Vous êtes sur la page 1sur 2

Course Description

Endpoint Security
10.x Administration
Education Services Instructor-led Training

Our McAfee® Endpoint Security 10X Administration course provides an in-


depth introduction to the tasks crucial to set up and administer McAfee
Endpoint Security (ENS). McAfee Endpoint Security combines threat
prevention, firewall, and web control to take immediate action against
potentially dangerous applications, downloads, websites, and files. This course
combines lectures and practical lab exercises, with significant time allocated
for hands-on interaction with the McAfee Endpoint Security user interface, as
well as detailed instructions for the integration of this solution.

Agenda At A Glance Agenda At A Glance (continued)


Day 1 Day 2 (continued)
■■Welcome ■■Configuring Other Threat
Prevention Options
■■ Solution Overview
■■ Firewall Overview and Audience
■■ Planning This course is intended
Configuring Firewall Options
■■ McAfee ePolicy Orchestrator® for system and network
(McAfee ePO™) Server Overview Day 3 administrators, security
■■Configuring Firewall Rules and Groups personnel, auditors, and/or
■■ Preparing the McAfee ePO Server consultants concerned with
■■ Configuring Web Control system endpoint security.
■■ Deploying the Client Endpoints
■■ Monitoring and Reporting
■■ Using the McAfee Endpoint
Security Client ■■ Migrating Policies and Client Tasks
■■ Policy Management Overview ■■ McAfee Data Exchange Layer Overview
■■ Configuring Common Settings ■■ McAfee Threat Intelligence Exchange
Overview
Day 2
■■Threat Prevention— Day 4
Configuring Access Protection ■■Data Exchange Layer Management
and Use
■■ Threat Prevention—Exploit
Prevention ■■ Threat Intelligence Exchange
Management and Use
■■ Threat Prevention—
Configuring the On-Access
and On-Demand Scanners
Course Description

Learning Objectives and configure scan settings to meet customer Recommended Pre-Work
Solution Overview requirements. ■■ Working knowledge of
Windows and system
Describe the solution, including key features, administration, network
Configuring Other Threat Prevention Options
benefits, and enhancements within this latest technologies.
Identify Quarantine Manager, Exclusions by
release. Basic understanding
Detection Name, and Potentially Unwanted ■■

of computer security,
Planning Program (PUP) Detection features, and
command line syntax,
Plan the deployment. configure these feature settings to meet malware/anti-malware,
customer requirements. virus/antivirus, and web
McAfee ePO Server Overview technologies.
Identify and navigate through commonly used Firewall Overview and Configuring Firewall ■■ Working knowledge of
Options McAfee ePO software.
McAfee ePO pages.
Describe Firewall features, communicate about
Related Courses
Preparing the McAfee ePolicy Orchestrator key Firewall terms and concepts, and configure
■■ McAfee VirusScan® and
On-Premises Server overall Firewall Options settings to meet
McAfee ePO Software
Add required packages and extensions to the customer requirements. Administration
McAfee ePO server. ■■ McAfee Advanced Threat
Configuring Firewall Rules and Groups
Defense Administration
Deploying the Client Endpoints Identify the purpose of Firewall rules and
■■ McAfee Web Gateway
Deploy the Client Endpoints. groups, and configure Firewall rules and groups
Administration
to meet customer requirements.
Using the McAfee Endpoint Security Client
Log in as an administrator and navigate through Configuring Web Control
the client interface. Describe Web Control features, and configure
Web Control settings to meet customer
Policy Management Overview requirements.
Describe the purpose of McAfee ePO polices
and communicate about key terms and Monitoring and Reporting
concepts. Monitor the solution using dashboards, queries,
reports, and threat event detail.
Configuring Common Settings
Configure common settings that apply to Migrating Policies and Client Tasks
all McAfee Endpoint Security modules and Identify the steps to migrate policies and client
features, such as Client interface, Language, tasks manually and automatically.
Logging, Proxy server for McAfee Global Threat
Intelligence (GTI) reputation, and Update McAfee Data Exchange Layer Overview
configuration. Describe the Data Exchange Layer (DXL)
solution and its key features.
Threat Prevention—Configuring Access
Protection McAfee Threat Intelligence Exchange
Describe Threat Prevention Access Protection Overview
features, and configure Access Protection Describe the McAfee Threat Intelligence
settings to meet customer requirements. Exchange solution and its key features.

Threat Prevention—Exploit Prevention Data Exchange Layer Management and Use To order, or for further
Identify and distinguish between the policies information, please call
Identify Threat Prevention Exploit Prevention 1 888 847 8766 or email
features, and configure Exploit Prevention required for a DXL environment.
SecurityEducation@intel.com.
settings to meet customer requirements.
Threat Intelligence Exchange Management
and Use
Threat Prevention—Configuring the On-
Access and On-Demand Scanners Identify and distinguish between the policies
Describe Threat Prevention On-Access required for a Threat Intelligence Exchange
Scanner and On-Demand Scanner features, environment.

Intel and the Intel and McAfee logos, ePolicy Orchestrator, McAfee ePO, and VirusScan are trademarks of Intel Corporation or McAfee, Inc. in the US McAfee. Part of Intel Security.
and/or other countries. Other marks and brands may be claimed as the property of others. Copyright © 2016 Intel Corporation. 2821 Mission College Boulevard
855_0716 Santa Clara, CA 95054
888 847 8766
www.intelsecurity.com

Vous aimerez peut-être aussi