Thank you for registering! You might also be interested in

You might also be interested in

Get the best out of Log360

Register Now

Presenter

Raghav Iyer, Product expert

Date and Time Jan 23, 24, 25 and 26 at 9:30 PM IST
Duration 45 Mins

About the workshop

This workshop will give you insights on how to utilize the different modules and capabilities of Log360 to secure your network. We'll discuss critical use cases and attack scenarios that can be mitigated and remediated using Log360. By the end of this workshop, you will be able to make better use of Log360 to secure your IT infrastructure. You'll also receive a certificate upon completion of all the sessions of the workshop.

Prerequisites:

To attend the workshop, you need to:

  • Ensure you have stable internet connectivity.
  • Join the workshop using the Zoom link that will be sent to your email upon registration.

Key takeaways from the workshop

  • Understanding log management and security auditing
  • Using Log360 to identify advanced persistent threats, internal and external attacks, and incidents
  • Utilizing predefined reports, alerts, correlation rules, and workflows, and customizing them as needed to suit your network
  • Automating your incident management and response
  • Detecting malicious user behavior in real time and mitigating it

Closed

Workshop agenda

  • Session 1
  • Session 2
  • Session 3
  • Session 4

Log management: The basics

  • What is Log360?
  • Collecting logs from your end-user devices
  • Analyzing log data through custom log parsing
  • Archiving your logs
  • Searching through logs: What to search for and how to search for it

Security auditing: What to cover

  • Active Directory environments
  • Databases and web servers
  • Sensitive files and folders
  • Privileged users
  • Compliance requirements

End-to-end incident management module: Part 1

Attack detection - Detect security threats accurately

  • Event correlation: Rule-based attack detection
  • MITRE ATT&CK framework: Knowledge-based attack detection
  • Remote work security
  • User and entity behavior analytics: Machine-learning-based attack detection

End-to-end incident management module: Part 2

  • Threat intelligence: Stop malicious intruders
  • Cloud security: Secure your cloud infrastructure

Attack mitigation - Curb security threats effectively

  • Automated incident workflows for threat responses
  • Session 1
  • Session 2
  • Session 3
  • Session 4

Log management: The basics

  • What is Log360?
  • Collecting logs from your end-user devices
  • Analyzing log data through custom log parsing
  • Archiving your logs
  • Searching through logs: What to search for and how to search for it

Security auditing: What to cover

  • Active Directory environments
  • Databases and web servers
  • Sensitive files and folders
  • Privileged users
  • Compliance requirements

End-to-end incident management module: Part 1

Attack detection - Detect security threats accurately

  • Event correlation: Rule-based attack detection
  • MITRE ATT&CK framework: Knowledge-based attack detection
  • Remote work security
  • User and entity behavior analytics: Machine-learning-based attack detection

End-to-end incident management module: Part 2

  • Threat intelligence: Stop malicious intruders
  • Cloud security: Secure your cloud infrastructure

Attack mitigation - Curb security threats effectively

  • Automated incident workflows for threat responses

Trusted By

Other events and workshops

Join our product experts as they walk you through how to monitor your Active Directory environment in their exciting product workshops and thoughtfully crafted webinars.

 

Seminars

Meet our technical evangelists to get answers to all your cybersecurity and identity management questions.

View more
 

Webinars

Get insight into the best practices and latest trends with live demonstrations on how to achieve your AD objectives.

View more
 

Subscribe to our Monthly Events Newsletter

Thank you for subscribing.

  • Please enter a valid email id
  •  
  •  
    By clicking Subscribe now you agree to processing of personal data according to the Privacy Policy.

© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.