Top 12 Events to Monitor in the Windows Server Security Log

About this webinar

Recorded: February 6, 2018

Last year we spent a lot of time, and rightly so, on Active Directory and domain controllers. But don’t forget your member servers. That’s where your data actually resides and bad guys can make a lot of noise once inside a member server that you won’t hear if you are only watching Active Directory. There’s a wealth of security information available in their logs. In this webinar Randy Franklin Smith highlights the 12 most important things to monitor in the Security Log of your Windows servers:

  1. Audit policy changes
  2. User right assignments
  3. Local account authentication policy changes
  4. Local user account changes
  5. Local account enumeration
  6. Logon right changes
  7. Local group membership changes
  8. New software installed
  9. Failed logon attempts
  10. Any attempt to logon as local Administrator
  11. Firewall policy change
  12. New device attached
Hosted by
Adam Stetson,
Systems Engineer
Randy Franklin Smith,
CEO, Monterey Technology Group, Inc.

Hiding in Plain Sight: How Attackers Move through the Network Undetected

Once attackers have breached the perimeter, they often lurk in the network for months, looking for valuable data to steal. To stay hidden, they try to make their actions blend in with normal traffic.

By the end of this session, you will know:

·         What techniques attackers use to traverse the network without raising alarms

·         What native Microsoft tools can help you spot covert attacks

·         How you can identify the hiding attacks by using Netwrix Auditor functionality

24
April
2pm EDT
24 April, 2pm EDT
Register Now