Netwrix Workshop: Delegated Access to Audit Data
About this webinar
During the second session we will showcase how to leverage the data of IT auditing process with key stakeholders whenever they need it. Watch the recorded webinar session and learn more about the new Netwrix Auditor client, subscriptions and more.
Hiding in Plain Sight: How Attackers Move through the Network Undetected
Once attackers have breached the perimeter, they often lurk in the network for months, looking for valuable data to steal. To stay hidden, they try to make their actions blend in with normal traffic.
By the end of this session, you will know:
· What techniques attackers use to traverse the network without raising alarms
· What native Microsoft tools can help you spot covert attacks
· How you can identify the hiding attacks by using Netwrix Auditor functionality