20-day Trial
Privacy Policy
Live & Recorded Webinars
Learn about the best practices of IT infrastructure auditing, get your questions answered and discover how Netwrix helps you gain visibility into your hybrid IT environment
Netwrix has become an Approved CPE Provider. Join our webinars and earn your CPE credits!

Systems Engineer
Live Demo: Netwrix Auditor – Data Discovery & Classification Edition
Meet the brand-new Netwrix Auditor – Data Discovery and Classification Edition, which provides complete visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them.
Join us and see how you can:
- Identify and classify the sensitive data you store
- Spot any sensitive data that surfaces outside of a secure location
- Prove the effectiveness of your data security controls to auditors
- And more

Systems Engineer

Microsoft MVP
Privilege Escalation: How Hackers Get Elevated Permissions
Often, to inflict damage on critical systems or steal the data they want, attackers need administrative-level access. Gaining those permissions is not a simple task, since most operating systems now have built-in protections against privilege escalation. But many attackers do succeed.
During this webcast, you will discover:
· Top methods that attackers use to escalate their privileges
· How to defend against these techniques
· How you can quickly identify and investigate privilege escalation
A Hacker Explains: How Attackers Move through the Network Undetected
Once hackers have breached your perimeter, they often lurk in your network for months, looking for valuable data to steal. This first-hand session is packed with actionable information that will help you detect attacks before it’s too late.
Product Demo: Netwrix Auditor – Data Discovery & Classification Edition
Meet the brand-new Netwrix Auditor – Data Discovery and Classification Edition, which provides complete visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them.
A Hacker Explains: How Attackers Break in
Are you aware of what is happening across your IT environment? Are you certain your data is secure? Watch the recording now as Liam Cleary, our expert hacker, reveals what types of attacks to be on the lookout for and how to identify them quickly.
Pre-Release Demo: Netwrix Auditor – Data Discovery and Classification Edition
Meet the brand-new Netwrix Auditor Data Discovery and Classification Edition, which provides complete visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them.
Best Practices for Addressing the HIPAA Security Rule
Are you worried that you don’t know where to start to pass an upcoming HIPAA audit? To help you, a renowned HIPAA consultant David Ginsberg will spotlight best practices for addressing the HIPAA Security Rule, with a focus on the Audit Controls standard.
GDPR: How to Stop Suffering and Start Benefiting
Watch our webinar to learn about the main provisions of the GDPR, the challenges you face as a result and how GDPR compliance can actually be advantageous to your organization.
Top 12 Events to Monitor in the Windows Server Security Log
Last year we spent a lot of time, and rightly so, on Active Directory and domain controllers. But don’t forget your member servers. That’s where your data actually resides and bad guys can make a lot of noise once inside a member server that you won’t hear if you are only watching Active Directory.
Netwrix Auditor for Active Directory and Azure AD
In this product demo, you'll learn how Netwrix Auditor for Active Directory provides complete visibility into what is happening across your critical systems. This will help you to streamline compliance, strengthen security, and simplify root cause analysis.
Risk Assessment: Unveil Hidden Risks and Minimize Your Attack Surface
Effective IT risk management requires continuous risk assessment and mitigation. Netwrix Auditor 9.5 makes it easy to understand your current risk profile, pinpoint and prioritize your vulnerabilities, and know what steps to take to remediate them, so you can maintain security and regulatory compliance.
Watch our webinar and learn how to:
- Identify security gaps in your IT infrastructure
- Get actionable data to reduce risks
- Establish a continuous risk assessment and mitigation process
Tracking changes in Hybrid Identity environments with both AD and Azure AD
It’s a daunting struggle to manage both Active Directory and Azure AD, let alone ensure the security of such deployments. How can you monitor critical changes? Or prove compliance with the certifications your organization needs?
In this webinar, you will learn how Netwrix Auditor can help you to:
- Monitor privileged account activity
- Stay on top of critical changes and a slew of security threats in Hybrid Identity environments
Get an abundance of ready-to-go recommended practices, so you’ll be able to start with Netwrix Auditor 9.5 the right way, immediately.
Netwrix Auditor 9.5 Product Demonstration
In this technical webinar, we will guide you through the key functionality of Netwrix Auditor 9.5. You’ll learn how to use Netwrix Auditor more effectively to audit critical systems such as Active Directory, Windows file servers, Microsoft SQL Server and many more.
By the end of the session, you will know how to:
- Quickly investigate security incidents with the Interactive Search feature
- Keep abreast of user activity across multiple systems using predefined reports
- Configure alerts to be notified about high-risk activity
- Set up report subscriptions to automate report delivery
- And much more!
What’s New in Netwrix Auditor 9.5
Meet Netwrix Auditor 9.5! The latest version of this visibility platform for user behavior analysis and risk mitigation provides even more features that empower you to identify, assess and reduce risks to your IT infrastructure and data.
Top Horrors of IT Security
What are you most afraid of? Clowns? Recent events like the recent Equifax breach and DNC hack? A sudden knock on the door by an unscheduled auditor? A sophisticated ransomware attack unleashed on your entire domain?
Netwrix Auditor 9.0: Architecture and Deployment Deep Dive
In this webinar, we’ll walk you through the architecture and technology behind Netwrix Auditor 9.0 so you can deploy Netwrix Auditor 9.0 in the most efficient and effective way. You’ll learn about:
- Deployment best practices
- Common issues and solutions
- Reports and searches
- Open Q&A
If you want to learn how to get the most out of Netwrix Auditor in your environment, this webinar is for you!
Product Demo: Netwrix Auditor 9.0
In this technical webinar, we will guide you through the key functionality of Netwrix Auditor 9.0. You’ll learn how to use Netwrix Auditor more effectively to audit critical systems such as Active Directory, Windows file servers, Microsoft SQL Server and many more.
By the end of the session, you will know how to:
- Quickly investigate security incidents with the Interactive Search feature
- Keep abreast of user activity across multiple systems using predefined reports
- Configure alerts to be notified about high-risk activity
- Set up report subscriptions to automate report delivery
- And much more!
Hacker Explains: Gaining Unauthorized Access to Your Windows IT Environment
Over the past year, there has been a steady increase in cyber attacks on both enterprises and public sector entities. Analyzing these attacks in detail will help to identify attack vectors that were used and demonstrate the need to better protect our IT environments.
Join IT experts Liam Cleary and Jeff Melnick as they explain the top methods that attackers use to gain unauthorized access to your environment, using:
- exploitation
- pivoting
- privilege escalation
Get practical information about how to defend against the most common attacks using native Microsoft Windows tools and Netwrix Auditor. Watch this recorded webinar now!
How to Survive a #Datapocalypse and Get Away With it
With all the attacks, data leaks and breaches, an efficient IT security strategy is now vital for organizations, large and small. All IT systems, from the personal laptop to the enterprise-class data center, are at risk from ransomware, unauthorized access and other threats.
Outsmarting Ransomware: Hints and Tricks
Watch our recorded webinar and learn how to implement a least-privilege model and make sure it works, so you can minimize the damage malware can do, how to spot possible ransomware activity so you can quickly shut it down and more!
Top 5 Critical Active Directory Events You Need Visibility Into
Learn how to bring more visibility into administrator activity, group membership changes, security delegation changes, group policy changes and more.
The Ocean Won’t Save You: the GDPR Implications for the US Business
Watch our recorded webinar and learn how to prepare for the GDPR and avoid surprises in 2018!
Early Breach Detection: How to Shorten Dwell Time
Watch our recorded webinar and learn how to detect abnormal user behavior that might result in data loss, mitigate the risk of data theft, minimize the damage an attacker can do, and more!
Don’t ‘WannaCry’ No More: How to Shield Your IT Infrastructure from Ransomware
Watch our recorded educational webinar and learn how to shield your IT environment from ransomware!
Top 10 Critical Incidents in Your IT Infrastructure You Need Visibility Into
Learn more about best practices in auditing changes to your critical IT systems, including Active Directory, Microsoft Exchange, file servers, Microsoft SQL Server, Windows Server, and others.
Product Overview: Netwrix Auditor 9.0
Watch the recorded demo of Netwrix Auditor 9.0. This session is an excellent starting point for beginners and experienced users who want to explore the key functionality available in Netwrix Auditor 9.0. By the end of the session, you will learn how to:
- Quickly investigate security incidents with interactive search;
- Keep track of user activity across multiple systems by using predefined reports;
- Configure alerts to flag high-risk activity and report subscriptions for timely delivery;
- And much more!
Beyond Perimeter: Detecting Ransomware and Aberrant User Behavior
The avalanche of recent WannaCry Ransomware attacks proves that cybercriminals have been successful in creating new techniques and deceptive tactics that easily outpace traditional perimeter security. Under these conditions, what is your security plan to detect the threats that are already inside?
Watch the recorded webinar and learn how to:
- Detect ransomware attacks like WannaCry once they are inside
- Bring context to the data your SIEMs and other tools are already collecting
- Gain true visibility into what’s really happening in your IT infrastructure
Product Demo: Maximize Visibility into File Servers with Netwrix Auditor
Watch the recorded live demo of Netwrix Auditor 9.0 to learn more about how you can stay abreast of the activity happening across your file servers. During this session, we will show you how Netwrix Auditor enables complete visibility into:
- Windows-based file servers;
- EMC Storage;
- NetApp Filers;
- And more!
Mitigating the Threat of Data Theft by Departing Employees
Watch the recorded webinar and get tips on how to prevent sensitive data from being grabbed by a leaving employee!
How to Survive an IT Audit and Thrive Off It!
Watch the recorded webinar and learn about top control processes that should be taken care of as matters of best practice or as core components of any IT compliance.
What's New in Netwrix Auditor 9.0
In this webcast, our experts will demonstrate new capabilities of Netwrix Auditor 9.0 and provide answers to all of your questions about the new version.
Netwrix Virtual Customer Summit
Watch the recorded Netwrix Virtual Customer Summit session and learn more about the new release of the all-new Netwrix Auditor, our biggest achievements today and future goals and more.
How to Detect Anomalous User Behavior before a Breach Occurs
Watch a recorded webinar and learn more about how you can safeguard your IT environment by tracking down aberrant user behavior!
Product Demo: Maximize Visibility into Active Directory and Microsoft Exchange Server with Netwrix Auditor
Watch the recorded product demo of Netwrix Auditor 8.5 to learn more about how you can stay abreast of the activity happening across your Active Directory and Microsoft Exchange Server.
[Crash Course]: 5 Steps to Protect PHI and Pass HIPAA Audits with Less Effort
Watch our crash course and and get answers to questions such as:
- How can your organization become more resilient to the cyber threats that endanger your highly sensitive PHI?
- How can you prepare for and pass HIPAA audits more effectively?
- How can you implement the best practices created by one of the health service providers?
Product Overview: Netwrix Auditor 8.5
Watch the recorded demo of Netwrix Auditor 8.5. This session is an excellent starting point for beginners and experienced users who want to explore the key functionality available in Netwrix Auditor 8.5. By the end of the session, you will learn how to:
- Quickly investigate security incidents with interactive search;
- Keep track of user activity across multiple systems by using predefined reports;
- Configure alerts to flag high-risk activity and report subscriptions for timely delivery;
- And much more!
Top 5 FAQs about File Analysis
Watch our recorded webcast and learn how you can make smarter information management decisions for unstructured data.
Withstanding a Ransomware Attack: A Step-by-Step Guide
Watch the recording of our new webinar and learn how to withstand a ransomware attack!
Cloud Security: Who is Responsible for Your Critical Assets?
Watch our new webcast and learn what you need to keep in mind when your data resides in the cloud
Detecting Threats to Structured Data in Oracle Database and SQL Server
Databases are used to keep an organization’s most valuable assets. When you hear about large amounts of sensitive data being stolen, the chances are that the data was residing in a database when it was attacked. For companies storing such information, visibility into those elements of IT infrastructure is essential from the viewpoints of data security, compliance with regulatory standards, and data availability for users and software applications.
Join our recorded webinar to learn:
• How to harden your database security and ensure its uninterrupted availability
• What are the most critical incidents in your Oracle Database and SQL Server environment that you need to keep an eye on
• And more!
Top 5 Windows File Server Incidents You Need Visibility Into
Watch the recorded webcast to learn how to bring more visibility into user behavior across your file servers, detect anomalous activity spikes, changes to access permissions, overexposed data and more.
What's New in Netwrix Auditor 8.5
In this webcast, our experts will demonstrate new applications and features of Netwrix Auditor 8.5 and provide answers to all of yours questions about the new version.
Top 5 Critical Exchange Online Events You Need Visibility Into
Learn about the top 5 security actions in the hosted Exchange component of Microsoft Office 365 you need to be the first to know about.
Product Overview: Netwrix Auditor 8.0
Watch the recorded product demo to explore the key functionality available in Netwrix Auditor 8.0.
Best Hidden Features of Netwrix Auditor 8.0
With the release of Netwrix Auditor 8.0, we’ve revealed some of the new and powerful features designed to deliver #completevisibility into hybrid cloud IT infrastructures to protect data at rest regardless of its location. But do you know, that there are new hidden features that only power users know about?
Watch the recorded webinar for a sneak peek at the top features of Netwrix Auditor 8.0 that you didn’t know existed.
Product Demo: Netwrix Auditor 8.0. File Servers Auditing
Watch a recorded demo of Netwrix Auditor 8.0 to learn more about auditing file servers.
Deep Dive into IT Auditing
Watch the webinar recording and get up to speed quickly on how to start IT auditing and take advantage of it.
In this webcast, we’ll dive deep into IT auditing and discuss the top critical changes to audit in your IT infrastructure, best practices, and key tips and tricks for using Netwrix Auditor.
Introduction to IT Auditing
Watch the first session of the two-session online course “Getting Started with IT Auditing,” and get up to speed quickly on how to start IT auditing and take advantage of it.
Netwrix Workshop: File Analysis
Watch the recorded webinar to learn how to quickly detect excessive access rights, overexposed data, suspicious access attempts and more.
Netwrix Workshop: EMC and NetApp Auditing
Learn how to detect insider threats and prevent breaches of unstructured data in EMC Isilon, VNX, VNXe and the latest versions of NetApp Data ONTAP.
Netwrix Workshop: Office 365 Auditing
Watch the recorded webinar session and learn how to protect data in the cloud by auditing changes to security settings and non-owner mailbox access in Microsoft Exchange Online.
Top Critical Changes to Audit in SharePoint
Today, Microsoft SharePoint is one of the most popular and frequently used IT systems for collaboration, document management, content creation and sharing. Watcth the recorded webinar and learn why auditing is a must-have component of any company’s security strategy, and how it can enable visibility into what’s happening in Microsoft SharePoint.
Back to Basics: IT Infrastructure Configuration Tips & Tricks. Configuring Windows Server, SharePoint for Audit
Watch the recorded webinar session to learn how to configure the target environment to successfully audit Windows Server and Microsoft SharePoint.
What’s New in Netwrix Auditor 8.0
New Netwrix Auditor 8.0 delivers #completevisibility into hybrid cloud IT infrastructures to protect your data at rest regardless of its location.
Watch the recorded webinar session to see what’s new in Netwrix Auditor 8.0. We’ll show you how to take advantage of the new functionality available and explore top features.
Netwrix Virtual Customer Summit 2016
Watch the recorded Netwrix Virtual Customer Summit session and learn more about the new release of the all-new Netwrix Auditor, our biggest achievements today and future goals and more.
How to Maximize the Value of Your Splunk Investment
As a SIEM solution, Splunk collects and correlates vast amounts of machine data from anywhere in the IT environment, which can be used for various IT needs. However, being an event-based solution that relies on a single source of data, Splunk provides its data in a raw format with no granular details that can be critical for security and compliance.
Watch the recorded webinar and learn how to add actionable details to Splunk´s output data, drive down Splunk costs and much more.
Product Demo: Netwrix Auditor 7.1. File Servers and Microsoft SQL Server Auditing
Watch the recorded product demo session of Netwrix Auditor 7.1 to learn more about auditing file servers and Microsoft SQL Server. During this session, we will show you how Netwrix Auditor enables complete visibility into: Windows-based file servers; EMC Storage; NetApp Filers; Microsoft SQL Server and more!
Three Ways Auditing Can Solidify Your Security Strategy
According to the Global State of Information Security Survey 2016, the number of security incidents has grown by 38% this year. Cybercriminals have been successful in creating new techniques and deceptive tactics that outpace security efforts. In this recorded webinar session, you will learn how auditing can help mitigate the risk of data breaches and solidify your security strategy overall.
Product Demo: Netwrix Auditor 7.1 Windows Server Auditing
Join us for a live demo of Netwrix Auditor 7.1. to learn more about auditing Windows Server. During the session, we will guide you on how Netwrix Auditor enables complete visibility into:
- Windows Server;
- Event Log;
- And more!
Back to Basics: IT Infrastructure Configuration Tips & Tricks. Configuring Active Directory, Group Policy, Exchange for Audit
Watch the recorded webinar session to learn how to configure the target environment to successfully audit Active Directory, Group Policy, and Exchange.
Top 7 Questions to Assess Data Security in the Enterprise
Watch the recorded webinar session and get an insight into how file system security can be assessed and addressed by asking just seven questions.
Become an Active Directory Auditing Superstar: Part 1. Getting Started with Active Directory Auditing
Watch the recorded webinar session to learn more about how to start auditing process with Active Directory:
- Typical Active Directory auditing scenarios;
- First steps in Active Directory auditing;
- Configurating Active Directory for an audit;
- Typical problems;
- Native auditing.
Become an Active Directory Auditing Superstar: Part 2. Deep Dive into Active Directory Auditing
Watch the second recorded webinar session to deep dive into Active Directory Auditing by learning more about:
- Most critical changes to audit in Active Directory;
- Limitations of native auditing and how to overcome them;
- Active Directory auditing with Netwrix Auditor;
- Best tips and tricks in Active Directory auditing.
Netwrix Workshop: Delegated Access to Audit Data
During the second session we will showcase how to leverage the data of IT auditing process with key stakeholders whenever they need it. Learn more about the new Netwrix Auditor client, subscriptions and more.
How to Ensure Continuous Compliance? Episode IV. SOX
All public companies must be compliant with SOX regulations. During this session, we will discuss:
- SOX requirements;
- Continuous compliance and Netwrix;
- Case study: SOX compliance established with Netwrix.
Mitigating the Risk of Security Breaches and Minimizing Compliance Costs in the Enterprise
The growing number of security risks and the tightening of compliance regulations require organizations to allocate bigger portions of their IT budgets on preventing breaches and passing compliance audits.
Watch the webinar recording and learn how to mitigate the risk of data breaches and avoid fines for non-compliance with regulatory standards by enabling complete visibility of IT infrastructure.
Netwrix Workshop: Interactive Search
Watch the recorded webinar session and learn how the new feature allows you to quickly sort through your data and fine-tune search criteria until you find the information you are looking for. Find an answer to any possible question in several minutes. Export the results into a custom report, which can be saved for later use or shared with anyone.
How to Ensure Continuous Compliance? Episode III. FISMA
All kinds of federal organizations must be compliant with FISMA regulation. During this webinar we will talk about:
- NIST security controls and mechanisms for implementation;
- Continuous compliance and Netwrix;
- Case Study: FISMA Compliance established with Netwrix.
How to Ensure Continuous Compliance? Episode II. PCI
All organizations that store and transmit credit card data and billing information need to ensure continuous compliance with all PCI requirements. Watch the recorded webinar session and learn more about:
- PCI standards;
- Continuous compliance and Netwrix;
- Case Study: PCI Compliance established with Netwrix.
What’s New in Netwrix Auditor VEGA (7.0)
With the release of Netwrix Auditor VEGA, we’re changing the way organizations find and access actionable audit data for investigating security incidents and passing compliance audits.
Watch the recorded webinar session and learn how to take advantage of the new functionality available in Netwrix Auditor VEGA, including:
- Interactive Search;
- Delegated Access to Audit Data;
- Out-of-the-box Compliance Reports;
- And much more!
How to Ensure Continuous Compliance? Episode I. HIPAA
Healthcare organizations and their business associates have to ensure HIPAA Compliance to protect health information. During the first webinar session you will learn about:
- HIPAA Security Rule and its implementation;
- Continuous compliance and Netwrix;
- Case Study: HIPAA Compliance established with Netwrix.
Top 5 Critical Changes to Audit in Microsoft SharePoint
Microsoft SharePoint has found its way into many IT environments, just like yours; for many organizations, it has already become a critical service. Regardless of SharePoint deployment size and maturity, absence of proper change documentation and audits can lead to a serious risk.
Join Ron Charity, Enterprise Architect, and Ilia Sotnikov, Director of Product Management at Netwrix, to see real life examples from actual SharePoint deployments and find out how third party tools such as Netwrix Auditor are helping organizations meet regulatory compliance requirements, protect sensitive information, and minimize risks to business operations.
Active Directory Auditing Headaches and How to Solve Them
Keeping tabs on changes to Active Directory can be a challenge for even the most experienced IT administrator. In this 45-minute webinar, Microsoft MVP and Petri IT Knowledgebase Contributing Editor John O’Neill Sr., will help you identify some primary Active Directory auditing headaches and present some tips and advice on how to manage them.
Frequently Asked Questions
in the CPE program?