Free webinar

Find weak Active Directory passwords- Enforce a custom granular password policy

  • August 22 at 11:30 AM IST | 2 PM BST
  • 45 Mins

Presented by

Sharada, Product Expert

Do you know that “Password@123” is easily susceptible to a cyberattack? Though it satisfies all the requirements of a basic password policy—the password contains a special character, a number, and an alphabet in the upper case—it is password that is so common that a dictionary attack can crack it in no time.

Passwords are our first layer of defense.

Learn how hackers can easily crack passwords which comply with Microsoft's default password policies. ADSelfService Plus can not only identify users with weak passwords but also how easy it is to create and enforce strong password policy for Active Directory and all connected enterprise applications.

Join this webinar and learn how to:

  • Identify users who have a weak password with the Weak Password Users Report FREE tool.
  • Create custom password policies that restrict dictionary words and predictable patterns.
  • Granularly enforce a password policy across several popular on-premises and cloud applications.
  • Enforce this custom password policy on the change and reset password pages, i.e., Ctrl+Alt+Del screen as well as ADUC console.
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Thanks!

Your e-book is on its way.

If you don't find it in your inbox within the next few minutes, check your spam folder.

  Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now