Access & identity controls: 100 days to secure your environment - Episode 4
Автор: ThreatLocker
Загружено: 2025-06-12
Просмотров: 273
In week 4 of our "100 days to secure your environment" webinar series, we focus on ThreatLocker Network Control to defend against ransomware and unauthorized access.
Key learnings include:
Implementing dynamic ACLs for secure IT access
Creating adaptive firewall policies for endpoint IPs
Configuring server traffic to block attacks
Using ThreatLocker Unified Audit for traffic management
Addressing VPN vulnerabilities and rogue ports
Enhancing DNS, AD, and RDP access with Zero Trust principles
This episode offers essential strategies to secure your infrastructure while maintaining productivity.
00:00:00 – Welcome to Week 4: Remote encryption risks
00:04:02 – Why dynamic IPs matter in Zero Trust
00:08:07 – Creating secure RDP policies in Network Control
00:12:08 – Using Unified Audit to fix firewall denies
00:16:09 – Rolling out server-level block policies
00:20:11 – Understanding Windows firewall interactions
00:24:13 – Blocking lateral movement with port control
00:28:16 – Managing access between internal teams & consultants
00:32:22 – Session limits and secure sign-in frequency
00:36:24 – Blocking legacy protocols and modern policy design
00:40:28 – Microsoft 365 license considerations for Zero Trust
00:44:28 – Securing inbound email traffic to your domain
00:48:29 – Reporting dashboards, graphs & audit tools overview
#ZeroTrust #NetworkControl #FirewallPolicy #ThreatLocker #RansomwarePrevention #UnifiedAudit #ConditionalAccess #EndpointSecurity #CybersecurityStrategy #ITInfrastructure #Allowlisting
Join the next live session → https://www.threatlocker.com/webinars
Subscribe for weekly Zero Trust training → / @threatlocker
Facebook: / thethreatlocker
LinkedIn: / threatlockerinc
Twitter: / threatlocker
Instagram: / threatlocker
YouTube: / threatlocker
©2025 ThreatLocker® Inc., All Rights Reserved.
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: