« 
SecuritySCAPE 2012 - Be t... | 
Crazy Ideas for Combattin... »
                        
                            Are you going to HP Protect 2012?  Stay for my Audit Quadrathlon
                        
                            Mon, 06 Aug 2012 13:43:06 GMT
                        
                            Triathlon, pentathlon, just a few more days of the Summer
Olympics are left but there’s one more event happening in mid-September: 
Randy Franklin Smith’s Quadrathlon.  
 
On September 12 I will be taking on the audit logs of
Microsoft’s 4 top enterprise server products:  
 
·        
SharePoint
·        
SQL Server
·        
Exchange
·        
Windows Servers
Yeah, it’s a quadrathlon but don’t worry, you aren’t the
runner – I am and I plan to be exhausted at the end.
 
If you're attending Protect 2012, you can get free access.  
 
More
information here.
 
 
                         
                        
                            
                            
                                                       
                            
                        
                        
                                
                                
                        
                            
                            email this
                            •
                            
                            digg
                            •
                            
                            reddit
                            •
                            
                            dzone
                            
                            
                            
                            comments (0)
                            •
                            references (0)
                            
                            
                        
                        
                            Related:
                            Auditing Privileged Operations and Mailbox Access in Office 365 Exchange Online
5 Indicators of Endpoint Evil
Severing the Horizontal Kill Chain:  The Role of Micro-Segmentation in  Your Virtualization Infrastructure 
Anatomy of a Hack Disrupted: How one of SIEM’s out-of-the-box rules caught an intrusion and beyond
                        
                    
                    Comments disabled
powered by Bloget™