systems enable you to effectively review and compare the current and the past configuration states of your business-critical IT systems.
Proving Compliance with Netwrix Auditor
Watch these short training videos to find out how to get your compliance program started, simplify preparation for audits, satisfy auditors during compliance checks, and respond to suspicious user activity to avoid security incidents and penalties for non-compliance.
Data Discovery and Classification Reports
Watch these short videos to see how our Data Discovery and Classification reports can help you determine where your sensitive data is located, understand whether any of this data is exposed to unauthorized use, and monitor who is actually reading, modifying or deleting these sensitive files.
User Behavior and Blind Spot Analysis Reports
Watch these short videos to see how our security analytics reports can help you spot anomalous activity across multiple systems in your IT environment so you can block attackers and hold insiders accountable.
Behavior Anomaly Discovery
Watch these videos to learn how you can better detect malicious insiders and intruders hiding behind compromised accounts in your environment.
Facilitating Data Governance with File Analysis Reports
Watch these videos to learn how you can use predefined file analysis reports to optimize storage use, improve security decision-making, and avoid user downtime.
Change Auditing Using Predefined Reports
Watch these videos to learn how you can use predefined reports to keep tabs on what’s changing in your IT environment and set up report subscriptions to automate routine monitoring and compliance preparation.
Access Auditing with Predefined Reports
Watch these videos to learn how you can simplify routine monitoring of logons and data reads to more easily detect suspicious access attempts in your environment.
Alerts on Threat Patterns
Watch these short videos to walk through examples of how standard and threshold-based alerts enable you to effectively mitigate information security risks. You will also learn how to get the most value from the alerting feature.
Learn about practical applications for Netwrix Auditor’s Interactive Search. Just step through these real-life scenarios to quickly get acquainted with the feature’s capabilities and interface.