Thank you for registering! You might also be interested in

You might also be interested in

Get the best out of Log360

Register Now

Presenter

Varun, Product expert

Date and Time Sept 26, 27 and 28 at 3:30 PM IST
Duration 45 Mins

About the workshop

This workshop will give you insights on how to utilize the different modules and capabilities of Log360 to secure your network. We'll discuss critical use cases and attack scenarios that can be mitigated and remediated using Log360. By the end of this workshop, you will be able to make better use of Log360 to secure your IT infrastructure. You'll also receive a certificate upon completion of all the sessions of the workshop.

Prerequisites:

To attend the workshop, you need to:

  • Ensure you have stable internet connectivity.
  • Join the workshop using the Zoom link that will be sent to your email upon registration.

Key takeaways from the workshop

  • Understanding log management and security auditing
  • Using Log360 to identify advanced persistent threats, internal and external attacks, and incidents
  • Utilizing predefined reports, alerts, correlation rules, and workflows, and customizing them as needed to suit your network
  • Automating your incident management and response
  • Detecting malicious user behavior in real time and mitigating it

Register Now

x
User already registered
  • Please enter your name Please enter your email Please enter business email address
  • Please select your country Please select your state
  • Time Zone
  • Please select time zone
  • Please select a date for the demo
  •  
    By clicking 'Register Now', you agree to processing of personal data according to the Privacy Policy.

Workshop agenda

  • Session 1
  • Session 2
  • Session 3

Getting started with Log360

  • What is Log360?
  • Configuring log sources and Custom Log Parsing
  • Creating technicians and assigning roles
  • Dashboards, reports and searching through logs
  • Managing compliance requirements

Detecting, responding and managing security Incidents

  • Threat Intelligence and MITRE framework for advanced threat detection
  • Alerting and event correlation
  • Response workflows: Your first line of defense
  • Tracking and managing incidents centrally

User activity and risk monitoring

  • AD server monitoring
  • User and entity behavioral analytics(UEBA): ML based anomaly detection
  • Monitoring cloud applications usage
  • Managing sensitive data and risks
  • Session 1
  • Session 2
  • Session 3

Getting started with Log360

  • What is Log360?
  • Configuring log sources and Custom Log Parsing
  • Creating technicians and assigning roles
  • Dashboards, reports and searching through logs
  • Managing compliance requirements

Detecting, responding and managing security Incidents

  • Threat Intelligence and MITRE framework for advanced threat detection
  • Alerting and event correlation
  • Response workflows: Your first line of defense
  • Tracking and managing incidents centrally

User activity and risk monitoring

  • AD server monitoring
  • User and entity behavioral analytics(UEBA): ML based anomaly detection
  • Monitoring cloud applications usage
  • Managing sensitive data and risks

Trusted By

Other events and workshops

Join our product experts as they walk you through how to monitor your Active Directory environment in their exciting product workshops and thoughtfully crafted webinars.

 

Seminars

Meet our technical evangelists to get answers to all your cybersecurity and identity management questions.

View more
 

Webinars

Get insight into the best practices and latest trends with live demonstrations on how to achieve your AD objectives.

View more
 

Subscribe to our Monthly Events Newsletter

Thank you for subscribing.

  • Please enter a valid email id
  •  
  •  
    By clicking Subscribe now you agree to processing of personal data according to the Privacy Policy.

© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.