McAfee Policy Auditor Administration

McAfee Policy Auditor Administration Training
McAfee Policy Auditor Administration
  • McAfee Policy Auditor Administration

    4 Dages
    Network Security
    1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
    Loading...

    Reviews

    Course Details

    Overview

    The McAfee® Policy Auditor Administration course from McAfee University provides attendees with in-depth training on the full benefits of this product. This course provides a firm foundation and hands-on experience in the installation, configuration, maintenance and troubleshooting of the McAfee Policy Auditor solution. This training also focuses on understanding the internal Policy Auditor architecture and how to build custom remedies. At the end of this course, attendees should understand the capabilities of the McAfee solution and have the capability of installing McAfee Policy Auditor.

    Objectives

    • Learn how to install and administer policies.
    • Create and edit benchmark checks.
    • Use the new Content Creator Tool to create and edit benchmark checks.
    • Import checks, create scripts, and set auditing periods.
    • Configuring file integrity monitoring.
    • View & customize dashboards and queries.
    • McAfee Vulnerability Manager and Policy Auditor Integration.
    • McAfee Risk Advisor and Policy Auditor Integration.

    Outline

    Module 1: Introduction to Security Connected and Policy Auditor

    • Introduction to Security Risk Management
    • Introduction to Policy Auditor
    • Summary of Differences From Version 3

    Module 2: ePolicy Orchestrator Administrative Overview

    • Function
    • Components
    • Architecture and Communication
    • Repositories

    Module 3: ePO Server Installation

    • Requirements
    • Tips and Best Practices
    • Installation
    • Post Installation
    • Product Documentation

    Module 4: ePO Navigation and Policies

    • Navigation
    • System Tree
    • Policies

    Module 5: The McAfee Agent

    • Overview
    • Components
    • Agent-Server Communication
    • Using the System Tray
    • Troubleshooting
    • SuperAgents
    • Directories and Files
    • Non-Windows Operating Systems

    Module 6: Installing the Policy Auditor Server

    • ePO Extensions
    • Policy Auditor Extension
    • Policy Auditor Installation Requirements
    • Policy Auditor Server Installation
    • Upgrading Policy Auditor
    • Removing Policy Auditor

    Module 7: Policy Auditor Server Configuration

    • What is Policy Auditor?
    • Components
    • Server Settings
    • Permission Sets
    • Tasks
    • Performance Improvements in PA 0

    Module 8: Policy Auditor Agent

    • Overview
    • Localization
    • Support Operating Systems
    • Installation
    • Log Files
    • Troubleshooting
    • Displaying System Tray Icon

    Module 9: Introduction to Audits

    • Audit Overview
    • Industry Standards
    • Policy Auditor and Standards

    Module 10: Benchmark Editor

    • Introduction
    • Viewing
    • Status Types
    • Configuration
    • Tailoring
    • Editing
    • Labels

    Module 11: Configuring Audits

    • Include Systems in an Audit
    • Choose a Benchmark
    • Activate Benchmark
    • Create a new Audit
    • McAfee Agent Role in Audits
    • Process Audit Results
    • View the Audit Results
    • Server Task Log
    • Audit Whiteout and Blackout Periods
    • Verify Audit at the System
    • Tips and Tricks

    Module 12: Creating Checks

    • Rules and Checks Introduction
    • Creating Checks
    • Creating Rules

    Module 13: Content Creator Tool

    • Introduction
    • Installation
    • GUI
    • Templates
    • Creating a Benchmark Using the PACC Tool

    Module 14: Patches and Scripts

    • Importing Benchmarks
    • Patches
    • Service Level Agreement
    • Scripts

    Module 15: Waivers

    • Waivers Introduction
    • Configuring Waivers

    Module 16: Issues and Tickets

    • Issues and Tickets
    • Managing Issues
    • Ticketing Integration

    Module 17: File Integrity Monitoring

    • What is File Integrity Monitoring
    • Defining FIM Policies
    • Reports
    • Protection
    • Maintenance
    • Basic Troubleshooting and FAQs
    • Solving Memory Discrepancies
    • Helpful Resources

    Module 18: Dashboards and Reporting

    • Dashboard Overview
    • New Queries & Reports
    • Customizing Dashboards
    • Roll-up Reporting
    • Generate a Report

    Module 19: Support and Troubleshooting

    • Support
    • Best Practices
    • PA Agent Debug Tool

    Module 20: Integration

    • Purpose of Integration
    • Example of Need
    • Compliance Solutions

    Module 21: Introduction to Vulnerability Manager

    • Overview
    • Components
    • Architecture
    • Communication
    • Installation

    Module 22: Vulnerability Manager and Policy Auditor Integration

    • Integration Architecture
    • Configuration
    • Performing an Audit Using Vulnerability Manager

    Module 23: Introduction to Risk Advisor

    • Overview
    • Product Integration
    • Architecture
    • Installation

    Module 24: Risk Advisor and Policy Auditor Integration

    • Configuration
    • Permissions
    • Integration

    Target Audience

    • System and network administrators, security personnel, auditors, and/or consultants concerned with network and system security should take this course.

     

    Pre-Requisites

    • It is recommended that the students have a working knowledge of Microsoft Windows administration, system Administration concepts, a basic understanding of computer security concepts, and a general understanding of viruses and anti-virus technologies.

    Kommende datoer

      Jan 8 - Jan 11, 2018
    Copenhagen
      Apr 10 - Apr 13, 2018
    Copenhagen
      Jul 10 - Jul 13, 2018
    Copenhagen
      Oct 8 - Oct 11, 2018
    Copenhagen