How do you determine when a nosy or potentially malicious insider tries to log on to another user’s workstation with their own account? What’s the best way to find a malicious user who attempts to log on to his or her own computer using a colleague’s password? How do you detect password sharing?
In this on-demand webinar, LogRhythm’s Marcos Schejtman teams up with Ultimate Windows Security’s Randy Franklin Smith to help you understand how to associate users with workstations and detect anomalous logon events.
You’ll learn how to utilize information available in the Active Directory and how you can use a simple pattern match by consistently following a naming convention that distinguishes servers and workstations. Additionally, you’ll gain a greater understanding about solutions that reduce the mean time to detect (MTTD) static and interactive abnormal authentications in multiple ways.
In this webinar, you’ll see subsets of LogRhythm’s User and Entity Behavior Analytics (UEBA) capabilities in action with two use cases:
Watch the on-demand webinar now to learn how to effectively spot abnormal user behavior and logon attempts.
Security strategies are evolving; driven by regulatory requirements, customer expectations around data privacy and AI-driven…
In our April 2024 quarterly release, LogRhythm Axon showcases new enhancements from its two week…
In our April 2024 quarterly release, LogRhythm SIEM introduces new enhancements to bring you faster…