Correlating DHCP, DNS and Active Directory Data with Network Logs for User Attribution

Register Now

On-Demand Webcast with Ultimate Windows Security & Rapid7 

A vast majority of logs are collected on the network level and only contain IP addresses, making it difficult to identify the corresponding asset. For most security teams, retracing user activity across assets, accounts, and cloud services requires concentrated, manual effort.

Wondering how you can improve your threat detection and response effectiveness? In this training you will learn:

  • How to correlate logs from a variety of sources to determine user attribution
  • How to improve your investigations so you're able to investigate more, faster 
  • How Rapid7 InsightIDR automatically correlates all of this data

Speakers

Eric Sun

Senior Solutions Marketing Manager
Rapid7

Randy Smith


Ultimate Windows Security

Register Now

Fill out the form to watch the webcast