FREE WEBINAR

Improve Active Directory security with advanced password policy controls and MFA

  • October 16 at  2 PM AEDT | 2 PM BST | 2 PM EDT
  • 45 Mins

Presented by

Sharada,Product expert

Sreejith,Product expert

About this webinar

Password theft is one of the main intrusion techniques hackers use. Most organizations rely heavily on passwords alone to secure their network resources, but users often create weak passwords and reuse them across critical business accounts to avoid password fatigue. This makes stealing passwords to get hold of network resources easy. 

So, what can you do to improve security? Enforce custom password policies that require users to create strong passwords. Make stolen passwords ineffective by mandating additional layers of authentication to access applications, their workstations, etc. 

Interested in learning more? Join our expert in the free webinar.

Join us and learn how to enforce,

  • Advanced password policy controls. Enforce stronger passwords for users by forcing special characters, blacklisting dictionary words and patterns (like password@123) in their password. Also enforce the password history option during reset. 
  • 2FA for Windows logons. Secure local and remote Windows logons with an additional layer of authentication.
  • MFA for self-password resets. Use MFA to ensure users reset their passwords and unlock their accounts securely.  
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Closed

  Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now