Thank you for registering! We'll get in touch with you shortly.
Thank you for the referral.
Thank you for your feedback.
 
Thank you

FAQ

1) How to register for the webinar?

Register Now

2) How to join the webinar?

Once you register, you will receive an email (from customercare@gotowebinar.com) which will have the webinar's agenda, its date and time, and also your exclusive link to join the webinar session.

3) What are the audio options available?

You can use the audio options available in your computer (we recommend using headphones for a better experience), or you can also use a telephone if you wish to.

4) What are the system requirements?

To know the system requirements or check if your computer is compatible, visit this link: https://support.logmeininc.com/gotomeeting?c_name=prodselect

5) Whom should I contact for further information or support?

Please feel free to send a mail or call us at: +1 888 720 9500. We will be glad to assist you.

We would love to hear from you.

Record your valuable feedback below

Webinar Topics

  • Session 1 - October 16 (Completed)

    Active Directory and server security: Tracking, monitoring, and alerting of modifications

  • Session 2 - October 17 (Completed)

    Securing and protecting corporate networks: End point security

  • Session 3 - October 18 (Completed)

    Securing and protecting Active Directory: Tracking and securing insider threats

  • Session 4 - October 22 (Completed)

    Securing and protecting Active Directory: Securing privileged access in Active Directory

  • Privileges provide a user the ability to perform an action that is typically left for administrators. Privileges should be known, maintained, and tracked at every turn. Without the knowledge of who has privileges, nearly anything could change in Active Directory without anyone knowing. Knowing how privileges are granted and how to monitor them is the biggest challenge. In this webinar, MVP Derek Melber will go over:

    • How privileges are granted in Active Directory
    • The best options for configuring privileges
    • How privileges should be monitored
    • What features your privilege access solution needs to include