Get the best out of Log360

Register Now


Shehnaaz N, Product expert

Date and Time (APAC region) Dec 14, 15, 16, and 17 at 11.30 AM IST | 10 AM GST | 2 PM SGT
Duration 45 Mins

About the workshop

This workshop will give you insights on how to utilize the different modules and capabilities of Log360 to secure your network. We'll discuss critical use cases and attack scenarios that can be mitigated and remediated using Log360. By the end of this workshop, you will be able to make better use of Log360 to secure your IT infrastructure. You'll also receive a certificate upon completion of all the sessions of the workshop.


To attend the workshop, you need to:

  • Ensure you have stable internet connectivity.
  • Join the workshop using the Zoom link that will be sent to your email upon registration.

Key takeaways from the workshop

  • Understanding log management and security auditing
  • Using Log360 to identify advanced persistent threats, internal and external attacks, and incidents
  • Utilizing predefined reports, alerts, correlation rules, and workflows, and customizing them as needed to suit your network
  • Automating your incident management and response
  • Detecting malicious user behavior in real time and mitigating it


User already registered
  • Please enter your name Please enter your email Please enter business email address
  • Please select your country Please select your state
  • Time Zone
  • Please select time zone
    By clicking 'Register Now', you agree to processing of personal data according to the Privacy Policy.

Workshop agenda

  • Session 1
  • Session 2
  • Session 3
  • Session 4

Log management: The basics

  • What is Log360?
  • Collecting logs from your end-user devices
  • Analyzing log data through custom log parsing
  • Archiving your logs
  • Searching through logs: What to search for and how to search for it

Security auditing: What to cover

  • Active Directory environments
  • Databases and web servers
  • Sensitive files and folders
  • Privileged users
  • Compliance requirements

End-to-end incident management module: Part 1

Attack detection - Detect security threats accurately

  • Event correlation: Rule-based attack detection
  • MITRE ATT&CK framework: Knowledge-based attack detection
  • Remote work security
  • User and entity behavior analytics: Machine-learning-based attack detection

End-to-end incident management module: Part 2

  • Threat intelligence: Stop malicious intruders
  • Cloud security: Secure your cloud infrastructure

Attack mitigation - Curb security threats effectively

  • Automated incident workflows for threat responses
  • Session 1
  • Session 2
  • Session 3
  • Session 4

Log360 basics - Log management

  • Overview of Log360
  • Log collection across different platforms
  • Auto-discovery of devices
  • Custom log parsing
  • Log360’s archival capability
  • Searching logs: Building search queries
  • Tagging, adding notes, and converting search results to alert profiles
  • Demonstrating a seamless console for incident investigation and resolution

Real-time security analytics with Log360 - Part I

  • Exploring the different analytical modules of Log360 with use cases
  • Demystifying Log360's analytical capabilities for:
  • Privileged user monitoring
  • Active Directory, GPO, and security group changes
  • Microsoft 365 security analytics
  • Analyzing the integrated compliance management module

Real-time security analytics with Log360 - Part II

  • Detecting attacks using Log360's security analytics capability
  • Utilizing threat intelligence to detect and mitigate threats
  • Understanding event correlation
  • Implementing the MITRE ATT&CK framework using Log360
  • Using ML-powered user and entity behavior analytics to spot bad actors

Security use cases and customization of Log360

  • Detecting advanced persistent threats in your network using Log360
  • Remediating attacks using the built-in incident response module
  • Detecting user anomalies with UEBA: Use case demonstration
  • Customizing reports, alerts, and incident workflows in Log360
  • Customizing dashboards and views to simplify security monitoring
  • Creating user roles and enabling multi-factor authentication in Log360

Trusted By

Other events and workshops

Join our product experts as they walk you through how to monitor your Active Directory environment in their exciting product workshops and thoughtfully crafted webinars.



Meet our technical evangelists to get answers to all your cybersecurity and identity management questions.

View more


Get insight into the best practices and latest trends with live demonstrations on how to achieve your AD objectives.

View more

Subscribe to our Monthly Events Newsletter

Thank you for subscribing.

  • Please enter a valid email id
    By clicking Subscribe now you agree to processing of personal data according to the Privacy Policy.

© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.