У нас вы можете посмотреть бесплатно File integrity & deception: 100 days to secure your environment - Episode 13 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Defense Against Configurations – Syslog, data change & impossible travel – 100 days to secure your environment – Episode 13 In Episode 13, ThreatLocker CEO Danny Jenkins and CTO Michael Jenkins focus on Defense Against Configurations (DAC), a new ThreatLocker feature that spots security gaps in device, application, and security policy configurations before attackers can exploit them. From visibility to rapid response, you’ll see how to harden configurations across your IT environment: · Syslog ingestion and SIEM-like visibility – Pull syslog data from firewalls and other devices into a centralized Unified Audit. Filter ingested log data using built-in parsers for specific formats like Meraki and Big-IP. · Automated mass data change detection – Flag bulk file changes (e.g., 200 files in an hour) and instantly lock down affected endpoints to stop ransomware mid-attack. · Impossible travel detection with Cloud Detect – Spot suspicious logins across integrated sources like Office 365, reducing false positives with mobile app location verification. · Disable Windows Recall – Block Microsoft’s Recall feature, which logs extensive user activity, with a simple Configuration Manager policy. · Policy review and optimization – Remove unused policies, promote rules to higher levels, verify USB restrictions, block Telnet in Windows, and test Ringfencing™ by restricting what PowerShell scripts can access. · Canary file detection – Place decoy files that trigger alerts on unauthorized access, an effective layer for insider threat detection. To register for the remaining episodes of 100 Days to Secure Your Environment, visit https://www.threatlocker.com/resource....