User Activity Video Recording

Watch these videos to learn how you can improve your security posture by recording the activity of vendors, contractors, privileged users and ordinary users in any application, even if it doesn’t produce any logs.

Proving Compliance with Netwrix Auditor

Watch these short training videos to find out how to get your compliance program started, simplify preparation for audits, satisfy auditors during compliance checks, and respond to suspicious user activity to avoid security incidents and penalties for non-compliance.

IT Risk Assessment Reports

Watch these short videos to learn how to start identifying, assessing and mitigating security weak spots using IT Risk Assessment reports.

Data Discovery and Classification Reports

Watch these short videos to see how our Data Discovery and Classification reports can help you determine where your sensitive data is located, understand whether any of this data is exposed to unauthorized use, and monitor who is actually reading, modifying or deleting these sensitive files.

User Behavior and Blind Spot Analysis Reports

Watch these short videos to see how our security analytics reports can help you spot anomalous activity across multiple systems in your IT environment so you can block attackers and hold insiders accountable.

Behavior Anomaly Discovery

Watch these videos to learn how you can better detect malicious insiders and intruders hiding behind compromised accounts in your environment.

Using State-in-Time Reports

Watch these short videos to see examples of how state-in-time reports in Active Directory, Windows Server and file systems enable you to effectively review and compare the current and the past configuration states of your business-critical IT systems.

Facilitating Data Governance with File Analysis Reports

Watch these videos to learn how you can use predefined file analysis reports to optimize storage use, improve security decision-making, and avoid user downtime.

Change Auditing Using Predefined Reports

Watch these videos to learn how you can use predefined reports to keep tabs on what’s changing in your IT environment and set up report subscriptions to automate routine monitoring and compliance preparation.

Access Auditing with Predefined Reports

Watch these videos to learn how you can simplify routine monitoring of logons and data reads to more easily detect suspicious access attempts in your environment.

Alerts on Threat Patterns

Watch these short videos to walk through examples of how standard and threshold-based alerts enable you to effectively mitigate information security risks. You will also learn how to get the most value from the alerting feature.

Interactive Search

Learn about practical applications for Netwrix Auditor’s Interactive Search. Just step through these real-life scenarios to quickly get acquainted with the feature’s capabilities and interface.