Académique Documents
Professionnel Documents
Culture Documents
Endpoint Security
10.x Administration
Education Services Instructor-led Training
Learning Objectives and configure scan settings to meet customer Recommended Pre-Work
Solution Overview requirements. ■■ Working knowledge of
Windows and system
Describe the solution, including key features, administration, network
Configuring Other Threat Prevention Options
benefits, and enhancements within this latest technologies.
Identify Quarantine Manager, Exclusions by
release. Basic understanding
Detection Name, and Potentially Unwanted ■■
of computer security,
Planning Program (PUP) Detection features, and
command line syntax,
Plan the deployment. configure these feature settings to meet malware/anti-malware,
customer requirements. virus/antivirus, and web
McAfee ePO Server Overview technologies.
Identify and navigate through commonly used Firewall Overview and Configuring Firewall ■■ Working knowledge of
Options McAfee ePO software.
McAfee ePO pages.
Describe Firewall features, communicate about
Related Courses
Preparing the McAfee ePolicy Orchestrator key Firewall terms and concepts, and configure
■■ McAfee VirusScan® and
On-Premises Server overall Firewall Options settings to meet
McAfee ePO Software
Add required packages and extensions to the customer requirements. Administration
McAfee ePO server. ■■ McAfee Advanced Threat
Configuring Firewall Rules and Groups
Defense Administration
Deploying the Client Endpoints Identify the purpose of Firewall rules and
■■ McAfee Web Gateway
Deploy the Client Endpoints. groups, and configure Firewall rules and groups
Administration
to meet customer requirements.
Using the McAfee Endpoint Security Client
Log in as an administrator and navigate through Configuring Web Control
the client interface. Describe Web Control features, and configure
Web Control settings to meet customer
Policy Management Overview requirements.
Describe the purpose of McAfee ePO polices
and communicate about key terms and Monitoring and Reporting
concepts. Monitor the solution using dashboards, queries,
reports, and threat event detail.
Configuring Common Settings
Configure common settings that apply to Migrating Policies and Client Tasks
all McAfee Endpoint Security modules and Identify the steps to migrate policies and client
features, such as Client interface, Language, tasks manually and automatically.
Logging, Proxy server for McAfee Global Threat
Intelligence (GTI) reputation, and Update McAfee Data Exchange Layer Overview
configuration. Describe the Data Exchange Layer (DXL)
solution and its key features.
Threat Prevention—Configuring Access
Protection McAfee Threat Intelligence Exchange
Describe Threat Prevention Access Protection Overview
features, and configure Access Protection Describe the McAfee Threat Intelligence
settings to meet customer requirements. Exchange solution and its key features.
Threat Prevention—Exploit Prevention Data Exchange Layer Management and Use To order, or for further
Identify and distinguish between the policies information, please call
Identify Threat Prevention Exploit Prevention 1 888 847 8766 or email
features, and configure Exploit Prevention required for a DXL environment.
SecurityEducation@intel.com.
settings to meet customer requirements.
Threat Intelligence Exchange Management
and Use
Threat Prevention—Configuring the On-
Access and On-Demand Scanners Identify and distinguish between the policies
Describe Threat Prevention On-Access required for a Threat Intelligence Exchange
Scanner and On-Demand Scanner features, environment.
Intel and the Intel and McAfee logos, ePolicy Orchestrator, McAfee ePO, and VirusScan are trademarks of Intel Corporation or McAfee, Inc. in the US McAfee. Part of Intel Security.
and/or other countries. Other marks and brands may be claimed as the property of others. Copyright © 2016 Intel Corporation. 2821 Mission College Boulevard
855_0716 Santa Clara, CA 95054
888 847 8766
www.intelsecurity.com