Get the best out of Log360

Register Now

Presented by

Shehnaaz N, Product expert

Date and Time Aug 17, 18, 19 and 24 at 11.30 AM IST | 10 AM GST | 2 PM SGT
Duration 45 Mins

About the workshop

This workshop will give you insights on how to utilize the different modules and capabilities of Log360 to secure your network. We'll discuss critical use cases and attack scenarios that can be mitigated and remediated using Log360. By the end of this workshop, you will be able to make better use of Log360 to secure your IT infrastructure. You'll also receive a certificate upon completion of all the sessions of the workshop.

Prerequisites:

To attend the workshop, you need to:

  • Ensure you have stable internet connectivity.
  • Join the workshop using the Zoom link that will be sent to your email upon registration.

Key takeaways from the workshop

  • Understanding log management and security auditing
  • Using Log360 to identify advanced persistent threats, internal and external attacks, and incidents
  • Utilizing predefined reports, alerts, correlation rules, and workflows, and customizing them as needed to suit your network
  • Automating your incident management and response
  • Detecting malicious user behavior in real time and mitigating it

Register for the Workshop

x
User already registered
  • Please enter your name Please enter your email Please enter business email address
  • Please select your country Please select your state
  • Time Zone
  •  
    By clicking 'Register Now', you agree to processing of personal data according to the Privacy Policy.

Workshop agenda

  • Session 1
  • Session 2
  • Session 3
  • Session 4

Log360 basics - Log management

  • Overview of Log360
  • Log collection across different platforms
  • Auto-discovery of devices
  • Custom log parsing
  • Log360’s archival capability
  • Searching logs: Building search queries
  • Tagging, adding notes, and converting search results to alert profiles
  • Demonstrating a seamless console for incident investigation and resolution

Real-time security analytics with Log360 - Part I

  • Exploring the different analytical modules of Log360 with use cases
  • Demystifying Log360's analytical capabilities for:
  • Privileged user monitoring
  • Active Directory, GPO, and security group changes
  • Microsoft 365 security analytics
  • Analyzing the integrated compliance management module

Real-time security analytics with Log360 - Part II

  • Detecting attacks using Log360's security analytics capability
  • Utilizing threat intelligence to detect and mitigate threats
  • Understanding event correlation
  • Implementing the MITRE ATT&CK framework using Log360
  • Using ML-powered user and entity behavior analytics to spot bad actors

Security use cases and customization of Log360

  • Detecting advanced persistent threats in your network using Log360
  • Remediating attacks using the built-in incident response module
  • Detecting user anomalies with UEBA: Use case demonstration
  • Customizing reports, alerts, and incident workflows in Log360
  • Customizing dashboards and views to simplify security monitoring
  • Creating user roles and enabling multi-factor authentication in Log360

Trusted By

Other events and workshops

Join our product experts as they walk you through how to monitor your Active Directory environment in their exciting product workshops and thoughtfully crafted webinars.

 

Seminars

Meet our technical evangelists to get answers to all your cybersecurity and identity management questions.

View more
 

Webinars

Get insight into the best practices and latest trends with live demonstrations on how to achieve your AD objectives.

View more
 

Subscribe to our Monthly Events Newsletter

Thank you for subscribing.

  • Please enter a valid email id
  •  
  •  
    By clicking Subscribe now you agree to processing of personal data according to the Privacy Policy.

© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.