Whether you want to leverage Netwrix Auditor in a broader range of tasks, shorten the
time it currently takes you to perform certain activities, or help your associates develop advanced
product skills, our training materials will help you
achieve your goals.
Data Remediation Workflows
Watch these short training videos to learn how you can reduce the exposure of critical and regulated data by building a strong data remediation process.
Watch these videos to learn how you can improve your security posture by recording the activity of vendors, contractors, privileged users and ordinary users in any application, even if it doesn’t produce any logs.
Watch these short videos to walk through the most important moments of installing and configuring Netwrix Auditor, including how to start collecting data, granularly grant access and monitor Netwrix Auditor’s health.
Watch these short videos to see examples of how state-in-time reports in Active Directory, Windows Server and file systems enable you to effectively review and compare the current and the past configuration states of your business-critical IT systems.
Watch these short training videos to find out how to get your compliance program started, simplify preparation for audits, satisfy auditors during compliance checks, and respond to suspicious user activity to avoid security incidents and penalties for non-compliance.
Watch these short videos to see how our Data Discovery and Classification reports can help you determine where your sensitive data is located, understand whether any of this data is exposed to unauthorized use, and monitor who is actually reading, modifying or deleting these sensitive files.
Watch these short videos to see how our security analytics reports can help you spot anomalous activity across multiple systems in your IT environment so you can block attackers and hold insiders accountable.
Watch these videos to learn how you can use predefined reports to keep tabs on what’s changing in your IT environment and set up report subscriptions to automate routine monitoring and compliance preparation.
Watch these short videos to walk through examples of how standard and threshold-based alerts enable you to effectively mitigate information security risks. You will also learn how to get the most value from the alerting feature.