Home
|
Instructor-led Training
|
Online Training
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Python
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
Fundamentals Of Symantec Endpoint Protection
Symantec Training Course duration
5 days
Symantec Training Course outline
Introduction
Course overview
The classroom lab environment
Why use Symantec Endpoint Protection?
Symantec Endpoint Protection technologies
Symantec Endpoint Protection services
Symantec Endpoint Protection components
Symantec Endpoint Protection policies and concepts
Symantec Endpoint Protection product tiers
Installing Symantec Endpoint Protection
Identifying system requirements
Preparing servers for installation
Installing and configuring the Symantec Endpoint Protection Manager
Describing Symantec Endpoint Protection migration and version compatibility
Configuring the Symantec Endpoint Protection Environment
Starting and navigating the SEPM
Describing policy types and components
Console authentication
Licensing the SEP environment
Deploying Clients
Client requirements and deployment methods
Preparing for client deployment
Client installation packages, settings, and features
Installing managed clients
Configuring an unmanaged detector
Upgrading Symantec Endpoint Protection clients
Client and Policy Management
Describing SEPM and client communications
Administering clients
Configuring groups
Configuring locations
Active Directory integration w ith SEP 12.1
Client configuration modes
Configuring domains
General client settings and Tamper Protection
Configuring Content Updates
Introducing LiveUpdate
Configuring the SEPM for LiveUpdate
Configuring the LiveUpdate Settings and Content policies
Configuring multiple group update providers (GUPs)
Manually updating virus definitions
Designing a Symantec Endpoint Environment
Architecture and sizing considerations
Designing the architecture
Determining client-to-SEPM ratios
Content distribution methods
SEPM and database sizing
Completing the deployment
Introducing Antivirus, Insight, and SONAR
Virus and spyware protection needs and solutions
Reputation and Insight
Administrator-defined scans
Auto-Protect
Download Insight
SONA R
Included Virus and Spyware Protection policies
Managing Virus and Spyware Protection Policies
Configuring administrator-defined scans
Configuring protection technology settings and scans
Configuring e-mail scans
Configuring advanced options
Configuring Mac client detection
Managing scanned clients
Configuring Mac Virus and Spyware Protection policy settings
Managing Exception Policies
Exceptions and exclusions
Configuring the Exceptions policy
Introducing Network Threat Protection and Application and Device Control
Network threat protection basics
The firewall
Intrusion prevention
Application access protection
Managing Firewall Policies
Firewall policy overview
Defining rule components
Modifying firewall rules
Configuring built-in rules
Configuring protection and stealth settings
Configuring Windows integration settings
Managing Intrusion Prevention Policies
Configuring intrusion prevention
Managing custom signatures
Managing Application and Device Control Policies
Creating application and device control policies
Defining application control
Modifying policy rules
Defining device control
Customizing Network Threat Protection and Application and Device Control
Tools for customizing network threat protection
Managing policy components
Configuring learned applications
Configuring system lockdown
Virtualization
Introducing virtualization features
Virtual image exception
Shared Insight Cache
Virtual client tagging
Offline image scanner
Configuring Replication and Failover and Load Balancing
About sites and replication
How replication works
Symantec Endpoint Protection replication scenarios
Configuring replication
Failover and load balancing
Performing Server and Database Management
Managing SEPM servers
Maintaining server security
Communicating with other servers
Managing administrators
Managing the database
Disaster recovery techniques
Advanced Monitoring and Reporting
Monitoring the Home and Monitors page
Analyzing and managing logs
Configuring and viewing notifications
Creating and reviewing reports
Introducing IT Analytics
Interfacing the SEPM with Protection Center
Describing Protection Center
Describing the Protection Center appliance
Configuring Protection Center
Please contact your training representative for more details on having this course delivered onsite or online
Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved