Top 5 Critical Changes to Audit in Microsoft SharePoint

About this webinar

Recorded: June 26, 2014

SharePoint is a highly visible application that was deployed as a nice-to-have service in many organizations. For many organizations, SharePoint has become a critical service, providing collaboration, document management, and search and social functions that support important business operations. To compound the problem, many organizations have relaxed SharePoint change management processes, or do not have them at all.

Absence of proper change documentation and audits has led many SharePoint environments to risk incompliance with government and industry regulations, compromising sensitive information and impacting business continuity. Now, more than ever, IT is under pressure to provide SharePoint with a consistent level of service for an increasingly demanding user community.

Learn from industry experts:

  • See real life examples from actual SharePoint deployments that help better understand where processes and policies can fall short when not supported with the real change audit data from your SharePoint environment.
  • Learn what critical aspects of your SharePoint environment you should watch closely to mitigate compliance and security risks.
  • Find out how third party tools, such as Netwrix Auditor, are helping organizations meet regulatory compliance requirements, protect sensitive information, and minimize risk to business operations.
Hosted by
Ilia Sotnikov,
Vice President, Product Management
Ron Charity,
Industry Expert

Hiding in Plain Sight: How Attackers Move through the Network Undetected

Once attackers have breached the perimeter, they often lurk in the network for months, looking for valuable data to steal. To stay hidden, they try to make their actions blend in with normal traffic.

By the end of this session, you will know:

·         What techniques attackers use to traverse the network without raising alarms

·         What native Microsoft tools can help you spot covert attacks

·         How you can identify the hiding attacks by using Netwrix Auditor functionality

24
April
2pm EDT
24 April, 2pm EDT
Register Now