Detailed Course Outline
Introduction
- Course overview
- The classroom lab environment
Symantec Endpoint Protection Product Solution
- Why use Symantec Endpoint Protection?
- Symantec Endpoint Protection technologies
- Symantec Endpoint Protection services
- Symantec Endpoint Protection components
- Symantec Endpoint Protection policies and concepts
- Symantec Endpoint Protection product tiers
Installing Symantec Endpoint Protection
- Identifying system requirements
- Preparing servers for installation
- Installing and configuring the Symantec Endpoint Protection Manager
- Describing Symantec Endpoint Protection migration and version compatibility
Configuring the Symantec Endpoint Protection Environment
- Starting and navigating the SEPM
- Describing policy types and components
- Console authentication
- Licensing the SEP environment
Deploying Clients
- Client requirements and deployment methods
- Preparing for client deployment
- Client installation packages, settings, and features
- Installing managed clients
- Configuring an unmanaged detector
- Upgrading Symantec Endpoint Protection clients
Client and Policy Management
- Describing SEPM and client communications
- Administering clients
- Configuring groups
- Configuring locations
- Active Directory integration with SEP 12.1
- Client configuration modes
- Configuring domains
- General client settings and Tamper Protection
Configuring Content Updates
- Introducing LiveUpdate
- Configuring the SEPM for LiveUpdate
- Configuring the LiveUpdate Settings and Content policies
- Configuring multiple group update providers (GUPs)
- Manually updating virus definitions
Designing a Symantec Endpoint Environment
- Architecture and sizing considerations
- Designing the architecture
- Determining client-to-SEPM ratios
- Content distribution methods
- SEPM and database sizing
- Completing the deployment
Introducing Antivirus, Insight, and SONAR
- Virus and spyware protection needs and solutions
- Reputation and Insight
- Administrator-defined scans
- Auto-Protect
- Download Insight
- SONAR
- Included Virus and Spyware Protection policies
Managing Virus and Spyware Protection Policies
- Configuring administrator-defined scans
- Configuring protection technology settings and scans
- Configuring e-mail scans
- Configuring advanced options
- Configuring Mac client detection
- Managing scanned clients
- Configuring Mac Virus and Spyware Protection policy settings
Managing Exception Policies
- Exceptions and exclusions
- Configuring the Exceptions policy
Introducing Network Threat Protection and Application and Device Control
- Network threat protection basics
- The firewall
- Intrusion prevention
- Application access protection
Managing Firewall Policies
- Firewall policy overview
- Defining rule components
- Modifying firewall rules
- Configuring built-in rules
- Configuring protection and stealth settings
- Configuring Windows integration settings
Managing Intrusion Prevention Policies
- Configuring intrusion prevention
- Managing custom signatures
Managing Application and Device Control Policies
- Creating application and device control policies
- Defining application control
- Modifying policy rules
- Defining device control
Customizing Network Threat Protection and Application and Device Control
- Tools for customizing network threat protection
- Managing policy components
- Configuring learned applications
- Configuring system lockdown
Virtualization
- Introducing virtualization features
- Virtual image exception
- Shared Insight Cache
- Virtual client tagging
- Offline image scanner
Configuring Replication and Failover and Load Balancing
- About sites and replication
- How replication works
- Symantec Endpoint Protection replication scenarios
- Configuring replication
- Failover and load balancing
Performing Server and Database Management
- Managing SEPM servers
- Maintaining server security
- Communicating with other servers
- Managing administrators
- Managing the database
- Disaster recovery techniques
Advanced Monitoring and Reporting
- Monitoring the Home and Monitors page
- Analyzing and managing logs
- Configuring and viewing notifications
- Creating and reviewing reports
- Introducing IT Analytics
Interfacing the SEPM with Protection Center
- Describing Protection Center
- Describing the Protection Center appliance
- Configuring Protection Center
- Using Protection Center