Расписание Система дистанционного обучения Заявка на курс

Symantec Endpoint Protection 12.1: Administration

40
21-25 ноября

The Symantec Endpoint Protection 12.1: Administration course is designed for the netw ork, IT security, and systems administration professional tasked w ith architecting, implementing, and monitoring v irus and spyw are protection, zero-day protection, and netw ork
threat protection solut ions. This class covers how to design, deploy, install, conf igure, manage, and monitor Symantec Endpoint   Protection 12.1 (SEP 12.1)

Students learn how to create and implement the client f irew all, intrusion prevent ion, applicat ion and device control, and behavioral protection policies that guard the enterprise f rom viruses and hackers. In addition, students learn how to perform server and database management, expand the management environment , use virtualization features for virtual clients, and interface the Symantec Endpoint Protect ion Manager w ith Protection Center.

Аудитория:

This course is for netw ork managers, resellers, systems administrators, client security administrators, systems professionals, and consultants w ho are charged w ith the installat ion, conf iguration, and day-to-day management of Symantec Endpoint Protection in a variety of network environments, and w ho are responsible for troubleshooting and tuning the performance of this product in the enterprise env ironment.

Предварительная подготовка:

You must have w orking know ledge of advanced computer terminology, including TCP/ IP netw orking terms and Internet terms, and an administrator-level know ledge of Microsoft Window s 2000/XP/2003 operat ing systems

По окончании курса слушатели будут знать:

By the complet ion of this course, you w ill be able to:

  • Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy.
  • Install and conf igure Symantec Endpoint Protect ion management and client components.
  • Deploy Symantec Endpoint Protection clients.
  • Manage the client user interface.
  • Manage product content updates.
  • Des ign a Symantec Endpoint Protection environment.
  • Manage Virus and Spyw are Protection policies.
  • Manage SONAR scans.
  • Manage Firew all and Intrusion Prevention policies.
  • Manage Application and Device Control policies.
  • Manage virtualized clients.
  • Conf igure replicat ion and load balancing.
  • Monitor and maintain the Symantec Endpoint Protection environment.
  • Interface the Symantec Endpoint Protection Manager w ith Protection Center.

Содержание курса

Introduction

  • Course overview
  • The classroom lab environment

Symantec Endpoint Protection Product Solution

  • Why use Symantec Endpoint Protect ion?
  • Symantec Endpoint Protection technologies
  • Symantec Endpoint Protection services
  • Symantec Endpoint Protection components
  • Symantec Endpoint Protection policies and concepts
  • Symantec Endpoint Protection product t iers

Installing Symantec Endpoint Protection

  • Ident ifying system requirements
  • Preparing servers for installat ion
  • Installing and conf iguring the Symantec Endpoint Protection

Manager

  • Describing Symantec Endpoint Protection migration and version compat ibility

Configuring the Symantec Endpoint Protection Environment

  • Starting and navigat ing the SEPM
  • Describing policy types and components
  • Console authenticat ion
  • Licensing the SEP environment

Deploying Clients

  • Client requirements and deployment methods
  • Preparing for client deployment
  • Client installat ion packages, settings, and features
  • Installing managed clients
  • Conf iguring an unmanaged detector
  • Upgrading Symantec Endpoint Protection c lients

Client and Policy Management

  • Describing SEPM and client communicat ions
  • Administer ing clients
  • Conf iguring groups
  • Conf iguring locat ions
  • Active Directory integrat ion w ith SEP 12.1
  • Client conf igurat ion modes
  • Conf iguring domains
  • General client settings and Tamper Protection

Configuring Content Updates

  • Introducing LiveUpdate
  • Conf iguring the SEPM for LiveUpdate
  • Conf iguring the LiveUpdate Sett ings and Content policies
  • Conf iguring multiple group update providers (GUPs)
  • Manually updat ing v irus def init ions

Designing a Symantec Endpoint Environment

  • Architecture and sizing considerations
  • Des igning the architecture
  • Determining client-to-SEPM rat ios
  • Content distribution methods
  • SEPM and database siz ing
  • Completing the deployment

Introducing Antivirus, Insight, and SONAR

  • Virus and spyw are protection needs and solutions
  • Reputat ion and Insight
  • Administrator-def ined scans
  • Auto-Protect
  • Dow nload Insight
  • SONAR
  • Included Virus and Spyw are Protection polic ies

Managing Virus and Spyware Protection Policies

  • Conf iguring administrator-def ined scans
  • Conf iguring protect ion technology settings and scans
  • Conf iguring e-mail scans
  • Conf iguring advanced opt ions
  • Conf iguring Mac client detect ion
  • Managing scanned clients
  • Conf iguring Mac Virus and Spyw are Protect ion policy settings

Managing Exception Policies

  • Except ions and exclusions
  • Conf iguring the Exceptions policy

Introducing Network Threat Protection and Application and Device Control

  • Netw ork threat protection basics
  • The f irew all
  • Intrusion prevention
  • Applicat ion access protection

Managing Firewall Policies

  • Firew all policy overview
  • Def ining rule components
  • Modifying f irew all rules
  • Conf iguring built- in rules
  • Conf iguring protect ion and stealth sett ings
  • Conf iguring Windows integration sett ings

Managing Intrusion Prevention Policies

  • Conf iguring intrusion prevention
  • Managing custom signatures

Managing Application and Device Control Policies

  • Creating applicat ion and device control policies
  • Def ining applicat ion control
  • Modifying policy rules
  • Def ining device control

Customizing Network Threat Protection and Application and Device Control

  • Tools for customizing netw ork threat protect ion
  • Managing policy components
  • Conf iguring learned applicat ions
  • Conf iguring system lockdown

Virtualization

  • Introducing virtualizat ion features
  • Virtual image exception
  • Shared Insight Cache
  • Virtual client tagging
  • Of f line image scanner

Configuring Replication and Failover and Load Balancing

  • About sites and replication
  • How replication w orks
  • Symantec Endpoint Protection replication scenarios
  • Conf iguring replication
  • Failover and load balancing

Performing Server and Database Management

  • Managing SEPM servers
  • Maintaining server security
  • Communicat ing w ith other servers
  • Managing administrators
  • Managing the database
  • Disaster recovery techniques

Advanced Monitoring and Reporting

  • Monitoring the Home and Monitors page
  • Analyzing and managing logs
  • Conf iguring and view ing notif ications
  • Creating and review ing reports
  • Introducing IT Analyt ics

Interfacing the SEPM with Protection Center

  • Describing Protection Center
  • Describing the Protection Center appliance
  • Conf iguring Protection Center
  • Using Protection Center