Hacker Explains: Gaining Unauthorized Access to Your Windows IT Environment

About this webinar

Recorded: September 14, 2017

Over the past year, there has been a steady increase in cyber attacks on both enterprises and public sector entities. Analyzing these attacks in detail will help to identify attack vectors that were used and demonstrate the need to better protect our IT environments.

Join IT experts Liam Cleary and Jeff Melnick as they explain the top methods that attackers use to gain unauthorized access to your environment, using:

  • exploitation
  • pivoting
  • privilege escalation

Get practical information about how to defend against the most common attacks using native Microsoft Windows tools and Netwrix Auditor. Register for this webinar today!

Hosted by
Jeff Melnick,
Solutions engineer

Password123456: Protecting your Active Directory Castle

Hackers love it when we choose weak or leaked passwords for our most important accounts. What if we could better protect our companies by preventing users from picking over 500 million known bad passwords?  And better yet, what if we could do this for free?

In this session, you will learn how to:

  • Download and customize the popular Pwned Passwords list
  • Incorporate Pwned Passwords into Active Directory for free using the open source PwnedPasswordsDLL project
  • Build customized lists of additional bad passwords
  • Enforce a strong password policy and monitor for unauthorised changes to it using Netwrix Auditor
26
March
9am PDT
26 March, 9am PDT
Register Now