Free webinar

Improve Active Directory security with advanced password policy controls and MFA

  • July 23at 2 PM AEST
  • 45 Mins
  • July 23at 2 PM BST
  • 45 Mins
  • July 23at 2 PM GST
  • 45 Mins
  • July 23at 2 PM EDT
  • 45 Mins

Presented by

Sharada, Product Expert

Sreejith, Product Specialist

Password theft is one of the main intrusion techniques hackers use. Most organizations rely heavily on passwords alone to secure their network resources, but users often create weak passwords and reuse them across critical business accounts to avoid password fatigue. This makes stealing passwords to get hold of network resources easy.

So, what can you do to improve security? Enforce custom password policies that require users to create strong passwords. Make stolen passwords ineffective by mandating additional layers of authentication to access applications, their workstations, etc.

Interested in learning more? Join our expert in the free webinar.

Agenda

  • Advanced password policy controls. Enforce stronger passwords for users by forcing special characters, blacklisting dictionary words and patterns (like @123) in their password. Also enforce the password history option during reset.
  • 2FA for Windows logons. Secure local and remote Windows logons with an additional layer of authentication.
  • MFA for self-password resets. Use MFA to ensure users reset their passwords and unlock their accounts securely.
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Thanks!

Your e-book is on its way.

If you don't find it in your inbox within the next few minutes, check your spam folder.

  Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now