Register now for Shield Virtual 2020: A Cybersecurity and IAM Online Seminar. Save your spot now >>

Thanks for registering
Mail sent successfully.
Thank you for the referral.

Active Directory & IT Security

Virtual Seminar

  • May 7 & 8
  • 2 PM EDT

Highlights & Benefits

  • Watch presentations from speakers with impeccable credentials.

  • Learn about the next-gen Active Directory management trends and techniques.

  • Know how to configure and monitor the critical security settings of your AD environment.

  • Learn how to combat various security threats with effective log management techniques.

  • Consult with our AD experts. Discuss your Active Directory challenges with them.


  • ADManager Plus & ADSelfService Plus

    Day 1

    May 7 | Tuesday
  • ADAudit Plus & EventLog Analyzer

    Day 2

    May 8 | Wednesday
  • 2:00 PM - 2:45 PM

    Managing a Hybrid Active Directory Environment

    1. How to simplify user provisioning for on-prem and cloud environments
    2. How user life cycle automation can streamline license management
    3. How to improve identity governance efficiency going beyond native limitations.
  • 2:45 PM - 3:30 PM

    Improve your Active Directory password security with ADSelfService Plus.

    1. Secure Windows logons with two-factor authentication (2FA).
    2. Enforce granular password policy across Active Directory and other business applications.
    3. Strengthen self-service password reset with multi-factor authentication (MFA).
    4. Provide Active Directory-based single sign-on and password synchronization.



Product Expert -


Product Expert -

  • 2:00 PM - 2:45 PM

    Continuous change auditing with ADAudit Plus.

    1. Overcome the limitations of native auditing with ADAudit Plus.
    2. Track user logon and logoff activities.
    3. Track AD Objects and GPO.
    4. Customize reports, set up alerts, and automate response to alerts.
  • 2:45 PM - 3:30 PM

    IT Security and Risk: recommendations to safe guard one's IT landscape with SIEM

    1. Dealing with attacks: Auditing, compliance, and continuous monitoring are critical
    2. Setting up critical security alerts to detect potential threats in your network.
    3. Auditing network devices: Detecting and preventing network intrusions.
    4. The importance of correlation and ways to correlate events to monitor your entire network
    5. Poor data governance leaves you vulnerable to breaches.
    6. Data classification: The importance and need.
    7. How to track the access and movement of sensitive files in your data storage devices.



Technical Evangelist -


Register now


A division of Corporation

4141 Hacienda Drive, Pleasanton, California 94588, USA

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.