About
Several high-profile breaches involving Windows Event Log blind spots made headlines when hackers evaded detection by manipulating or deleting logs to obscure their activities. Without the right tools, security teams struggled to identify the nefarious actions and understand the full extent of the breach.

With SentinelOne, you can collect and consolidate your EDR data with Windows Event Logs without investing in new tooling or infrastructure. Singularity™ AI SIEM allows organizations to extend their investment in EDR, leveraging the same lightweight EDR agent to centralize Windows Event Logs.

Key Takeaways:

Discuss the value of collecting Windows Event Logs
Configurations/policy overrides and the dashboard
See the EDR agents in the console
When
Wednesday, January 8, 2025 · 11:00 a.m. Eastern Time (US & Canada) (GMT -5:00)
Presenters
1732139873-60baf6758ad793bc
Amanda Scheldt
Cybersecurity Writer and Webinar Host
Amanda Scheldt is a cybersecurity writer with an extensive background in cybersecurity research, threat intelligence, national security intelligence, and security awareness training. She has a Masters of Science in Cybersecurity from Webster University. Amanda combines her past industry expertise along with a passion for writing to promote more awareness and education in cybersecurity.
1732140138-49d8e2d6f8228c10
Manpreet Singh
Enterprise Solution Architect, SentinelOne
1732204009-a8d56df178b142e5
Jackie Lehmann
Product Marketing Director - AI SIEM, SentinelOne