Attend and stand a chance to win an Ovo voucher.

Click here to register
Free Webinar

5 ways to detect insider attacks

Claim Your Spot Now
Presented by
Vivin,Senior Technology Evangelist, Manageengine
Bambang Gunawan,Senior Technical Consultant,
Prodata
  • Duration

    45 Mins

Closed

Setting real-time alarms for suspicious Windows events.

  • Analyzing a user account lockout to understand the source.
  • Tracking Suspicious Server/PC logon activity.
  • Recovering from service account modifications that lead to application downtime.
  • Tracking inappropriate elevation of rights that take place at a User/Group/OU/Domain level.
  • Leveraging Machine learning to sense vicious deviations in user behavior.

Zoho Corporation Pvt. Ltd. All rights reserved.