Thank you for registering! We'll get in touch with you shortly.
Thank you for the referral.
Thank you for your feedback.
Thank you


1) How to register for the webinar?

Register Now

2) How to join the webinar?

Once you register, you will receive an email (from which will have the webinar's agenda, its date and time, and also your exclusive link to join the webinar session.

3) What are the audio options available?

You can use the audio options available in your computer (we recommend using headphones for a better experience), or you can also use a telephone if you wish to.

4) What are the system requirements?

To know the system requirements or check if your computer is compatible, visit this link:

5) Whom should I contact for further information or support?

Please feel free to send a mail or call us at: +1 888 720 9500. We will be glad to assist you.

We would love to hear from you.

Record your valuable feedback below

Webinar Topics

  • Session 1 - October 16

    Active Directory and server security: Tracking, monitoring, and alerting of modifications

  • Active Directory consists of many complicated, moving parts. One incorrect change can cause significant damage. Discovering when the change occurred and what was actually changed is a challenging task. However, if administrators can be notified of all critical AD and Windows server changes when they occur, overall security can be enhanced and administrators can take immediate action on the changes. In this webinar, MVP Derek Melber will go over:

    • Securing privileged groups
    • Tracking attacks on user accounts
    • Detecting Group Policy changes
    • Alerting when service accounts change
  • Session 2 - October 17

    Securing and protecting corporate networks: End point security

  • We all need to be concerned about the attacks on our end points. The end point is where most attacks occur and are successful. Knowing what you can do to help ensure end point security and protection will help reduce your overall security exposure. Microsoft states that it only takes 48 hours to gain Domain Admin credentials once one end point is compromised! In this webinar, MVP Derek Melber will go over:

    • How to protect local privileged groups
    • What measures you need to take to protect the built-in accounts
    • How to provision end points securely
    • Which Group Policy settings can help protect your end points
  • Session 3 - October 18

    Securing and protecting Active Directory: Tracking and securing insider threats

  • Organizations have to be keenly aware of the actions of their own employees, due to the advanced computer knowledge that most employees possess today. A disgruntled, bored, or challenged employee might try to find holes in the network security. This combination of knowledge and reason has led to many organizations losing critical data, experiencing prolonged downtime, and losing millions of dollars. Being able to track the different aspects of an insider attack can give administrators time to negate them. In this webinar, Derek Melber, Active Directory MVP, will discuss the various ways in which insiders attack Windows networks and how you can set up tracking to discover malicious behavior before it is too late.

    In this webinar, you will learn about:

    • How to reduce and eliminate attacks against Microsoft authentication protocols
    • What it takes to reduce the attacks against password hashes and tickets
    • What to monitor on user workstations
    • How to reduce and monitor privilege escalation attacks
  • Session 4 - October 22

    Securing and protecting Active Directory: Securing privileged access in Active Directory

  • Privileges provide a user the ability to perform an action that is typically left for administrators. Privileges should be known, maintained, and tracked at every turn. Without the knowledge of who has privileges, nearly anything could change in Active Directory without anyone knowing. Knowing how privileges are granted and how to monitor them is the biggest challenge. In this webinar, MVP Derek Melber will go over:

    • How privileges are granted in Active Directory
    • The best options for configuring privileges
    • How privileges should be monitored
    • What features your privilege access solution needs to include