Watch a step-by-step tutorial on how to collect Microsoft IIS logs using InTrust.
In this demo, watch how you can use InTrust's automated response actions to minimize the impact of modern PowerShell-based attacks such as Pass the Hash.
Watch you how can collect custom applications and services logs with InTrust.
This demo shows how you can use InTrust and Change Auditor to minimize the damage of a ransomware attack, without a specialized malware detection solution in place.
This video provides a product overview of InTrust.