Top 12 Events to Monitor in the Windows Server Security Log

About this webinar

Recorded: February 6, 2018

Last year we spent a lot of time, and rightly so, on Active Directory and domain controllers. But don’t forget your member servers. That’s where your data actually resides and bad guys can make a lot of noise once inside a member server that you won’t hear if you are only watching Active Directory. There’s a wealth of security information available in their logs. In this webinar Randy Franklin Smith highlights the 12 most important things to monitor in the Security Log of your Windows servers:

  1. Audit policy changes
  2. User right assignments
  3. Local account authentication policy changes
  4. Local user account changes
  5. Local account enumeration
  6. Logon right changes
  7. Local group membership changes
  8. New software installed
  9. Failed logon attempts
  10. Any attempt to logon as local Administrator
  11. Firewall policy change
  12. New device attached
Hosted by
Adam Stetson,
Systems Engineer
Randy Franklin Smith,
CEO, Monterey Technology Group, Inc.

Compliance in the Cloud: How to Secure Identities and Meet Regulatory Requirements

Cloud technology offers a host of benefits, including flexibility and accessibility. But it also brings new compliance challenges and security risks. Although cloud providers claim that their technology is mature enough to handle any security-related issues, ensuring data integrity in the cloud and proving it to compliance auditors are still top concerns for most organizations.

Join us to get deep insight on:

·         How you can share responsibility for IT security with cloud providers

·         How to protect the sensitive data you store in the cloud

·         How to meet compliance requirements for data in the cloud

24
October
11am EDT
24 October, 11am EDT
Register Now