Tech talk

Ten tips for managing and auditing Active Directory.

  • October 15 at  3 PM BST | 10 AM EDT
  • 45 Mins

Presented by

Sid, Product expert

Megha, Product expert

Why attend this webinar?

Active Directory (AD) holds the keys to the kingdom in IT. Despite its importance, AD is often not managed and monitored properly, resulting in security loopholes that can be exploited by malicious actors. For example, inactive users or security groups with no members in them pose a security risk. Further, unchecked changes occurring in AD, such as an unwarranted escalation of privileges, can jeopardize an organization's security. 

Efficient management and continuous auditing are vital for ensuring security and compliance. In this tech talk, Megha, our IAM specialist, and Sid, our IT security specialist, will talk about crucial aspects of managing and auditing AD. They will discuss various use cases for effective AD management and auditing, such as cleaning up stale accounts, tracking group membership changes, and more. They will also demonstrate how ManageEngine AD360 can be your one-stop solution for AD management and auditing.

Agenda

  • Common security mistakes in AD. 
  • Creating an efficient process for user life cycle management. 
  • Reporting on AD objects such as users and groups. 
  • Tracking logon activity and analyzing account lockouts. 
  • Triggering alerts in real time for critical changes.
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Thanks!

Your e-book is on its way.

If you don't find it in your inbox within the next few minutes, check your spam folder.

Closed

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now