Top 12 Events to Monitor in the Windows Server Security Log

About this webinar

Recorded: February 6, 2018

Last year we spent a lot of time, and rightly so, on Active Directory and domain controllers. But don’t forget your member servers. That’s where your data actually resides and bad guys can make a lot of noise once inside a member server that you won’t hear if you are only watching Active Directory. There’s a wealth of security information available in their logs. In this webinar, Randy Franklin Smith highlights the 12 most important things to monitor in the Security Log of your Windows servers:

  1. Audit policy changes
  2. User right assignments
  3. Local account authentication policy changes
  4. Local user account changes
  5. Local account enumeration
  6. Logon right changes
  7. Local group membership changes
  8. New software installed
  9. Failed logon attempts
  10. Any attempt to logon as local Administrator
  11. Firewall policy change
  12. New device attached
Hosted by
Adam Stetson,
Systems engineer
Randy Franklin Smith,
CEO, Monterey Technology Group, Inc.

Netwrix Auditor Product Demo

See what Netwrix Auditor has to offer, including how you can prevent data breaches by staying in control of your sensitive and regulated data. Join a Netwrix systems engineer as he demonstrates how to:

  • Identify and remediate your biggest security gaps using the IT Risk Assessment dashboard
  • Detect and investigate abnormal user behavior faster with alerts and Google-like search
  • Minimize response time to common incidents or anticipated threats with Automated Response
  • Pass compliance audits with far less effort using Data Discovery and Classification
  • And much more

Sign up for the live demo now!

20
June
1pm EDT
20 June, 1pm EDT
Register Now