Symantec Endpoint Protection 12.X - Manage And Administer

4.6 out of 5 rating

Jump to dates

Duration

2 Days

12 CPD hours

This course is intended for

This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the configuration and day-to-day management of Symantec Endpoint Protection in a variety of network environments.

Overview

By the completion of this course, you will be able to:
Manage Virus and Spyware Protection policies.
Manage SONAR scans.
Manage Firewall and Intrusion Prevention policies.
Manage Application and Device Control policies.
Manage System Lockdown. Manage Host Integrity.
Manage Virtualized clients.

Description

This course is designed for the network, IT security, and systems administration professional tasked with implementing and monitoring virus and spyware protection, zero-day protection, and network threat protection solutions.

Introduction
  • Course overview
    The classroom lab environment
Introducing Antivirus, Insight, and SONAR
  • Virus and spyware protection needs and solutions
    Reputation and Insight
    Administrator-defined scans
    Auto-Protect
    Download Insight
    SONAR
    Included Virus and Spyware Protection policies
Managing Virus and Spyware Protection Policies for Windows
  • Configuring administrator-defined scans
    Configuring protection technology settings and scans
    Configuring e-mail scans
    Configuring advanced options
    Managing scanned clients
Managing Virus and Spyware Protection Policies for Mac and Linux
  • Configuring Virus and Spyware settings for Mac
    Configuring Virus and Spyware settings for Linux
    Configuring advanced options
Managing Exception Policies
  • Exceptions and exclusions
    Configuring the Exceptions policy
Introducing Network Threat Protection
  • The OSI model and network threats
    Network threat tools and attack methods
    Attack and mitigation
Managing Firewall Policies
  • Firewall policy overview
    Defining rule components
    Modifying firewall rules
    Configuring built-in rules
    Configuring protection and stealth settings
    Configuring Windows integration settings
Managing Intrusion Prevention Policies
  • Configuring network and browser intrusion prevention
    Managing custom signatures
Compliance Management
  • Application and Device Control
    System Lockdown
    Host Integrity
Virtualization
  • Introducing virtualization features
    Virtual image exception
    Network and vShield Shared Insight Cache
    Virtual client tagging
    Offline image scanner
    Windows Azure support
Training Insurance Included!

When you organise training, we understand that there is a risk that some people may fall ill, become unavailable. To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.

What people say about us


Find out more about this course

Interested in alternative dates? Would like to book a private session of this course for your company? Or for any other queries please simply fill out the form below.