Endpoint Security 10X Administration

Endpoint Security 10X Administration Training
Endpoint Security 10X Administration
  • Endpoint Security 10X Administration

    4 Dages
    Network Security
    1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
    Loading...

    Reviews

    Course Details

    Overview

    Our McAfee® Endpoint Security 10X Administration course provides an in-depth introduction to the tasks crucial to set up and administer McAfee Endpoint Security (ENS). McAfee Endpoint Security combines threat prevention, firewall, and web control to take immediate action against potentially dangerous applications, downloads, websites, and files. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the McAfee Endpoint Security user interface, as well as detailed instructions for the integration of this solution.

    Objectives

    Solution Overview

    • Describe the solution, including key features, benefits, and enhancements within this latest release.

    Planning

    • Plan the deployment.

    McAfee ePO Server Overview

    • Identify and navigate through commonly used McAfee ePO pages.

    Preparing the McAfee ePolicy Orchestrator On-Premises Server

    • Add required packages and extensions to the McAfee ePO server.

    Deploying the Client Endpoints

    • Deploy the Client Endpoints.

    Using the McAfee Endpoint Security Client

    • Log in as an administrator and navigate through the  client interface.

    Policy Management Overview

    • Describe the purpose of McAfee ePO polices and communicate about key terms and concepts.

    Configuring Common Settings

    • Configure common settings that apply to all McAfee Endpoint Security modules and features,  such  as  Client  interface, Language,
    • Logging, Proxy server for McAfee Global Threat
    • Intelligence (GTI) reputation, and Update configuration.

    Threat Prevention—Configuring Access Protection

    • Describe Threat Prevention Access Protection features, and configure Access Protection settings  to  meet  customer requirements.

    Threat Prevention—Exploit Prevention

    • Identify Threat Prevention Exploit Prevention features, and configure Exploit Prevention settings  to  meet  customer requirements.

    Threat Prevention—Configuring the On- Access and On-Demand Scanners

    • Describe Threat Prevention On-Access Scanner and On-Demand Scanner features, and configure scan settings to meet customer requirements.

    Configuring Other Threat Prevention Options

    • Identify Quarantine Manager, Exclusions by Detection Name, and Potentially Unwanted Program (PUP) Detection features, and configure these feature settings to meet customer requirements.

    Firewall Overview and Configuring Firewall Options

    • Describe Firewall features, communicate about key Firewall terms and concepts, and configure overall Firewall Options settings to meet customer requirements.

    Configuring Firewall Rules and Groups

    • Identify the purpose of Firewall rules and  groups, and configure Firewall rules and groups to  meet  customer requirements.

    Configuring Web Control

    • Describe Web Control features, and configure Web Control settings to meet customer requirements.

    Monitoring and Reporting

    • Monitor the solution using dashboards, queries, reports, and threat event  detail.

    Migrating Policies and Client Tasks

    • Identify the steps to migrate policies and client tasks manually and automatically.

    McAfee Data Exchange Layer Overview

    • Describe the Data Exchange Layer (DXL) solution and its key   features.

    McAfee Threat Intelligence Exchange Overview

    • Describe the McAfee Threat Intelligence Exchange solution and its key features.

    Data Exchange Layer Management and Use

    • Identify and distinguish between the policies required for a DXL environment.

    Threat Intelligence Exchange Management and Use

    • Identify and distinguish between the policies required for a Threat Intelligence Exchange environment.

    Outline

    Day 1

    • Welcome
    • Solution Overview
    • Planning
    • McAfee ePolicy Orchestrator® (McAfee ePO™) Server Overview
    • Preparing the McAfee ePO Server
    • Deploying the Client Endpoints
    • Using the McAfee Endpoint Security Client
    • Policy Management Overview
    • Configuring Common Settings

    Day 2

    • Threat Prevention – Configuring Access Protection
    • Threat Prevention – Exploit Prevention
    • Threat Prevention – Configuring the On-Access and On-Demand Scanners
    • Configuring Other Threat Prevention Options
    • Firewall Overview and Configuring Firewall Options

    Day 3

    • Configuring Firewall Rules and Groups
    • Configuring Web Control
    • Monitoring and Reporting
    • Migrating Policies and Client Tasks
    • McAfee Data Exchange Layer Overview
    • McAfee Threat Intelligence Exchange Overview

    Day 4

    • Data Exchange Layer Management and Use
    • Threat Intelligence Exchange Management and Use

    Target Audience

    • This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security.

     

    Pre-Requisites

    • Working knowledge of Windows and system administration, network technologies.
    • Basic understanding of computer security, command line syntax, malware/anti-malware, virus/antivirus, and web technologies.
    • Working knowledge of McAfee ePO

    Kommende datoer

      Dec 26 to Dec 29, 2017
    Copenhagen
      Mar 19 - Mar 22, 2018
    Copenhagen
      Jun 19 - Jun 22, 2018
    Copenhagen
      Sep 18 - Sep 21, 2018
    Copenhagen
      Dec 17 - Dec 20, 2018
    Copenhagen