Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Using Silk Snapshots: Key Uses Cases, Enabling Automation, and More David Berliner, Senior Director of Product, Silk Snapshots are point-in-time replicas of a database used for data protection and backup, as well as for activities related to development, testing, rep... April 19, 2023 3:00pm Windows Incident Response webinar. Live analysis with PowerShell Ayman Shaaban and Kai Schuricht, Kaspersky Global Emergency Response Team (GERT) According to Kaspersky Incident Response Analyst report, an incident can exist undetected in the system for hours and days to months and even years - ... 8 months ago | 103 mins Windows Incident Response webinar. Live analysis with PowerShell Ayman Shaaban and Kai Schuricht, Kaspersky Global Emergency Response Team (GERT) According to Kaspersky Incident Response Analyst report, an incident can exist undetected in the system for hours and days to months and even years - ... 9 months ago | 103 mins Abnormal Demo Day: 3 Ways to Drive Increased SOC Productivity Gabe Rebane, Group Technical Marketing Manager, Abnormal Security The day-to-day work life of a security analyst can be extremely challenging, but analyzing and responding to user-reported emails should not make it m... 6 months ago | 26 mins Take The Migraine out of Migrations with Carbonite Migrate Andy Ebbs - Lead Solutions Consultant at OpenText Security Solutions As leaders in data management and mobility, we understand how complex it is for global system integrators to implement seamless data migration process... 2 months ago | 32 mins Powershell Berechtigungsmanagement [German] Thomas Wiefel, PowerShell-Experte in den Bereichen Verwaltung von Active Directory und MS Cloud Eine IT Infrastruktur besteht aus einer Vielzahl unterschiedlicher Objekte. Welche Optionen haben Administratoren Berechtigungen an Dateisystemsobjekt... 2 years ago | 66 mins Powering Up PowerShell with C# John Hammond, Senior Security Research | Chris Bisnett, Founder & Chief Architect | John Ferrell, Founder & ThreatOps VP It's well known that hackers use native programs and scripting languages like PowerShell to attack their targets, but how do they leverage the power o... 2 years ago | 60 mins Gruppenrichtlinien (GPO) mit der Powershell verwalten [German] Thomas Wiefel, PowerShell-Experte in den Bereichen Verwaltung von Active Directory und MS Cloud In diesem Webinar wird der Umgang mit dem Powershell Modul 'GroupPolicy' vermittelt. Welche Verwaltungsmöglichkeiten werden von den darin enthaltenen ... 2 years ago | 66 mins Arbeiten Sie schon, oder migrieren Sie noch? Petra Derody, Corporate Account Executive. Stefan Schön, Sr. Solutions Consultant bei Opentext Security Solutions Es gibt viele Tools auf dem Markt, die behaupten, die Komplexität einer Migration zu erleichtern. Doch nur eine Handvoll davon ermöglicht Ihren Kunden... 4 months ago | 28 mins Powershell (Posh) Grundlagen [German] Thomas Wiefel, PowerShell-Experte in den Bereichen Verwaltung von Active Directory und MS Cloud „Learn PowerShell or die": Die Kenntnis der Power-Shell-Konsole und der Anlage qualitativ guter Skripte ist unverzichtbar für die Verwaltung Windows-b... 2 years ago | 79 mins Load more