Watch a step-by-step tutorial on how to collect Microsoft IIS logs using InTrust.
Duration: 03:11
In this demo, watch how you can use InTrust's automated response actions to minimize the impact of modern PowerShell-based attacks such as Pass the Hash.
Duration: 03:51
Watch you how can collect custom applications and services logs with InTrust.
Duration: 09:08
This demo shows how you can use InTrust and Change Auditor to minimize the damage of a ransomware attack, without a specialized malware detection solution in place.
Duration: 03:31